lib/aws/generated/waf_regional.ex

# WARNING: DO NOT EDIT, AUTO-GENERATED CODE!
# See https://github.com/aws-beam/aws-codegen for more details.

defmodule AWS.WAFRegional do
  @moduledoc """

  This is **AWS WAF Classic Regional** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  This is the *AWS WAF Regional Classic API Reference* for using AWS WAF Classic
  with the AWS resources, Elastic Load Balancing (ELB) Application Load Balancers
  and API Gateway APIs. The AWS WAF Classic actions and data types listed in the
  reference are available for protecting Elastic Load Balancing (ELB) Application
  Load Balancers and API Gateway APIs. You can use these actions and data types by
  means of the endpoints listed in [AWS Regions and Endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#waf_region).
  This guide is for developers who need detailed information about the AWS WAF
  Classic API actions, data types, and errors. For detailed information about AWS
  WAF Classic features and an overview of how to use the AWS WAF Classic API, see
  the
  [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.
  """

  alias AWS.Client
  alias AWS.Request

  @typedoc """

  ## Example:
      
      get_sampled_requests_request() :: %{
        required("MaxItems") => float(),
        required("RuleId") => String.t() | atom(),
        required("TimeWindow") => time_window(),
        required("WebAclId") => String.t() | atom()
      }
      
  """
  @type get_sampled_requests_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      regex_match_set_update() :: %{
        "Action" => list(any()),
        "RegexMatchTuple" => regex_match_tuple()
      }
      
  """
  @type regex_match_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_geo_match_set_request() :: %{
        required("GeoMatchSetId") => String.t() | atom()
      }
      
  """
  @type get_geo_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      associate_web_acl_response() :: %{}
      
  """
  @type associate_web_acl_response() :: %{}

  @typedoc """

  ## Example:
      
      xss_match_set() :: %{
        "Name" => String.t() | atom(),
        "XssMatchSetId" => String.t() | atom(),
        "XssMatchTuples" => list(xss_match_tuple())
      }
      
  """
  @type xss_match_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rule_request() :: %{
        optional("Tags") => list(tag()),
        required("ChangeToken") => String.t() | atom(),
        required("MetricName") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      sql_injection_match_set_summary() :: %{
        "Name" => String.t() | atom(),
        "SqlInjectionMatchSetId" => String.t() | atom()
      }
      
  """
  @type sql_injection_match_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      regex_pattern_set_update() :: %{
        "Action" => list(any()),
        "RegexPatternString" => String.t() | atom()
      }
      
  """
  @type regex_pattern_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rule_group_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_rule_group_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      tag_resource_request() :: %{
        required("ResourceARN") => String.t() | atom(),
        required("Tags") => list(tag())
      }
      
  """
  @type tag_resource_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_nonexistent_item_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_nonexistent_item_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      sql_injection_match_set() :: %{
        "Name" => String.t() | atom(),
        "SqlInjectionMatchSetId" => String.t() | atom(),
        "SqlInjectionMatchTuples" => list(sql_injection_match_tuple())
      }
      
  """
  @type sql_injection_match_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rate_based_rule() :: %{
        "MatchPredicates" => list(predicate()),
        "MetricName" => String.t() | atom(),
        "Name" => String.t() | atom(),
        "RateKey" => list(any()),
        "RateLimit" => float(),
        "RuleId" => String.t() | atom()
      }
      
  """
  @type rate_based_rule() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_resources_for_web_acl_request() :: %{
        optional("ResourceType") => list(any()),
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type list_resources_for_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_size_constraint_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("SizeConstraintSetId") => String.t() | atom(),
        required("Updates") => list(size_constraint_set_update())
      }
      
  """
  @type update_size_constraint_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      geo_match_set_update() :: %{
        "Action" => list(any()),
        "GeoMatchConstraint" => geo_match_constraint()
      }
      
  """
  @type geo_match_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      xss_match_set_update() :: %{
        "Action" => list(any()),
        "XssMatchTuple" => xss_match_tuple()
      }
      
  """
  @type xss_match_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_invalid_regex_pattern_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_invalid_regex_pattern_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rule_group_request() :: %{
        required("RuleGroupId") => String.t() | atom()
      }
      
  """
  @type get_rule_group_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_byte_match_set_response() :: %{
        "ByteMatchSet" => byte_match_set(),
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type create_byte_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_byte_match_set_response() :: %{
        "ByteMatchSet" => byte_match_set()
      }
      
