Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@datafire/amazonaws_waf_regional
Advanced tools
Client library for AWS WAF Regional
npm install --save @datafire/amazonaws_waf_regional
let amazonaws_waf_regional = require('@datafire/amazonaws_waf_regional').create({
accessKeyId: "",
secretAccessKey: "",
region: ""
});
amazonaws_waf_regional.AssociateWebACL({
"WebACLId": "",
"ResourceArn": ""
}).then(data => {
console.log(data);
});
This is the AWS WAF Regional API Reference for using AWS WAF with Elastic Load Balancing (ELB) Application Load Balancers. The AWS WAF actions and data types listed in the reference are available for protecting Application Load Balancers. You can use these actions and data types by means of the endpoints listed in AWS Regions and Endpoints. This guide is for developers who need detailed information about the AWS WAF API actions, data types, and errors. For detailed information about AWS WAF features and an overview of how to use the AWS WAF API, see the AWS WAF Developer Guide.
amazonaws_waf_regional.AssociateWebACL({
"WebACLId": "",
"ResourceArn": ""
}, context)
object
amazonaws_waf_regional.CreateByteMatchSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateGeoMatchSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateIPSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateRateBasedRule({
"Name": "",
"MetricName": "",
"RateKey": "",
"RateLimit": 0,
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateRegexMatchSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateRegexPatternSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateRule({
"Name": "",
"MetricName": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateRuleGroup({
"Name": "",
"MetricName": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateSizeConstraintSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateSqlInjectionMatchSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateWebACL({
"Name": "",
"MetricName": "",
"DefaultAction": {
"Type": ""
},
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.CreateXssMatchSet({
"Name": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteByteMatchSet({
"ByteMatchSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteGeoMatchSet({
"GeoMatchSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteIPSet({
"IPSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteRateBasedRule({
"RuleId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteRegexMatchSet({
"RegexMatchSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteRegexPatternSet({
"RegexPatternSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteRule({
"RuleId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteRuleGroup({
"RuleGroupId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteSizeConstraintSet({
"SizeConstraintSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteSqlInjectionMatchSet({
"SqlInjectionMatchSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteWebACL({
"WebACLId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DeleteXssMatchSet({
"XssMatchSetId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.DisassociateWebACL({
"ResourceArn": ""
}, context)
object
amazonaws_waf_regional.GetByteMatchSet({
"ByteMatchSetId": ""
}, context)
object
amazonaws_waf_regional.GetChangeToken({}, context)
object
amazonaws_waf_regional.GetChangeTokenStatus({
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.GetGeoMatchSet({
"GeoMatchSetId": ""
}, context)
object
amazonaws_waf_regional.GetIPSet({
"IPSetId": ""
}, context)
object
amazonaws_waf_regional.GetRateBasedRule({
"RuleId": ""
}, context)
object
amazonaws_waf_regional.GetRateBasedRuleManagedKeys({
"RuleId": ""
}, context)
object
amazonaws_waf_regional.GetRegexMatchSet({
"RegexMatchSetId": ""
}, context)
object
amazonaws_waf_regional.GetRegexPatternSet({
"RegexPatternSetId": ""
}, context)
object
amazonaws_waf_regional.GetRule({
"RuleId": ""
}, context)
object
amazonaws_waf_regional.GetRuleGroup({
"RuleGroupId": ""
}, context)
object
amazonaws_waf_regional.GetSampledRequests({
"WebAclId": "",
"RuleId": "",
"TimeWindow": {
"StartTime": "",
"EndTime": ""
},
"MaxItems": 0
}, context)
object
amazonaws_waf_regional.GetSizeConstraintSet({
"SizeConstraintSetId": ""
