PNG  IHDR;IDATxܻn0K )(pA 7LeG{ §㻢|ذaÆ 6lذaÆ 6lذaÆ 6lom$^yذag5bÆ 6lذaÆ 6lذa{ 6lذaÆ `}HFkm,mӪôô! x|'ܢ˟;E:9&ᶒ}{v]n&6 h_tڠ͵-ҫZ;Z$.Pkž)!o>}leQfJTu іچ\X=8Rن4`Vwl>nG^is"ms$ui?wbs[m6K4O.4%/bC%t Mז -lG6mrz2s%9s@-k9=)kB5\+͂Zsٲ Rn~GRC wIcIn7jJhۛNCS|j08yiHKֶۛkɈ+;SzL/F*\Ԕ#"5m2[S=gnaPeғL lذaÆ 6l^ḵaÆ 6lذaÆ 6lذa; _ذaÆ 6lذaÆ 6lذaÆ RIENDB` package Paws::WAFV2; use Moose; sub service { 'wafv2' } sub signing_name { 'wafv2' } sub version { '2019-07-29' } sub target_prefix { 'AWSWAF_20190729' } sub json_version { "1.1" } has max_attempts => (is => 'ro', isa => 'Int', default => 5); has retry => (is => 'ro', isa => 'HashRef', default => sub { { base => 'rand', type => 'exponential', growth_factor => 2 } }); has retriables => (is => 'ro', isa => 'ArrayRef', default => sub { [ ] }); with 'Paws::API::Caller', 'Paws::API::EndpointResolver', 'Paws::Net::V4Signature', 'Paws::Net::JsonCaller'; sub AssociateWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::AssociateWebACL', @_); return $self->caller->do_call($self, $call_object); } sub CheckCapacity { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::CheckCapacity', @_); return $self->caller->do_call($self, $call_object); } sub CreateIPSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::CreateIPSet', @_); return $self->caller->do_call($self, $call_object); } sub CreateRegexPatternSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::CreateRegexPatternSet', @_); return $self->caller->do_call($self, $call_object); } sub CreateRuleGroup { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::CreateRuleGroup', @_); return $self->caller->do_call($self, $call_object); } sub CreateWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::CreateWebACL', @_); return $self->caller->do_call($self, $call_object); } sub DeleteFirewallManagerRuleGroups { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteFirewallManagerRuleGroups', @_); return $self->caller->do_call($self, $call_object); } sub DeleteIPSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteIPSet', @_); return $self->caller->do_call($self, $call_object); } sub DeleteLoggingConfiguration { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteLoggingConfiguration', @_); return $self->caller->do_call($self, $call_object); } sub DeletePermissionPolicy { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeletePermissionPolicy', @_); return $self->caller->do_call($self, $call_object); } sub DeleteRegexPatternSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteRegexPatternSet', @_); return $self->caller->do_call($self, $call_object); } sub DeleteRuleGroup { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteRuleGroup', @_); return $self->caller->do_call($self, $call_object); } sub DeleteWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DeleteWebACL', @_); return $self->caller->do_call($self, $call_object); } sub DescribeManagedRuleGroup { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DescribeManagedRuleGroup', @_); return $self->caller->do_call($self, $call_object); } sub DisassociateWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::DisassociateWebACL', @_); return $self->caller->do_call($self, $call_object); } sub GetIPSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetIPSet', @_); return $self->caller->do_call($self, $call_object); } sub GetLoggingConfiguration { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetLoggingConfiguration', @_); return $self->caller->do_call($self, $call_object); } sub GetPermissionPolicy { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetPermissionPolicy', @_); return $self->caller->do_call($self, $call_object); } sub GetRateBasedStatementManagedKeys { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetRateBasedStatementManagedKeys', @_); return $self->caller->do_call($self, $call_object); } sub GetRegexPatternSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetRegexPatternSet', @_); return $self->caller->do_call($self, $call_object); } sub GetRuleGroup { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetRuleGroup', @_); return $self->caller->do_call($self, $call_object); } sub GetSampledRequests { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetSampledRequests', @_); return $self->caller->do_call($self, $call_object); } sub GetWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetWebACL', @_); return $self->caller->do_call($self, $call_object); } sub GetWebACLForResource { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::GetWebACLForResource', @_); return $self->caller->do_call($self, $call_object); } sub ListAvailableManagedRuleGroups { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListAvailableManagedRuleGroups', @_); return $self->caller->do_call($self, $call_object); } sub ListIPSets { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListIPSets', @_); return $self->caller->do_call($self, $call_object); } sub ListLoggingConfigurations { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListLoggingConfigurations', @_); return $self->caller->do_call($self, $call_object); } sub ListRegexPatternSets { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListRegexPatternSets', @_); return $self->caller->do_call($self, $call_object); } sub ListResourcesForWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListResourcesForWebACL', @_); return $self->caller->do_call($self, $call_object); } sub