  """
  @type get_byte_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rule_groups_response() :: %{
        "NextMarker" => String.t() | atom(),
        "RuleGroups" => list(rule_group_summary())
      }
      
  """
  @type list_rule_groups_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_ip_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_ip_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_byte_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_byte_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      waf_action() :: %{
        "Type" => list(any())
      }
      
  """
  @type waf_action() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_regex_match_sets_response() :: %{
        "NextMarker" => String.t() | atom(),
        "RegexMatchSets" => list(regex_match_set_summary())
      }
      
  """
  @type list_regex_match_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_xss_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_xss_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_regex_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RegexMatchSetId") => String.t() | atom()
      }
      
  """
  @type delete_regex_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_xss_match_set_response() :: %{
        "XssMatchSet" => xss_match_set()
      }
      
  """
  @type get_xss_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_stale_data_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_stale_data_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_xss_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("XssMatchSetId") => String.t() | atom()
      }
      
  """
  @type delete_xss_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_byte_match_set_request() :: %{
        required("ByteMatchSetId") => String.t() | atom(),
        required("ChangeToken") => String.t() | atom()
      }
      
  """
  @type delete_byte_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      untag_resource_response() :: %{}
      
  """
  @type untag_resource_response() :: %{}

  @typedoc """

  ## Example:
      
      list_xss_match_sets_response() :: %{
        "NextMarker" => String.t() | atom(),
        "XssMatchSets" => list(xss_match_set_summary())
      }
      
  """
  @type list_xss_match_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rate_based_rules_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_rate_based_rules_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_byte_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_byte_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_sql_injection_match_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "SqlInjectionMatchSet" => sql_injection_match_set()
      }
      
  """
  @type create_sql_injection_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rate_based_rule_request() :: %{
        required("RuleId") => String.t() | atom()
      }
      
  """
  @type get_rate_based_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      field_to_match() :: %{
        "Data" => String.t() | atom(),
        "Type" => list(any())
      }
      
  """
  @type field_to_match() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_service_linked_role_error_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_service_linked_role_error_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_nonexistent_container_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_nonexistent_container_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_byte_match_set_request() :: %{
        required("ByteMatchSetId") => String.t() | atom(),
        required("ChangeToken") => String.t() | atom(),
        required("Updates") => list(byte_match_set_update())
      }
      
  """
  @type update_byte_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_geo_match_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "GeoMatchSet" => geo_match_set()
      }
      
  """
  @type create_geo_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_ip_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_ip_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      associate_web_acl_request() :: %{
        required("ResourceArn") => String.t() | atom(),
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type associate_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule_group() :: %{
        "MetricName" => String.t() | atom(),
        "Name" => String.t() | atom(),
        "RuleGroupId" => String.t() | atom()
      }
      
  """
  @type rule_group() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      size_constraint() :: %{
        "ComparisonOperator" => list(any()),
        "FieldToMatch" => field_to_match(),
        "Size" => float(),
        "TextTransformation" => list(any())
      }
      
  """
  @type size_constraint() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rule_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RuleId") => String.t() | atom(),
        required("Updates") => list(rule_update())
      }
      
  """
  @type update_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_web_acl_for_resource_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type get_web_acl_for_resource_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_sql_injection_match_set_request() :: %{
        required("SqlInjectionMatchSetId") => String.t() | atom()
      }
      
  """
  @type get_sql_injection_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_ip_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("IPSetId") => String.t() | atom()
      }
      
  """
  @type delete_ip_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_size_constraint_set_response() :: %{
        "SizeConstraintSet" => size_constraint_set()
      }
      
  """
  @type get_size_constraint_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rule_request() :: %{
        required("RuleId") => String.t() | atom()
      }
      
  """
  @type get_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      byte_match_set_update() :: %{
        "Action" => list(any()),
        "ByteMatchTuple" => byte_match_tuple()
      }
      
  """
  @type byte_match_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rule_group_response() :: %{
        "RuleGroup" => rule_group()
      }
      
  """
  @type get_rule_group_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_unavailable_entity_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_unavailable_entity_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_regex_pattern_set_request() :: %{
        required("RegexPatternSetId") => String.t() | atom()
      }
      
  """
  @type get_regex_pattern_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_web_acl_response() :: %{
        "WebACL" => web_acl()
      }
      