}, context)
object
amazonaws_waf_regional.GetSqlInjectionMatchSet({
"SqlInjectionMatchSetId": ""
}, context)
object
amazonaws_waf_regional.GetWebACL({
"WebACLId": ""
}, context)
object
amazonaws_waf_regional.GetWebACLForResource({
"ResourceArn": ""
}, context)
object
amazonaws_waf_regional.GetXssMatchSet({
"XssMatchSetId": ""
}, context)
object
amazonaws_waf_regional.ListActivatedRulesInRuleGroup({}, context)
object
amazonaws_waf_regional.ListByteMatchSets({}, context)
object
amazonaws_waf_regional.ListGeoMatchSets({}, context)
object
amazonaws_waf_regional.ListIPSets({}, context)
object
amazonaws_waf_regional.ListRateBasedRules({}, context)
object
amazonaws_waf_regional.ListRegexMatchSets({}, context)
object
amazonaws_waf_regional.ListRegexPatternSets({}, context)
object
amazonaws_waf_regional.ListResourcesForWebACL({
"WebACLId": ""
}, context)
object
amazonaws_waf_regional.ListRuleGroups({}, context)
object
amazonaws_waf_regional.ListRules({}, context)
object
amazonaws_waf_regional.ListSizeConstraintSets({}, context)
object
amazonaws_waf_regional.ListSqlInjectionMatchSets({}, context)
object
amazonaws_waf_regional.ListSubscribedRuleGroups({}, context)
object
amazonaws_waf_regional.ListWebACLs({}, context)
object
amazonaws_waf_regional.ListXssMatchSets({}, context)
object
amazonaws_waf_regional.UpdateByteMatchSet({
"ByteMatchSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateGeoMatchSet({
"GeoMatchSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateIPSet({
"IPSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateRateBasedRule({
"RuleId": "",
"ChangeToken": "",
"Updates": [],
"RateLimit": 0
}, context)
object
amazonaws_waf_regional.UpdateRegexMatchSet({
"RegexMatchSetId": "",
"Updates": [],
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.UpdateRegexPatternSet({
"RegexPatternSetId": "",
"Updates": [],
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.UpdateRule({
"RuleId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateRuleGroup({
"RuleGroupId": "",
"Updates": [],
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.UpdateSizeConstraintSet({
"SizeConstraintSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateSqlInjectionMatchSet({
"SqlInjectionMatchSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
amazonaws_waf_regional.UpdateWebACL({
"WebACLId": "",
"ChangeToken": ""
}, context)
object
amazonaws_waf_regional.UpdateXssMatchSet({
"XssMatchSetId": "",
"ChangeToken": "",
"Updates": []
}, context)
object
string
object
: The ActivatedRule
object in an UpdateWebACL request specifies a Rule
that you want to insert or delete, the priority of the Rule
in the WebACL
, and the action that you want AWS WAF to take when a web request matches the Rule
(ALLOW
, BLOCK
, or COUNT
).
To specify whether to insert or delete a Rule
, use the Action
parameter in the WebACLUpdate data type.
array
object
object
object
: In a GetByteMatchSet request, ByteMatchSet
is a complex type that contains the ByteMatchSetId
and Name
of a ByteMatchSet
, and the values that you specified when you updated the ByteMatchSet
.
A complex type that contains ByteMatchTuple
objects, which specify the parts of web requests that you want AWS WAF to inspect and the values that you want AWS WAF to search for. If a ByteMatchSet
contains more than one ByteMatchTuple
object, a request needs to match the settings in only one ByteMatchTuple
to be considered a match.
array
object
: Returned by ListByteMatchSets. Each ByteMatchSetSummary
object includes the Name
and ByteMatchSetId
for one ByteMatchSet.
object
: In an UpdateByteMatchSet request, ByteMatchSetUpdate
specifies whether to insert or delete a ByteMatchTuple and includes the settings for the ByteMatchTuple
.
array
string
object
: The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings.
array
string
(values: INSERT, DELETE)string
string
(values: PROVISIONED, PENDING, INSYNC)string
(values: EQ, NE, LE, LT, GE, GT)string
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
: A request to create a SqlInjectionMatchSet.
object
: The response to a CreateSqlInjectionMatchSet
request.
object
object
object
: A request to create an XssMatchSet.
object
: The response to a CreateXssMatchSet
request.