ListRuleGroups { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListRuleGroups', @_); return $self->caller->do_call($self, $call_object); } sub ListTagsForResource { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListTagsForResource', @_); return $self->caller->do_call($self, $call_object); } sub ListWebACLs { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::ListWebACLs', @_); return $self->caller->do_call($self, $call_object); } sub PutLoggingConfiguration { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::PutLoggingConfiguration', @_); return $self->caller->do_call($self, $call_object); } sub PutPermissionPolicy { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::PutPermissionPolicy', @_); return $self->caller->do_call($self, $call_object); } sub TagResource { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::TagResource', @_); return $self->caller->do_call($self, $call_object); } sub UntagResource { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::UntagResource', @_); return $self->caller->do_call($self, $call_object); } sub UpdateIPSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::UpdateIPSet', @_); return $self->caller->do_call($self, $call_object); } sub UpdateRegexPatternSet { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::UpdateRegexPatternSet', @_); return $self->caller->do_call($self, $call_object); } sub UpdateRuleGroup { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::UpdateRuleGroup', @_); return $self->caller->do_call($self, $call_object); } sub UpdateWebACL { my $self = shift; my $call_object = $self->new_with_coercions('Paws::WAFV2::UpdateWebACL', @_); return $self->caller->do_call($self, $call_object); } sub operations { qw/AssociateWebACL CheckCapacity CreateIPSet CreateRegexPatternSet CreateRuleGroup CreateWebACL DeleteFirewallManagerRuleGroups DeleteIPSet DeleteLoggingConfiguration DeletePermissionPolicy DeleteRegexPatternSet DeleteRuleGroup DeleteWebACL DescribeManagedRuleGroup DisassociateWebACL GetIPSet GetLoggingConfiguration GetPermissionPolicy GetRateBasedStatementManagedKeys GetRegexPatternSet GetRuleGroup GetSampledRequests GetWebACL GetWebACLForResource ListAvailableManagedRuleGroups ListIPSets ListLoggingConfigurations ListRegexPatternSets ListResourcesForWebACL ListRuleGroups ListTagsForResource ListWebACLs PutLoggingConfiguration PutPermissionPolicy TagResource UntagResource UpdateIPSet UpdateRegexPatternSet UpdateRuleGroup UpdateWebACL / } 1; ### main pod documentation begin ### =head1 NAME Paws::WAFV2 - Perl Interface to AWS AWS WAFV2 =head1 SYNOPSIS use Paws; my $obj = Paws->service('WAFV2'); my $res = $obj->Method( Arg1 => $val1, Arg2 => [ 'V1', 'V2' ], # if Arg3 is an object, the HashRef will be used as arguments to the constructor # of the arguments type Arg3 => { Att1 => 'Val1' }, # if Arg4 is an array of objects, the HashRefs will be passed as arguments to # the constructor of the arguments type Arg4 => [ { Att1 => 'Val1' }, { Att1 => 'Val2' } ], ); =head1 DESCRIPTION WAF This is the latest version of the B API, released in November, 2019. The names of the entities that you use to access this API, like endpoints and namespaces, all have the versioning information added, like "V2" or "v2", to distinguish from the prior version. We recommend migrating your resources to this version, because it has a number of significant improvements. If you used WAF prior to this release, you can't use this WAFV2 API to access any WAF resources that you created before. You can access your old rules, web ACLs, and other WAF resources only through the WAF Classic APIs. The WAF Classic APIs have retained the prior names, endpoints, and namespaces. For information, including how to migrate your WAF resources to this version, see the WAF Developer Guide (https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html). WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to Amazon CloudFront, an Amazon API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API. WAF also lets you control access to your content. Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, the Amazon API Gateway REST API, CloudFront distribution, the Application Load Balancer, or the AppSync GraphQL API responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). You also can configure CloudFront to return a custom error page when a request is blocked. This API guide is for developers who need detailed information about WAF API actions, data types, and errors. For detailed information about WAF features and an overview of how to use WAF, see the WAF Developer Guide (https://docs.aws.amazon.com/waf/latest/developerguide/). You can make calls using the endpoints listed in Amazon Web Services Service Endpoints for WAF (https://docs.aws.amazon.com/general/latest/gr/rande.html#waf_region). =over =item * For regional applications, you can use any of the endpoints in the list. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. =item * For Amazon CloudFront applications, you must use the API endpoint listed for US East (N. Virginia): us-east-1. =back Alternatively, you can use one of the Amazon Web Services SDKs to access an API that's tailored to the programming language or platform that you're using. For more information, see Amazon Web Services SDKs (http://aws.amazon.com/tools/#SDKs). We currently provide two versions of the WAF API: this API and the prior versions, the classic WAF APIs. This new API provides the same functionality as the older versions, with the following major improvements: =over =item * You use one API for both global and regional applications. Where you need to distinguish the scope, you specify a C parameter and set it to C or C. =item * You can define a web ACL or rule group with a single call, and update it with a single call. You define all rule specifications in JSON format, and pass them to your rule group or web ACL calls. =item * The limits WAF places on the use of rules more closely reflects the cost of running each type of rule. Rule groups include capacity settings, so you know the maximum cost of a rule group when you use it. =back For the AWS API documentation, see L =head1 METHODS =head2 AssociateWebACL =over =item ResourceArn => Str =item WebACLArn => Str =back Each argument is described in detail in: L Returns: a L instance Associates a web ACL with a regional application resource, to protect the resource. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To associate a web ACL, in the CloudFront call C, set the web ACL ID to the Amazon Resource Name (ARN) of the web ACL. For information, see UpdateDistribution (https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html). =head2 CheckCapacity =over =item Rules => ArrayRef[L] =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Returns the web ACL capacity unit (WCU) requirements for a specified scope and set of rules. You can use this to check the capacity requirements for the rules you want to use in a RuleGroup or WebACL. WAF uses WCUs to calculate and control the operating resources that are used to run your rules, rule groups, and web ACLs. WAF calculates capacity differently for each rule type, to reflect the relative cost of each rule. Simple rules that cost little to run use fewer WCUs than more complex rules that use more processing power. Rule group capacity is fixed at creation, which helps users plan their web ACL WCU usage when they use a rule group. The WCU limit for web ACLs is 1,500. =head2 CreateIPSet =over =item Addresses => ArrayRef[Str|Undef] =item IPAddressVersion => Str =item Name => Str =item Scope => Str =item [Description => Str] =item [Tags => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Creates an IPSet, which you use to identify web requests that originate from specific IP addresses or ranges of IP addresses. For example, if you're receiving a lot of requests from a ranges of IP addresses, you can configure WAF to block them using an IPSet that lists those IP addresses. =head2 CreateRegexPatternSet =over =item Name => Str =item RegularExpressionList => ArrayRef[L] =item Scope => Str =item [Description => Str] =item [Tags => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Creates a RegexPatternSet, which you reference in a RegexPatternSetReferenceStatement, to have WAF inspect a web request component for the specified patterns. =head2 CreateRuleGroup =over =item Capacity => Int =item Name => Str =item Scope => Str =item VisibilityConfig => L =item [CustomResponseBodies => L] =item [Description => Str] =item [Rules => ArrayRef[L]] =item [Tags => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Creates a RuleGroup per the specifications provided. A rule group defines a collection of rules to inspect and control web requests that you can use in a WebACL. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. =head2 CreateWebACL =over =item DefaultAction => L =item Name => Str =item Scope => Str =item VisibilityConfig => L =item [CustomResponseBodies => L] =item [Description => Str] =item [Rules => ArrayRef[L]] =item [Tags => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Creates a WebACL per the specifications provided. A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types Rule, RuleGroup, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API. =head2 DeleteFirewallManagerRuleGroups =over =item WebACLArn => Str =item WebACLLockToken => Str =back Each argument is described in detail in: L Returns: a L instance Deletes all rule groups that are managed by Firewall Manager for the specified web ACL. You can only use this if C is false in the specified WebACL. =head2 DeleteIPSet =over =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Deletes the specified IPSet. =head2 DeleteLoggingConfiguration =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Deletes the LoggingConfiguration from the specified web ACL. =head2 DeletePermissionPolicy =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Permanently deletes an IAM policy from the specified rule group. You must be the owner of the rule group to perform this operation. =head2 DeleteRegexPatternSet =over =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Deletes the specified RegexPatternSet. =head2 DeleteRuleGroup =over =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Deletes the specified RuleGroup. =head2 DeleteWebACL =over =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Deletes the specified WebACL. You can only use this if C is false in the specified WebACL. =head2 DescribeManagedRuleGroup =over =item Name => Str =item Scope => Str =item VendorName => Str =back Each argument is described in detail in: L Returns: a L instance Provides high-level information for a managed rule group, including descriptions of the rules. =head2 DisassociateWebACL =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Disassociates a web ACL from a regional application resource. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To disassociate a web ACL, provide an empty web ACL ID in the CloudFront call C. For information, see UpdateDistribution (https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html). =head2 GetIPSet =over =item Id => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Retrieves the specified IPSet. =head2 GetLoggingConfiguration =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Returns the LoggingConfiguration for the specified web ACL. =head2 GetPermissionPolicy =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Returns the IAM policy that is attached to the specified rule group. You must be the owner of the rule group to perform this operation. =head2 GetRateBasedStatementManagedKeys =over =item RuleName => Str =item Scope => Str =item WebACLId => Str =item WebACLName => Str =back Each argument is described in detail in: L Returns: a L instance Retrieves the keys that are currently blocked by a rate-based rule. The maximum number of managed keys that can be blocked for a single rate-based rule is 10,000. If more than 10,000 addresses exceed the rate limit, those with the highest rates are blocked. =head2 GetRegexPatternSet =over =item Id => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Retrieves the specified RegexPatternSet. =head2 GetRuleGroup =over =item [ARN => Str] =item [Id => Str] =item [Name => Str] =item [Scope => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves the specified RuleGroup. =head2 GetSampledRequests =over =item MaxItems => Int =item RuleMetricName => Str =item Scope => Str =item TimeWindow => L =item WebAclArn => Str =back Each argument is described in detail in: L Returns: a L instance Gets detailed information about a specified number of requests--a sample--that WAF randomly selects from among the first 5,000 requests that your Amazon Web Services resource received during a time range that you choose. You can specify a sample size of up to 500 requests, and you can specify any time range in the previous three hours. C returns a time range, which is usually the time range that you specified. However, if your resource (such as a CloudFront distribution) received 5,000 requests before the specified time range elapsed, C returns an updated time range. This new time range indicates the actual period during which WAF selected the requests in the sample. =head2 GetWebACL =over =item Id => Str =item Name => Str =item Scope => Str =back Each argument is described in detail in: L Returns: a L instance Retrieves the specified WebACL. =head2 GetWebACLForResource =over =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Retrieves the WebACL for the specified resource. =head2 ListAvailableManagedRuleGroups =over =item Scope => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of managed rule groups that are available for you to use. This list includes all Amazon Web Services Managed Rules rule groups and the Marketplace managed rule groups that you're subscribed to. =head2 ListIPSets =over =item Scope => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of IPSetSummary objects for the IP sets that you manage. =head2 ListLoggingConfigurations =over =item [Limit => Int] =item [NextMarker => Str] =item [Scope => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of your LoggingConfiguration objects. =head2 ListRegexPatternSets =over =item Scope => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of RegexPatternSetSummary objects for the regex pattern sets that you manage. =head2 ListResourcesForWebACL =over =item WebACLArn => Str =item [ResourceType => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of the Amazon Resource Names (ARNs) for the regional resources that are associated with the specified web ACL. If you want the list of Amazon CloudFront resources, use the CloudFront call C. =head2 ListRuleGroups =over =item Scope => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of RuleGroupSummary objects for the rule groups that you manage. =head2 ListTagsForResource =over =item ResourceARN => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves the TagInfoForResource for the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource. You can tag the Amazon Web Services resources that you manage through WAF: web ACLs, rule groups, IP sets, and regex pattern sets. You can't manage or view tags through the WAF console. =head2 ListWebACLs =over =item Scope => Str =item [Limit => Int] =item [NextMarker => Str] =back Each argument is described in detail in: L Returns: a L instance Retrieves an array of WebACLSummary objects for the web ACLs that you manage. =head2 PutLoggingConfiguration =over =item LoggingConfiguration => L =back Each argument is described in detail in: L Returns: a L instance Enables the specified LoggingConfiguration, to start logging from a web ACL, according to the configuration provided. You can access information about all traffic that WAF inspects using the following steps: =over =item 1. Create an Amazon Kinesis Data Firehose. Create the data firehose with a PUT source and in the Region that you are operating. If you are capturing logs for Amazon