  """
  @type get_web_acl_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      untag_resource_request() :: %{
        required("ResourceARN") => String.t() | atom(),
        required("TagKeys") => list(String.t() | atom())
      }
      
  """
  @type untag_resource_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      tag_info_for_resource() :: %{
        "ResourceARN" => String.t() | atom(),
        "TagList" => list(tag())
      }
      
  """
  @type tag_info_for_resource() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      activated_rule() :: %{
        "Action" => waf_action(),
        "ExcludedRules" => list(excluded_rule()),
        "OverrideAction" => waf_override_action(),
        "Priority" => integer(),
        "RuleId" => String.t() | atom(),
        "Type" => list(any())
      }
      
  """
  @type activated_rule() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_invalid_permission_policy_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_invalid_permission_policy_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rate_based_rule_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "Rule" => rate_based_rule()
      }
      
  """
  @type create_rate_based_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_ip_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("IPSetId") => String.t() | atom(),
        required("Updates") => list(ip_set_update())
      }
      
  """
  @type update_ip_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rules_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_rules_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_size_constraint_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_size_constraint_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rate_based_rule_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_rate_based_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_sql_injection_match_set_response() :: %{
        "SqlInjectionMatchSet" => sql_injection_match_set()
      }
      
  """
  @type get_sql_injection_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      logging_configuration() :: %{
        "LogDestinationConfigs" => list(String.t() | atom()),
        "RedactedFields" => list(field_to_match()),
        "ResourceArn" => String.t() | atom()
      }
      
  """
  @type logging_configuration() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_regex_match_set_request() :: %{
        required("RegexMatchSetId") => String.t() | atom()
      }
      
  """
  @type get_regex_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      byte_match_tuple() :: %{
        "FieldToMatch" => field_to_match(),
        "PositionalConstraint" => list(any()),
        "TargetString" => binary(),
        "TextTransformation" => list(any())
      }
      
  """
  @type byte_match_tuple() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_sql_injection_match_sets_response() :: %{
        "NextMarker" => String.t() | atom(),
        "SqlInjectionMatchSets" => list(sql_injection_match_set_summary())
      }
      
  """
  @type list_sql_injection_match_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rule_group_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "RuleGroup" => rule_group()
      }
      
  """
  @type create_rule_group_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rule_group_request() :: %{
        optional("Tags") => list(tag()),
        required("ChangeToken") => String.t() | atom(),
        required("MetricName") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_rule_group_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      put_logging_configuration_response() :: %{
        "LoggingConfiguration" => logging_configuration()
      }
      
  """
  @type put_logging_configuration_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rule_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RuleId") => String.t() | atom()
      }
      
  """
  @type delete_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_bad_request_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_bad_request_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_geo_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_geo_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rule_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_regex_pattern_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RegexPatternSetId") => String.t() | atom()
      }
      
  """
  @type delete_regex_pattern_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_geo_match_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_geo_match_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      web_acl() :: %{
        "DefaultAction" => waf_action(),
        "MetricName" => String.t() | atom(),
        "Name" => String.t() | atom(),
        "Rules" => list(activated_rule()),
        "WebACLArn" => String.t() | atom(),
        "WebACLId" => String.t() | atom()
      }
      
  """
  @type web_acl() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_internal_error_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_internal_error_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      regex_match_set() :: %{
        "Name" => String.t() | atom(),
        "RegexMatchSetId" => String.t() | atom(),
        "RegexMatchTuples" => list(regex_match_tuple())
      }
      
  """
  @type regex_match_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_activated_rules_in_rule_group_response() :: %{
        "ActivatedRules" => list(activated_rule()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type list_activated_rules_in_rule_group_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_sql_injection_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_sql_injection_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      subscribed_rule_group_summary() :: %{
        "MetricName" => String.t() | atom(),
        "Name" => String.t() | atom(),
        "RuleGroupId" => String.t() | atom()
      }
      
  """
  @type subscribed_rule_group_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_geo_match_set_response() :: %{
        "GeoMatchSet" => geo_match_set()
      }
      
  """
  @type get_geo_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_permission_policy_response() :: %{}
      
  """
  @type delete_permission_policy_response() :: %{}

  @typedoc """

  ## Example:
      
      delete_size_constraint_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("SizeConstraintSetId") => String.t() | atom()
      }
      
  """
  @type delete_size_constraint_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rate_based_rule_managed_keys_request() :: %{
        optional("NextMarker") => String.t() | atom(),
        required("RuleId") => String.t() | atom()
      }
      