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
: A request to delete a SqlInjectionMatchSet from AWS WAF.
object
: The response to a request to delete a SqlInjectionMatchSet from AWS WAF.
object
object
object
: A request to delete an XssMatchSet from AWS WAF.
object
: The response to a request to delete an XssMatchSet from AWS WAF.
object
object
object
: Specifies where in a web request to look for TargetString
.
object
: The country from which web requests originate that you want AWS WAF to search for.
string
(values: Country)string
(values: AF, AX, AL, DZ, AS, AD, AO, AI, AQ, AG, AR, AM, AW, AU, AT, AZ, BS, BH, BD, BB, BY, BE, BZ, BJ, BM, BT, BO, BQ, BA, BW, BV, BR, IO, BN, BG, BF, BI, KH, CM, CA, CV, KY, CF, TD, CL, CN, CX, CC, CO, KM, CG, CD, CK, CR, CI, HR, CU, CW, CY, CZ, DK, DJ, DM, DO, EC, EG, SV, GQ, ER, EE, ET, FK, FO, FJ, FI, FR, GF, PF, TF, GA, GM, GE, DE, GH, GI, GR, GL, GD, GP, GU, GT, GG, GN, GW, GY, HT, HM, VA, HN, HK, HU, IS, IN, ID, IR, IQ, IE, IM, IL, IT, JM, JP, JE, JO, KZ, KE, KI, KP, KR, KW, KG, LA, LV, LB, LS, LR, LY, LI, LT, LU, MO, MK, MG, MW, MY, MV, ML, MT, MH, MQ, MR, MU, YT, MX, FM, MD, MC, MN, ME, MS, MA, MZ, MM, NA, NR, NP, NL, NC, NZ, NI, NE, NG, NU, NF, MP, NO, OM, PK, PW, PS, PA, PG, PY, PE, PH, PN, PL, PT, PR, QA, RE, RO, RU, RW, BL, SH, KN, LC, MF, PM, VC, WS, SM, ST, SA, SN, RS, SC, SL, SG, SX, SK, SI, SB, SO, ZA, GS, SS, ES, LK, SD, SR, SJ, SZ, SE, CH, SY, TW, TJ, TZ, TH, TL, TG, TK, TO, TT, TN, TR, TM, TC, TV, UG, UA, AE, GB, US, UM, UY, UZ, VU, VE, VN, VG, VI, WF, EH, YE, ZM, ZW)array
object
: Contains one or more countries that AWS WAF will search for.
array
object
: Contains the identifier and the name of the GeoMatchSet
.
object
: Specifies the type of update to perform to an GeoMatchSet with UpdateGeoMatchSet.
array
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
integer
object
object
object
object
object
: A request to get a SqlInjectionMatchSet.
object
: The response to a GetSqlInjectionMatchSet request.
object
object
object
object
object
: A request to get an XssMatchSet.
object
: The response to a GetXssMatchSet request.
object
: The response from a GetSampledRequests request includes an HTTPHeader
complex type that appears as Headers
in the response syntax. HTTPHeader
contains the names and values of all of the headers that appear in one of the web requests that were returned by GetSampledRequests
.
array
string
object
: The response from a GetSampledRequests request includes an HTTPRequest
complex type that appears as Request
in the response syntax. HTTPRequest
contains information about one of the web requests that were returned by GetSampledRequests
.
string
string
string
object
: Contains one or more IP addresses or blocks of IP addresses specified in Classless Inter-Domain Routing (CIDR) notation. AWS WAF supports /8, /16, /24, and /32 IP address ranges for IPv4, and /24, /32, /48, /56, /64 and /128 for IPv6.
To specify an individual IP address, you specify the four-part IP address followed by a /32
, for example, 192.0.2.0/31. To block a range of IP addresses, you can specify a /128
, /64
, /56
, /48
, /32
, /24
, /16
, or /8
CIDR. For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
object
: Specifies the IP address type (IPV4
or IPV6
) and the IP address range (in CIDR format) that web requests originate from.
string
(values: IPV4, IPV6)string
array
array
object
: Contains the identifier and the name of the IPSet
.
object
: Specifies the type of update to perform to an IPSet with UpdateIPSet.
array
string
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
: A request to list the SqlInjectionMatchSet objects created by the current AWS account.
object
: The response to a ListSqlInjectionMatchSets request.
object
object
object
object
object
: A request to list the XssMatchSet objects created by the current AWS account.
