Skip to content

Commit cd207db

Browse files
author
AWS
committed
AWS WAFV2 Update: You can now delete an API key that you've created for use with your CAPTCHA JavaScript integration API.
1 parent d10ddf6 commit cd207db

File tree

2 files changed

+48
-3
lines changed

2 files changed

+48
-3
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS WAFV2",
4+
"contributor": "",
5+
"description": "You can now delete an API key that you've created for use with your CAPTCHA JavaScript integration API."
6+
}

services/wafv2/src/main/resources/codegen-resources/service-2.json

Lines changed: 42 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,23 @@
156156
],
157157
"documentation":"<p>Creates a <a>WebACL</a> per the specifications provided.</p> <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has a statement that defines what to look for in web requests and an action that WAF applies to requests that match the statement. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, an Amazon Cognito user pool, an App Runner service, or an Amazon Web Services Verified Access instance. </p>"
158158
},
159+
"DeleteAPIKey":{
160+
"name":"DeleteAPIKey",
161+
"http":{
162+
"method":"POST",
163+
"requestUri":"/"
164+
},
165+
"input":{"shape":"DeleteAPIKeyRequest"},
166+
"output":{"shape":"DeleteAPIKeyResponse"},
167+
"errors":[
168+
{"shape":"WAFInternalErrorException"},
169+
{"shape":"WAFNonexistentItemException"},
170+
{"shape":"WAFOptimisticLockException"},
171+
{"shape":"WAFInvalidParameterException"},
172+
{"shape":"WAFInvalidOperationException"}
173+
],
174+
"documentation":"<p>Deletes the specified API key. </p> <p>After you delete a key, it can take up to 24 hours for WAF to disallow use of the key in all regions. </p>"
175+
},
159176
"DeleteFirewallManagerRuleGroups":{
160177
"name":"DeleteFirewallManagerRuleGroups",
161178
"http":{
@@ -1680,7 +1697,7 @@
16801697
},
16811698
"TokenDomains":{
16821699
"shape":"APIKeyTokenDomains",
1683-
"documentation":"<p>The client application domains that you want to use this API key for. </p> <p>Example JSON: <code>\"TokenDomains\": [\"abc.com\", \"store.abc.com\"]</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>usa.gov</code> or <code>co.uk</code> as token domains.</p>"
1700+
"documentation":"<p>The client application domains that you want to use this API key for. </p> <p>Example JSON: <code>\"TokenDomains\": [\"abc.com\", \"store.abc.com\"]</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>"
16841701
}
16851702
}
16861703
},
@@ -1879,7 +1896,7 @@
18791896
},
18801897
"TokenDomains":{
18811898
"shape":"TokenDomains",
1882-
"documentation":"<p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p> <p>Example JSON: <code>\"TokenDomains\": { \"mywebsite.com\", \"myotherwebsite.com\" }</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>usa.gov</code> or <code>co.uk</code> as token domains.</p>"
1899+
"documentation":"<p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p> <p>Example JSON: <code>\"TokenDomains\": { \"mywebsite.com\", \"myotherwebsite.com\" }</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>"
18831900
},
18841901
"AssociationConfig":{
18851902
"shape":"AssociationConfig",
@@ -2005,6 +2022,28 @@
20052022
},
20062023
"documentation":"<p>In a <a>WebACL</a>, this is the action that you want WAF to perform when a web request doesn't match any of the rules in the <code>WebACL</code>. The default action must be a terminating action.</p>"
20072024
},
2025+
"DeleteAPIKeyRequest":{
2026+
"type":"structure",
2027+
"required":[
2028+
"Scope",
2029+
"APIKey"
2030+
],
2031+
"members":{
2032+
"Scope":{
2033+
"shape":"Scope",
2034+
"documentation":"<p>Specifies whether this is for an Amazon CloudFront distribution or for a regional application. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, an App Runner service, or an Amazon Web Services Verified Access instance. </p> <p>To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows: </p> <ul> <li> <p>CLI - Specify the Region when you use the CloudFront scope: <code>--scope=CLOUDFRONT --region=us-east-1</code>. </p> </li> <li> <p>API and SDKs - For all calls, use the Region endpoint us-east-1. </p> </li> </ul>"
2035+
},
2036+
"APIKey":{
2037+
"shape":"APIKey",
2038+
"documentation":"<p>The encrypted API key that you want to delete. </p>"
2039+
}
2040+
}
2041+
},
2042+
"DeleteAPIKeyResponse":{
2043+
"type":"structure",
2044+
"members":{
2045+
}
2046+
},
20082047
"DeleteFirewallManagerRuleGroupsRequest":{
20092048
"type":"structure",
20102049
"required":[
@@ -6054,7 +6093,7 @@
60546093
},
60556094
"TokenDomains":{
60566095
"shape":"TokenDomains",
6057-
"documentation":"<p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p> <p>Example JSON: <code>\"TokenDomains\": { \"mywebsite.com\", \"myotherwebsite.com\" }</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>usa.gov</code> or <code>co.uk</code> as token domains.</p>"
6096+
"documentation":"<p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p> <p>Example JSON: <code>\"TokenDomains\": { \"mywebsite.com\", \"myotherwebsite.com\" }</code> </p> <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>"
60586097
},
60596098
"AssociationConfig":{
60606099
"shape":"AssociationConfig",

0 commit comments

Comments
 (0)