  """
  @type get_rate_based_rule_managed_keys_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rule_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_referenced_item_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_referenced_item_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_regex_pattern_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RegexPatternSetId") => String.t() | atom(),
        required("Updates") => list(regex_pattern_set_update())
      }
      
  """
  @type update_regex_pattern_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rate_based_rule_response() :: %{
        "Rule" => rate_based_rule()
      }
      
  """
  @type get_rate_based_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      time_window() :: %{
        "EndTime" => non_neg_integer(),
        "StartTime" => non_neg_integer()
      }
      
  """
  @type time_window() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_ip_sets_response() :: %{
        "IPSets" => list(ip_set_summary()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type list_ip_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_subscribed_rule_groups_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_subscribed_rule_groups_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_xss_match_set_request() :: %{
        required("XssMatchSetId") => String.t() | atom()
      }
      
  """
  @type get_xss_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      tag() :: %{
        "Key" => String.t() | atom(),
        "Value" => String.t() | atom()
      }
      
  """
  @type tag() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_web_acl_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "WebACL" => web_acl()
      }
      
  """
  @type create_web_acl_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_sql_injection_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("SqlInjectionMatchSetId") => String.t() | atom(),
        required("Updates") => list(sql_injection_match_set_update())
      }
      
  """
  @type update_sql_injection_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_web_acl_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_web_acl_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_xss_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Updates") => list(xss_match_set_update()),
        required("XssMatchSetId") => String.t() | atom()
      }
      
  """
  @type update_xss_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_logging_configuration_response() :: %{
        "LoggingConfiguration" => logging_configuration()
      }
      
  """
  @type get_logging_configuration_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_regex_match_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_regex_match_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rate_based_rule_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RateLimit") => float(),
        required("RuleId") => String.t() | atom(),
        required("Updates") => list(rule_update())
      }
      
  """
  @type update_rate_based_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_regex_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_regex_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      geo_match_set_summary() :: %{
        "GeoMatchSetId" => String.t() | atom(),
        "Name" => String.t() | atom()
      }
      
  """
  @type geo_match_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_geo_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_geo_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      ip_set() :: %{
        "IPSetDescriptors" => list(ip_set_descriptor()),
        "IPSetId" => String.t() | atom(),
        "Name" => String.t() | atom()
      }
      
  """
  @type ip_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_invalid_account_exception() :: %{}
      
  """
  @type w_a_f_invalid_account_exception() :: %{}

  @typedoc """

  ## Example:
      
      get_change_token_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type get_change_token_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      disassociate_web_acl_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type disassociate_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_tag_operation_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_tag_operation_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_tags_for_resource_response() :: %{
        "NextMarker" => String.t() | atom(),
        "TagInfoForResource" => tag_info_for_resource()
      }
      
  """
  @type list_tags_for_resource_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_xss_match_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "XssMatchSet" => xss_match_set()
      }
      
  """
  @type create_xss_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule_group_update() :: %{
        "Action" => list(any()),
        "ActivatedRule" => activated_rule()
      }
      
  """
  @type rule_group_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      sampled_h_t_t_p_request() :: %{
        "Action" => String.t() | atom(),
        "Request" => h_t_t_p_request(),
        "RuleWithinRuleGroup" => String.t() | atom(),
        "Timestamp" => non_neg_integer(),
        "Weight" => float()
      }
      
  """
  @type sampled_h_t_t_p_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_web_acl_request() :: %{
        optional("DefaultAction") => waf_action(),
        optional("Updates") => list(web_acl_update()),
        required("ChangeToken") => String.t() | atom(),
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type update_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_web_acl_for_resource_response() :: %{
        "WebACLSummary" => web_acl_summary()
      }
      
  """
  @type get_web_acl_for_resource_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_byte_match_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_byte_match_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_rate_based_rule_managed_keys_response() :: %{
        "ManagedKeys" => list(String.t() | atom()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type get_rate_based_rule_managed_keys_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_invalid_parameter_exception() :: %{
        "field" => list(any()),
        "parameter" => String.t() | atom(),
        "reason" => list(any())
      }
      
  """
  @type w_a_f_invalid_parameter_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_geo_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_geo_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_entity_migration_exception() :: %{
        "MigrationErrorReason" => String.t() | atom(),
        "MigrationErrorType" => list(any()),
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_entity_migration_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_change_token_request() :: %{}
      