object
: The response to a ListXssMatchSets request.
string
array
string
string
(values: URI, QUERY_STRING, HEADER, METHOD, BODY)string
boolean
string
integer
string
(values: CHANGE_ACTION, WAF_ACTION, WAF_OVERRIDE_ACTION, PREDICATE_TYPE, IPSET_TYPE, BYTE_MATCH_FIELD_TYPE, SQL_INJECTION_MATCH_FIELD_TYPE, BYTE_MATCH_TEXT_TRANSFORMATION, BYTE_MATCH_POSITIONAL_CONSTRAINT, SIZE_CONSTRAINT_COMPARISON_OPERATOR, GEO_MATCH_LOCATION_TYPE, GEO_MATCH_LOCATION_VALUE, RATE_KEY, RULE_TYPE, NEXT_MARKER)string
string
(values: INVALID_OPTION, ILLEGAL_COMBINATION)integer
string
(values: EXACTLY, STARTS_WITH, ENDS_WITH, CONTAINS, CONTAINS_WORD)object
: Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a Rule
and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44.
string
(values: IPMatch, ByteMatch, SqlInjectionMatch, GeoMatch, SizeConstraint, XssMatch, RegexMatch)array
object
: A RateBasedRule
is identical to a regular Rule, with one addition: a RateBasedRule
counts the number of requests that arrive from a specified IP address every five minutes. For example, based on recent requests that you've seen from an attacker, you might create a RateBasedRule
that includes the following conditions:
The requests come from 192.0.2.44.
They contain the value BadBot
in the User-Agent
header.
In the rule, you also define the rate limit as 15,000.
Requests that meet both of these conditions and exceed 15,000 requests every five minutes trigger the rule's action (block or count), which is defined in the web ACL.
string
(values: IP)integer
object
: In a GetRegexMatchSet request, RegexMatchSet
is a complex type that contains the RegexMatchSetId
and Name
of a RegexMatchSet
, and the values that you specified when you updated the RegexMatchSet
.
The values are contained in a RegexMatchTuple
object, which specify the parts of web requests that you want AWS WAF to inspect and the values that you want AWS WAF to search for. If a RegexMatchSet
contains more than one RegexMatchTuple
object, a request needs to match the settings in only one ByteMatchTuple
to be considered a match.
array
object
: Returned by ListRegexMatchSets. Each RegexMatchSetSummary
object includes the Name
and RegexMatchSetId
for one RegexMatchSet.
object
: In an UpdateRegexMatchSet request, RegexMatchSetUpdate
specifies whether to insert or delete a RegexMatchTuple and includes the settings for the RegexMatchTuple
.
array
object
: The regular expression pattern that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. Each RegexMatchTuple
object contains:
The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent
header.
The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet.
Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string.
array
object
: The RegexPatternSet
specifies the regular expression (regex) pattern that you want AWS WAF to search for, such as B[a@]dB[o0]t
. You can then configure AWS WAF to reject those requests.
array
object
: Returned by ListRegexPatternSets. Each RegexPatternSetSummary
object includes the Name
and RegexPatternSetId
for one RegexPatternSet.
object
: In an UpdateRegexPatternSet request, RegexPatternSetUpdate
specifies whether to insert or delete a RegexPatternString
and includes the settings for the RegexPatternString
.
array
string
array
string
array
string
string
object
: A combination of ByteMatchSet, IPSet, and/or SqlInjectionMatchSet objects that identify the web requests that you want to allow, block, or count. For example, you might create a Rule
that includes the following predicates:
An IPSet
that causes AWS WAF to search for web requests that originate from the IP address 192.0.2.44
A ByteMatchSet
that causes AWS WAF to search for web requests for which the value of the User-Agent
header is BadBot
.
To match the settings in this Rule
, a request must originate from 192.0.2.44
AND include a User-Agent
header for which the value is BadBot
.
object
: A collection of predefined rules that you can add to a web ACL.
Rule groups are subject to the following limits:
Three rule groups per account. You can request an increase to this limit by contacting customer support.
One rule group per web ACL.