CloudFront, always create the firehose in US East (N. Virginia). Give the data firehose a name that starts with the prefix C. For example, C. Do not create the data firehose using a C as your source. =item 2. Associate that firehose to your web ACL using a C request. =back When you successfully enable logging using a C request, WAF will create a service linked role with the necessary permissions to write logs to the Amazon Kinesis Data Firehose. For more information, see Logging Web ACL Traffic Information (https://docs.aws.amazon.com/waf/latest/developerguide/logging.html) in the I. This operation completely replaces the mutable specifications that you already have for the logging configuration with the ones that you provide to this call. To modify the logging configuration, retrieve it by calling GetLoggingConfiguration, update the settings as needed, and then provide the complete logging configuration specification to this call. =head2 PutPermissionPolicy =over =item Policy => Str =item ResourceArn => Str =back Each argument is described in detail in: L Returns: a L instance Attaches an IAM policy to the specified resource. Use this to share a rule group across accounts. You must be the owner of the rule group to perform this operation. This action is subject to the following restrictions: =over =item * You can attach only one policy with each C request. =item * The ARN in the request must be a valid WAF RuleGroup ARN and the rule group must exist in the same Region. =item * The user making the request must be the owner of the rule group. =back =head2 TagResource =over =item ResourceARN => Str =item Tags => ArrayRef[L] =back Each argument is described in detail in: L Returns: a L instance Associates tags with the specified Amazon Web Services resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource. You can tag the Amazon Web Services resources that you manage through WAF: web ACLs, rule groups, IP sets, and regex pattern sets. You can't manage or view tags through the WAF console. =head2 UntagResource =over =item ResourceARN => Str =item TagKeys => ArrayRef[Str|Undef] =back Each argument is described in detail in: L Returns: a L instance Disassociates tags from an Amazon Web Services resource. Tags are key:value pairs that you can associate with Amazon Web Services resources. For example, the tag key might be "customer" and the tag value might be "companyA." You can specify one or more tags to add to each container. You can add up to 50 tags to each Amazon Web Services resource. =head2 UpdateIPSet =over =item Addresses => ArrayRef[Str|Undef] =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =item [Description => Str] =back Each argument is described in detail in: L Returns: a L instance Updates the specified IPSet. This operation completely replaces the mutable specifications that you already have for the IP set with the ones that you provide to this call. To modify the IP set, retrieve it by calling GetIPSet, update the settings as needed, and then provide the complete IP set specification to this call. =head2 UpdateRegexPatternSet =over =item Id => Str =item LockToken => Str =item Name => Str =item RegularExpressionList => ArrayRef[L] =item Scope => Str =item [Description => Str] =back Each argument is described in detail in: L Returns: a L instance Updates the specified RegexPatternSet. This operation completely replaces the mutable specifications that you already have for the regex pattern set with the ones that you provide to this call. To modify the regex pattern set, retrieve it by calling GetRegexPatternSet, update the settings as needed, and then provide the complete regex pattern set specification to this call. =head2 UpdateRuleGroup =over =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =item VisibilityConfig => L =item [CustomResponseBodies => L] =item [Description => Str] =item [Rules => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Updates the specified RuleGroup. This operation completely replaces the mutable specifications that you already have for the rule group with the ones that you provide to this call. To modify the rule group, retrieve it by calling GetRuleGroup, update the settings as needed, and then provide the complete rule group specification to this call. A rule group defines a collection of rules to inspect and control web requests that you can use in a WebACL. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. =head2 UpdateWebACL =over =item DefaultAction => L =item Id => Str =item LockToken => Str =item Name => Str =item Scope => Str =item VisibilityConfig => L =item [CustomResponseBodies => L] =item [Description => Str] =item [Rules => ArrayRef[L]] =back Each argument is described in detail in: L Returns: a L instance Updates the specified WebACL. This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling GetWebACL, update the settings as needed, and then provide the complete web ACL specification to this call. A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types Rule, RuleGroup, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, or an AppSync GraphQL API. =head1 PAGINATORS Paginator methods are helpers that repetively call methods that return partial results =head1 SEE ALSO This service class forms part of L =head1 BUGS and CONTRIBUTIONS The source code is located here: L Please report bugs to: L =cut