  """
  @type get_change_token_request() :: %{}

  @typedoc """

  ## Example:
      
      get_rule_response() :: %{
        "Rule" => rule()
      }
      
  """
  @type get_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_sql_injection_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_sql_injection_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rule_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "Rule" => rule()
      }
      
  """
  @type create_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_regex_pattern_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_regex_pattern_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_xss_match_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_xss_match_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      byte_match_set_summary() :: %{
        "ByteMatchSetId" => String.t() | atom(),
        "Name" => String.t() | atom()
      }
      
  """
  @type byte_match_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      waf_override_action() :: %{
        "Type" => list(any())
      }
      
  """
  @type waf_override_action() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_subscribed_rule_groups_response() :: %{
        "NextMarker" => String.t() | atom(),
        "RuleGroups" => list(subscribed_rule_group_summary())
      }
      
  """
  @type list_subscribed_rule_groups_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule() :: %{
        "MetricName" => String.t() | atom(),
        "Name" => String.t() | atom(),
        "Predicates" => list(predicate()),
        "RuleId" => String.t() | atom()
      }
      
  """
  @type rule() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_regex_pattern_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_regex_pattern_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      size_constraint_set() :: %{
        "Name" => String.t() | atom(),
        "SizeConstraintSetId" => String.t() | atom(),
        "SizeConstraints" => list(size_constraint())
      }
      
  """
  @type size_constraint_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_logging_configuration_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type get_logging_configuration_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_regex_pattern_set_response() :: %{
        "RegexPatternSet" => regex_pattern_set()
      }
      
  """
  @type get_regex_pattern_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      geo_match_constraint() :: %{
        "Type" => list(any()),
        "Value" => list(any())
      }
      
  """
  @type geo_match_constraint() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      regex_pattern_set_summary() :: %{
        "Name" => String.t() | atom(),
        "RegexPatternSetId" => String.t() | atom()
      }
      
  """
  @type regex_pattern_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      put_permission_policy_request() :: %{
        required("Policy") => String.t() | atom(),
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type put_permission_policy_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_regex_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_regex_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_byte_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_byte_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_sql_injection_match_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_sql_injection_match_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_invalid_operation_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_invalid_operation_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule_summary() :: %{
        "Name" => String.t() | atom(),
        "RuleId" => String.t() | atom()
      }
      
  """
  @type rule_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      regex_match_set_summary() :: %{
        "Name" => String.t() | atom(),
        "RegexMatchSetId" => String.t() | atom()
      }
      
  """
  @type regex_match_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_change_token_status_response() :: %{
        "ChangeTokenStatus" => list(any())
      }
      
  """
  @type get_change_token_status_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_activated_rules_in_rule_group_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom(),
        optional("RuleGroupId") => String.t() | atom()
      }
      
  """
  @type list_activated_rules_in_rule_group_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_disallowed_name_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_disallowed_name_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_byte_match_sets_response() :: %{
        "ByteMatchSets" => list(byte_match_set_summary()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type list_byte_match_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_logging_configurations_response() :: %{
        "LoggingConfigurations" => list(logging_configuration()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type list_logging_configurations_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      h_t_t_p_header() :: %{
        "Name" => String.t() | atom(),
        "Value" => String.t() | atom()
      }
      
  """
  @type h_t_t_p_header() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_size_constraint_set_request() :: %{
        required("SizeConstraintSetId") => String.t() | atom()
      }
      
  """
  @type get_size_constraint_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_permission_policy_response() :: %{
        "Policy" => String.t() | atom()
      }
      
  """
  @type get_permission_policy_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_geo_match_sets_response() :: %{
        "GeoMatchSets" => list(geo_match_set_summary()),
        "NextMarker" => String.t() | atom()
      }
      
  """
  @type list_geo_match_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_xss_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_xss_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      excluded_rule() :: %{
        "RuleId" => String.t() | atom()
      }
      
  """
  @type excluded_rule() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_web_acl_request() :: %{
        optional("Tags") => list(tag()),
        required("ChangeToken") => String.t() | atom(),
        required("DefaultAction") => waf_action(),
        required("MetricName") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_ip_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_ip_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      size_constraint_set_update() :: %{
        "Action" => list(any()),
        "SizeConstraint" => size_constraint()
      }
      