Ten rules per rule group.
array
object
: Contains the identifier and the friendly name or description of the RuleGroup
.
object
: Specifies an ActivatedRule
and indicates whether you want to add it to a RuleGroup
or delete it from a RuleGroup
.
array
integer
array
object
: Contains the identifier and the friendly name or description of the Rule
.
object
: Specifies a Predicate
(such as an IPSet
) and indicates whether you want to add it to a Rule
or delete it from a Rule
.
array
integer
object
: The response from a GetSampledRequests request includes a SampledHTTPRequests
complex type that appears as SampledRequests
in the response syntax. SampledHTTPRequests
contains one SampledHTTPRequest
object for each web request that is returned by GetSampledRequests
.
array
integer
object
: Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size
, ComparisonOperator
, and FieldToMatch
to build an expression in the form of "Size
ComparisonOperator
size in bytes of FieldToMatch
". If that expression is true, the SizeConstraint
is considered to match.
object
: A complex type that contains SizeConstraint
objects, which specify the parts of web requests that you want AWS WAF to inspect the size of. If a SizeConstraintSet
contains more than one SizeConstraint
object, a request only needs to match one constraint to be considered a match.
array
object
: The Id
and Name
of a SizeConstraintSet
.
object
: Specifies the part of a web request that you want to inspect the size of and indicates whether you want to add the specification to a SizeConstraintSet or delete it from a SizeConstraintSet
.
array
array
object
: A complex type that contains SqlInjectionMatchTuple
objects, which specify the parts of web requests that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. If a SqlInjectionMatchSet
contains more than one SqlInjectionMatchTuple
object, a request needs to include snippets of SQL code in only one of the specified parts of the request to be considered a match.
array
object
: The Id
and Name
of a SqlInjectionMatchSet
.
object
: Specifies the part of a web request that you want to inspect for snippets of malicious SQL code and indicates whether you want to add the specification to a SqlInjectionMatchSet or delete it from a SqlInjectionMatchSet
.
array
object
: Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
array
array
object
: A summary of the rule groups you are subscribed to.
string
(values: NONE, COMPRESS_WHITE_SPACE, HTML_ENTITY_DECODE, LOWERCASE, CMD_LINE, URL_DECODE)object
: In a GetSampledRequests request, the StartTime
and EndTime
objects specify the time range for which you want AWS WAF to return a sample of web requests.
In a GetSampledRequests response, the StartTime
and EndTime
objects specify the time range for which AWS WAF actually returned a sample of web requests. AWS WAF gets the specified number of requests from among the first 5,000 requests that your AWS resource receives during the specified time period. If your resource receives more than 5,000 requests during that period, AWS WAF stops sampling after the 5,000th request. In that case, EndTime
is the time that AWS WAF received the 5,000th request.
string
string
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
object
: A request to update a SqlInjectionMatchSet.
object
: The response to an UpdateSqlInjectionMatchSets request.
object
object
object
: A request to update an XssMatchSet.
object
: The response to an UpdateXssMatchSets request.
object
: The name specified is invalid.
object
: The operation failed because of a system problem, even though the request was valid. Retry your request.
object
: The operation failed because you tried to create, update, or delete an object by using an invalid account identifier.object
: The operation failed because there was nothing to do. For example:
You tried to remove a Rule
from a WebACL
, but the Rule
isn't in the specified WebACL
.
You tried to remove an IP address from an IPSet
, but the IP address isn't in the specified IPSet
.
You tried to remove a ByteMatchTuple
from a ByteMatchSet
, but the ByteMatchTuple
isn't in the specified WebACL
.
You tried to add a Rule
to a WebACL
, but the Rule
already exists in the specified WebACL
.
You tried to add an IP address to an IPSet
, but the IP address already exists in the specified IPSet
.
You tried to add a ByteMatchTuple
to a ByteMatchSet
, but the ByteMatchTuple
already exists in the specified WebACL
.
object
: The operation failed because AWS WAF didn't recognize a parameter in the request. For example:
You specified an invalid parameter name.
You specified an invalid value.
You tried to update an object (ByteMatchSet
, IPSet
, Rule
, or WebACL
) using an action other than INSERT
or DELETE
.
