|
98 | 98 | } |
99 | 99 | } |
100 | 100 | }, |
| 101 | + "com.amazonaws.wafv2#ASN": { |
| 102 | + "type": "long", |
| 103 | + "traits": { |
| 104 | + "smithy.api#default": 0, |
| 105 | + "smithy.api#range": { |
| 106 | + "min": 0, |
| 107 | + "max": 4294967295 |
| 108 | + } |
| 109 | + } |
| 110 | + }, |
101 | 111 | "com.amazonaws.wafv2#AWSManagedRulesACFPRuleSet": { |
102 | 112 | "type": "structure", |
103 | 113 | "members": { |
|
1731 | 1741 | "smithy.api#documentation": "<p>A logical rule statement used to combine other rule statements with AND logic. You provide more than one <a>Statement</a> within the <code>AndStatement</code>. </p>" |
1732 | 1742 | } |
1733 | 1743 | }, |
| 1744 | + "com.amazonaws.wafv2#AsnList": { |
| 1745 | + "type": "list", |
| 1746 | + "member": { |
| 1747 | + "target": "com.amazonaws.wafv2#ASN" |
| 1748 | + }, |
| 1749 | + "traits": { |
| 1750 | + "smithy.api#length": { |
| 1751 | + "min": 1, |
| 1752 | + "max": 100 |
| 1753 | + } |
| 1754 | + } |
| 1755 | + }, |
| 1756 | + "com.amazonaws.wafv2#AsnMatchStatement": { |
| 1757 | + "type": "structure", |
| 1758 | + "members": { |
| 1759 | + "AsnList": { |
| 1760 | + "target": "com.amazonaws.wafv2#AsnList", |
| 1761 | + "traits": { |
| 1762 | + "smithy.api#documentation": "<p>Contains one or more Autonomous System Numbers (ASNs). \n ASNs are unique identifiers assigned to large internet networks managed by organizations such as \n internet service providers, enterprises, universities, or government agencies. </p>", |
| 1763 | + "smithy.api#required": {} |
| 1764 | + } |
| 1765 | + }, |
| 1766 | + "ForwardedIPConfig": { |
| 1767 | + "target": "com.amazonaws.wafv2#ForwardedIPConfig", |
| 1768 | + "traits": { |
| 1769 | + "smithy.api#documentation": "<p>The configuration for inspecting IP addresses to match against an ASN in an HTTP header that you specify, \n instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, \n but you can specify any header name. </p>" |
| 1770 | + } |
| 1771 | + } |
| 1772 | + }, |
| 1773 | + "traits": { |
| 1774 | + "smithy.api#documentation": "<p>A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.</p>\n <p>For additional details, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html\">ASN match rule statement</a> in the <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html\">WAF Developer Guide</a>. </p>" |
| 1775 | + } |
| 1776 | + }, |
1734 | 1777 | "com.amazonaws.wafv2#AssociateWebACL": { |
1735 | 1778 | "type": "operation", |
1736 | 1779 | "input": { |
|
5923 | 5966 | } |
5924 | 5967 | }, |
5925 | 5968 | "traits": { |
5926 | | - "smithy.api#documentation": "<p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>\n <note>\n <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>\n </note>\n <p>This configuration is used for <a>GeoMatchStatement</a> and <a>RateBasedStatement</a>. For <a>IPSetReferenceStatement</a>, use <a>IPSetForwardedIPConfig</a> instead. </p>\n <p>WAF only evaluates the first IP address found in the specified HTTP header.\n </p>" |
| 5969 | + "smithy.api#documentation": "<p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>\n <note>\n <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>\n </note>\n <p>This configuration is used for <a>GeoMatchStatement</a>, <a>AsnMatchStatement</a>, and \n <a>RateBasedStatement</a>. For <a>IPSetReferenceStatement</a>, use <a>IPSetForwardedIPConfig</a> instead. </p>\n <p>WAF only evaluates the first IP address found in the specified HTTP header.\n </p>" |
5927 | 5970 | } |
5928 | 5971 | }, |
5929 | 5972 | "com.amazonaws.wafv2#ForwardedIPHeaderName": { |
|
7045 | 7088 | "OversizeHandling": { |
7046 | 7089 | "target": "com.amazonaws.wafv2#OversizeHandling", |
7047 | 7090 | "traits": { |
7048 | | - "smithy.api#documentation": "<p>What WAF should do if the headers of the request are more numerous or larger than WAF can inspect. \n WAF does not support inspecting the entire contents of request headers \n when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers\n and at most 8 KB of header contents to WAF. </p>\n <p>The options for oversize handling are the following:</p>\n <ul>\n <li>\n <p>\n <code>CONTINUE</code> - Inspect the available headers normally, according to the rule inspection criteria. </p>\n </li>\n <li>\n <p>\n <code>MATCH</code> - Treat the web request as matching the rule statement. WAF\n applies the rule action to the request.</p>\n </li>\n <li>\n <p>\n <code>NO_MATCH</code> - Treat the web request as not matching the rule\n statement.</p>\n </li>\n </ul>", |