  """
  @type size_constraint_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_rule_group_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RuleGroupId") => String.t() | atom(),
        required("Updates") => list(rule_group_update())
      }
      
  """
  @type update_rule_group_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rules_response() :: %{
        "NextMarker" => String.t() | atom(),
        "Rules" => list(rule_summary())
      }
      
  """
  @type list_rules_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_ip_set_response() :: %{
        "IPSet" => ip_set()
      }
      
  """
  @type get_ip_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rule_group_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_rule_group_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      h_t_t_p_request() :: %{
        "ClientIP" => String.t() | atom(),
        "Country" => String.t() | atom(),
        "HTTPVersion" => String.t() | atom(),
        "Headers" => list(h_t_t_p_header()),
        "Method" => String.t() | atom(),
        "URI" => String.t() | atom()
      }
      
  """
  @type h_t_t_p_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      tag_resource_response() :: %{}
      
  """
  @type tag_resource_response() :: %{}

  @typedoc """

  ## Example:
      
      regex_pattern_set() :: %{
        "Name" => String.t() | atom(),
        "RegexPatternSetId" => String.t() | atom(),
        "RegexPatternStrings" => list(String.t() | atom())
      }
      
  """
  @type regex_pattern_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_size_constraint_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_size_constraint_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_byte_match_set_request() :: %{
        required("ByteMatchSetId") => String.t() | atom()
      }
      
  """
  @type get_byte_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rate_based_rules_response() :: %{
        "NextMarker" => String.t() | atom(),
        "Rules" => list(rule_summary())
      }
      
  """
  @type list_rate_based_rules_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule_group_summary() :: %{
        "Name" => String.t() | atom(),
        "RuleGroupId" => String.t() | atom()
      }
      
  """
  @type rule_group_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      ip_set_summary() :: %{
        "IPSetId" => String.t() | atom(),
        "Name" => String.t() | atom()
      }
      
  """
  @type ip_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_regex_pattern_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_regex_pattern_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_tags_for_resource_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom(),
        required("ResourceARN") => String.t() | atom()
      }
      
  """
  @type list_tags_for_resource_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_non_empty_entity_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_non_empty_entity_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_permission_policy_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type delete_permission_policy_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      xss_match_set_summary() :: %{
        "Name" => String.t() | atom(),
        "XssMatchSetId" => String.t() | atom()
      }
      
  """
  @type xss_match_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_regex_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_regex_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_regex_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RegexMatchSetId") => String.t() | atom(),
        required("Updates") => list(regex_match_set_update())
      }
      
  """
  @type update_regex_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_permission_policy_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type get_permission_policy_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      web_acl_update() :: %{
        "Action" => list(any()),
        "ActivatedRule" => activated_rule()
      }
      
  """
  @type web_acl_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      xss_match_tuple() :: %{
        "FieldToMatch" => field_to_match(),
        "TextTransformation" => list(any())
      }
      
  """
  @type xss_match_tuple() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      predicate() :: %{
        "DataId" => String.t() | atom(),
        "Negated" => boolean(),
        "Type" => list(any())
      }
      
  """
  @type predicate() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_resources_for_web_acl_response() :: %{
        "ResourceArns" => list(String.t() | atom())
      }
      
  """
  @type list_resources_for_web_acl_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_logging_configurations_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_logging_configurations_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_logging_configuration_response() :: %{}
      
  """
  @type delete_logging_configuration_response() :: %{}

  @typedoc """

  ## Example:
      
      get_ip_set_request() :: %{
        required("IPSetId") => String.t() | atom()
      }
      
  """
  @type get_ip_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_size_constraint_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "SizeConstraintSet" => size_constraint_set()
      }
      
  """
  @type create_size_constraint_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      disassociate_web_acl_response() :: %{}
      
  """
  @type disassociate_web_acl_response() :: %{}

  @typedoc """

  ## Example:
      
      put_logging_configuration_request() :: %{
        required("LoggingConfiguration") => logging_configuration()
      }
      
  """
  @type put_logging_configuration_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      put_permission_policy_response() :: %{}
      
  """
  @type put_permission_policy_response() :: %{}

  @typedoc """

  ## Example:
      
      regex_match_tuple() :: %{
        "FieldToMatch" => field_to_match(),
        "RegexPatternSetId" => String.t() | atom(),
        "TextTransformation" => list(any())
      }
      
  """
  @type regex_match_tuple() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_geo_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("GeoMatchSetId") => String.t() | atom(),
        required("Updates") => list(geo_match_set_update())
      }
      