You tried to create a WebACL
with a DefaultAction
Type
other than ALLOW
, BLOCK
, or COUNT
.
You tried to create a RateBasedRule
with a RateKey
value other than IP
.
You tried to update a WebACL
with a WafAction
Type
other than ALLOW
, BLOCK
, or COUNT
.
You tried to update a ByteMatchSet
with a FieldToMatch
Type
other than HEADER, METHOD, QUERY_STRING, URI, or BODY.
You tried to update a ByteMatchSet
with a Field
of HEADER
but no value for Data
.
Your request references an ARN that is malformed, or corresponds to a resource with which a web ACL cannot be associated.
object
: The regular expression (regex) you specified in RegexPatternString
is invalid.
object
: The operation exceeds a resource limit, for example, the maximum number of WebACL
objects that you can create for an AWS account. For more information, see Limits in the AWS WAF Developer Guide.
object
: The operation failed because you tried to delete an object that isn't empty. For example:
You tried to delete a WebACL
that still contains one or more Rule
objects.
You tried to delete a Rule
that still contains one or more ByteMatchSet
objects or other predicates.
You tried to delete a ByteMatchSet
that contains one or more ByteMatchTuple
objects.
You tried to delete an IPSet
that references one or more IP addresses.
object
: The operation failed because you tried to add an object to or delete an object from another object that doesn't exist. For example:
You tried to add a Rule
to or delete a Rule
from a WebACL
that doesn't exist.
You tried to add a ByteMatchSet
to or delete a ByteMatchSet
from a Rule
that doesn't exist.
You tried to add an IP address to or delete an IP address from an IPSet
that doesn't exist.
You tried to add a ByteMatchTuple
to or delete a ByteMatchTuple
from a ByteMatchSet
that doesn't exist.
object
: The operation failed because the referenced object doesn't exist.
object
: The operation failed because you tried to delete an object that is still in use. For example:
You tried to delete a ByteMatchSet
that is still referenced by a Rule
.
You tried to delete a Rule
that is still referenced by a WebACL
.
object
: The operation failed because you tried to create, update, or delete an object by using a change token that has already been used.
object
: The specified subscription does not exist.
object
: The operation failed because the entity referenced is temporarily unavailable. Retry your request.
object
: For the action that is associated with a rule in a WebACL
, specifies the action that you want AWS WAF to perform when a web request matches all of the conditions in a rule. For the default action in a WebACL
, specifies the action that you want AWS WAF to take when a web request doesn't match all of the conditions in any of the rules in a WebACL
.
string
(values: BLOCK, ALLOW, COUNT)object
: The action to take if any rule within the RuleGroup
matches a request.
string
(values: NONE, COUNT)string
(values: REGULAR, RATE_BASED, GROUP)object
: Contains the Rules
that identify the requests that you want to allow, block, or count. In a WebACL
, you also specify a default action (ALLOW
or BLOCK
), and the action for each Rule
that you add to a WebACL
, for example, block requests from specified IP addresses or block requests from specified referrers. You also associate the WebACL
with a CloudFront distribution to identify the requests that you want AWS WAF to filter. If you add more than one Rule
to a WebACL
, a request needs to match only one of the specifications to be allowed, blocked, or counted. For more information, see UpdateWebACL.
array
object
: Contains the identifier and the name or description of the WebACL.
object
: Specifies whether to insert a Rule
into or delete a Rule
from a WebACL
.
array
object
: A complex type that contains XssMatchTuple
objects, which specify the parts of web requests that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. If a XssMatchSet
contains more than one XssMatchTuple
object, a request needs to include cross-site scripting attacks in only one of the specified parts of the request to be considered a match.
array
object
: The Id
and Name
of an XssMatchSet
.
object
: Specifies the part of a web request that you want to inspect for cross-site scripting attacks and indicates whether you want to add the specification to an XssMatchSet or delete it from an XssMatchSet
.
array
object
: Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header.
array
string
FAQs
DataFire integration for AWS WAF Regional
The npm package @datafire/amazonaws_waf_regional receives a total of 0 weekly downloads. As such, @datafire/amazonaws_waf_regional popularity was classified as not popular.
We found that @datafire/amazonaws_waf_regional demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.