| 7091 | + "smithy.api#documentation": "<p>What WAF should do if the headers determined by your match scope are more numerous or larger than WAF can inspect. \n WAF does not support inspecting the entire contents of request headers \n when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers\n and at most 8 KB of header contents to WAF. </p>\n <p>The options for oversize handling are the following:</p>\n <ul>\n <li>\n <p>\n <code>CONTINUE</code> - Inspect the available headers normally, according to the rule inspection criteria. </p>\n </li>\n <li>\n <p>\n <code>MATCH</code> - Treat the web request as matching the rule statement. WAF\n applies the rule action to the request.</p>\n </li>\n <li>\n <p>\n <code>NO_MATCH</code> - Treat the web request as not matching the rule\n statement.</p>\n </li>\n </ul>", |
7049 | 7092 | "smithy.api#required": {} |
7050 | 7093 | } |
7051 | 7094 | } |
|
7077 | 7120 | "OversizeHandling": { |
7078 | 7121 | "target": "com.amazonaws.wafv2#OversizeHandling", |
7079 | 7122 | "traits": { |
7080 | | - "smithy.api#documentation": "<p>What WAF should do if the headers of the request are more numerous or larger than WAF can inspect. \n WAF does not support inspecting the entire contents of request headers \n when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers\n and at most 8 KB of header contents to WAF. </p>\n <p>The options for oversize handling are the following:</p>\n <ul>\n <li>\n <p>\n <code>CONTINUE</code> - Inspect the available headers normally, according to the rule inspection criteria. </p>\n </li>\n <li>\n <p>\n <code>MATCH</code> - Treat the web request as matching the rule statement. WAF\n applies the rule action to the request.</p>\n </li>\n <li>\n <p>\n <code>NO_MATCH</code> - Treat the web request as not matching the rule\n statement.</p>\n </li>\n </ul>", |
| 7123 | + "smithy.api#documentation": "<p>What WAF should do if the headers determined by your match scope are more numerous or larger than WAF can inspect. \n WAF does not support inspecting the entire contents of request headers \n when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers\n and at most 8 KB of header contents to WAF. </p>\n <p>The options for oversize handling are the following:</p>\n <ul>\n <li>\n <p>\n <code>CONTINUE</code> - Inspect the available headers normally, according to the rule inspection criteria. </p>\n </li>\n <li>\n <p>\n <code>MATCH</code> - Treat the web request as matching the rule statement. WAF\n applies the rule action to the request.</p>\n </li>\n <li>\n <p>\n <code>NO_MATCH</code> - Treat the web request as not matching the rule\n statement.</p>\n </li>\n </ul>", |
7081 | 7124 | "smithy.api#required": {} |
7082 | 7125 | } |
7083 | 7126 | } |
|
10141 | 10184 | "traits": { |
10142 | 10185 | "smithy.api#documentation": "<p>Use the request's JA4 fingerprint as an aggregate key. If you use a single\n JA4 fingerprint as your custom key, then each value fully defines an aggregation instance. </p>" |
10143 | 10186 | } |
| 10187 | + }, |
| 10188 | + "ASN": { |
| 10189 | + "target": "com.amazonaws.wafv2#RateLimitAsn", |
| 10190 | + "traits": { |
| 10191 | + "smithy.api#documentation": "<p>Use an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key. \n Each distinct ASN contributes to the aggregation instance. </p>" |
| 10192 | + } |
10144 | 10193 | } |
10145 | 10194 | }, |
10146 | 10195 | "traits": { |
|
10188 | 10237 | } |
10189 | 10238 | } |
10190 | 10239 | }, |
| 10240 | + "com.amazonaws.wafv2#RateLimitAsn": { |
| 10241 | + "type": "structure", |
| 10242 | + "members": {}, |
| 10243 | + "traits": { |
| 10244 | + "smithy.api#documentation": "<p>Specifies an Autonomous System Number (ASN) derived from the request's originating or forwarded IP address as an aggregate key for a rate-based rule. \n Each distinct ASN contributes to the aggregation instance. \n If you use a single ASN as your custom key, then each ASN fully defines an aggregation instance. </p>" |
| 10245 | + } |
| 10246 | + }, |
10191 | 10247 | "com.amazonaws.wafv2#RateLimitCookie": { |
10192 | 10248 | "type": "structure", |
10193 | 10249 | "members": { |
|
11718 | 11774 | "traits": { |
11719 | 11775 | "smithy.api#documentation": "<p>A rule statement used to search web request components for a match against a single regular expression. </p>" |
11720 | 11776 | } |
| 11777 | + }, |
| 11778 | + "AsnMatchStatement": { |
| 11779 | + "target": "com.amazonaws.wafv2#AsnMatchStatement", |
| 11780 | + "traits": { |
| 11781 | + "smithy.api#documentation": "<p>A rule statement that inspects web traffic based on the Autonomous System Number (ASN) associated with the request's IP address.</p>\n <p>For additional details, see <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-asn-match.html\">ASN match rule statement</a> in the <a href=\"https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html\">WAF Developer Guide</a>. </p>" |
| 11782 | + } |
11721 | 11783 | } |
11722 | 11784 | }, |
11723 | 11785 | "traits": { |
|
0 commit comments