  """
  @type update_geo_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_change_token_status_request() :: %{
        required("ChangeToken") => String.t() | atom()
      }
      
  """
  @type get_change_token_status_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      rule_update() :: %{
        "Action" => list(any()),
        "Predicate" => predicate()
      }
      
  """
  @type rule_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_size_constraint_sets_response() :: %{
        "NextMarker" => String.t() | atom(),
        "SizeConstraintSets" => list(size_constraint_set_summary())
      }
      
  """
  @type list_size_constraint_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      geo_match_set() :: %{
        "GeoMatchConstraints" => list(geo_match_constraint()),
        "GeoMatchSetId" => String.t() | atom(),
        "Name" => String.t() | atom()
      }
      
  """
  @type geo_match_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_logging_configuration_request() :: %{
        required("ResourceArn") => String.t() | atom()
      }
      
  """
  @type delete_logging_configuration_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rate_based_rule_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_rate_based_rule_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_sampled_requests_response() :: %{
        "PopulationSize" => float(),
        "SampledRequests" => list(sampled_h_t_t_p_request()),
        "TimeWindow" => time_window()
      }
      
  """
  @type get_sampled_requests_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_regex_pattern_sets_response() :: %{
        "NextMarker" => String.t() | atom(),
        "RegexPatternSets" => list(regex_pattern_set_summary())
      }
      
  """
  @type list_regex_pattern_sets_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      sql_injection_match_set_update() :: %{
        "Action" => list(any()),
        "SqlInjectionMatchTuple" => sql_injection_match_tuple()
      }
      
  """
  @type sql_injection_match_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_web_acls_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_web_acls_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_web_acl_migration_stack_request() :: %{
        required("IgnoreUnsupportedType") => boolean(),
        required("S3BucketName") => String.t() | atom(),
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type create_web_acl_migration_stack_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      ip_set_descriptor() :: %{
        "Type" => list(any()),
        "Value" => String.t() | atom()
      }
      
  """
  @type ip_set_descriptor() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_web_acls_response() :: %{
        "NextMarker" => String.t() | atom(),
        "WebACLs" => list(web_acl_summary())
      }
      
  """
  @type list_web_acls_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_web_acl_migration_stack_response() :: %{
        "S3ObjectUrl" => String.t() | atom()
      }
      
  """
  @type create_web_acl_migration_stack_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_ip_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "IPSet" => ip_set()
      }
      
  """
  @type create_ip_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_sql_injection_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("SqlInjectionMatchSetId") => String.t() | atom()
      }
      
  """
  @type delete_sql_injection_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      update_regex_pattern_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type update_regex_pattern_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      ip_set_update() :: %{
        "Action" => list(any()),
        "IPSetDescriptor" => ip_set_descriptor()
      }
      
  """
  @type ip_set_update() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_size_constraint_sets_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_size_constraint_sets_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_web_acl_request() :: %{
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type get_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      sql_injection_match_tuple() :: %{
        "FieldToMatch" => field_to_match(),
        "TextTransformation" => list(any())
      }
      
  """
  @type sql_injection_match_tuple() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      get_regex_match_set_response() :: %{
        "RegexMatchSet" => regex_match_set()
      }
      
  """
  @type get_regex_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_web_acl_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_web_acl_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_subscription_not_found_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_subscription_not_found_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rule_group_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RuleGroupId") => String.t() | atom()
      }
      
  """
  @type delete_rule_group_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_limits_exceeded_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_limits_exceeded_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_rate_based_rule_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("RuleId") => String.t() | atom()
      }
      
  """
  @type delete_rate_based_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_web_acl_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("WebACLId") => String.t() | atom()
      }
      
  """
  @type delete_web_acl_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_geo_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("GeoMatchSetId") => String.t() | atom()
      }
      
  """
  @type delete_geo_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      w_a_f_tag_operation_internal_error_exception() :: %{
        "message" => String.t() | atom()
      }
      
  """
  @type w_a_f_tag_operation_internal_error_exception() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_sql_injection_match_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_sql_injection_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      web_acl_summary() :: %{
        "Name" => String.t() | atom(),
        "WebACLId" => String.t() | atom()
      }
      
  """
  @type web_acl_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_size_constraint_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_size_constraint_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_rate_based_rule_request() :: %{
        optional("Tags") => list(tag()),
        required("ChangeToken") => String.t() | atom(),
        required("MetricName") => String.t() | atom(),
        required("Name") => String.t() | atom(),
        required("RateKey") => list(any()),
        required("RateLimit") => float()
      }
      
  """
  @type create_rate_based_rule_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      list_rule_groups_request() :: %{
        optional("Limit") => integer(),
        optional("NextMarker") => String.t() | atom()
      }
      
  """
  @type list_rule_groups_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      byte_match_set() :: %{
        "ByteMatchSetId" => String.t() | atom(),
        "ByteMatchTuples" => list(byte_match_tuple()),
        "Name" => String.t() | atom()
      }
      
  """
  @type byte_match_set() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      delete_ip_set_response() :: %{
        "ChangeToken" => String.t() | atom()
      }
      
  """
  @type delete_ip_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      size_constraint_set_summary() :: %{
        "Name" => String.t() | atom(),
        "SizeConstraintSetId" => String.t() | atom()
      }
      
  """
  @type size_constraint_set_summary() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_regex_match_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "RegexMatchSet" => regex_match_set()
      }
      
  """
  @type create_regex_match_set_response() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_xss_match_set_request() :: %{
        required("ChangeToken") => String.t() | atom(),
        required("Name") => String.t() | atom()
      }
      
  """
  @type create_xss_match_set_request() :: %{(String.t() | atom()) => any()}

  @typedoc """

  ## Example:
      
      create_regex_pattern_set_response() :: %{
        "ChangeToken" => String.t() | atom(),
        "RegexPatternSet" => regex_pattern_set()
      }
      
  """
  @type create_regex_pattern_set_response() :: %{(String.t() | atom()) => any()}

  @type associate_web_acl_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_unavailable_entity_exception()
          | w_a_f_nonexistent_item_exception()

  @type create_byte_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_geo_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_ip_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_rate_based_rule_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_stale_data_exception()

  @type create_regex_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_regex_pattern_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_rule_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_stale_data_exception()

  @type create_rule_group_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_stale_data_exception()

  @type create_size_constraint_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_sql_injection_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type create_web_acl_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_stale_data_exception()

  @type create_web_acl_migration_stack_errors() ::
          w_a_f_invalid_operation_exception()
          | w_a_f_entity_migration_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type create_xss_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()

  @type delete_byte_match_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_geo_match_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_ip_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_logging_configuration_errors() ::
          w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_permission_policy_errors() ::
          w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_rate_based_rule_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_non_empty_entity_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_regex_match_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_regex_pattern_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_rule_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_non_empty_entity_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_rule_group_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_size_constraint_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_sql_injection_match_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_web_acl_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_non_empty_entity_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type delete_xss_match_set_errors() ::
          w_a_f_non_empty_entity_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type disassociate_web_acl_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_byte_match_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_change_token_errors() :: w_a_f_internal_error_exception()

  @type get_change_token_status_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type get_geo_match_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_ip_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_logging_configuration_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type get_permission_policy_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type get_rate_based_rule_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_rate_based_rule_managed_keys_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_regex_match_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_regex_pattern_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_rule_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_rule_group_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type get_sampled_requests_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type get_size_constraint_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_sql_injection_match_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_web_acl_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_web_acl_for_resource_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_unavailable_entity_exception()
          | w_a_f_nonexistent_item_exception()

  @type get_xss_match_set_errors() ::
          w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type list_activated_rules_in_rule_group_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type list_byte_match_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_geo_match_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_ip_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_logging_configurations_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type list_rate_based_rules_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_regex_match_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_regex_pattern_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_resources_for_web_acl_errors() ::
          w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_item_exception()

  @type list_rule_groups_errors() :: w_a_f_internal_error_exception()

  @type list_rules_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_size_constraint_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_sql_injection_match_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_subscribed_rule_groups_errors() ::
          w_a_f_internal_error_exception() | w_a_f_nonexistent_item_exception()

  @type list_tags_for_resource_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_nonexistent_item_exception()

  @type list_web_acls_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type list_xss_match_sets_errors() ::
          w_a_f_invalid_account_exception() | w_a_f_internal_error_exception()

  @type put_logging_configuration_errors() ::
          w_a_f_internal_error_exception()
          | w_a_f_service_linked_role_error_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type put_permission_policy_errors() ::
          w_a_f_internal_error_exception()
          | w_a_f_invalid_permission_policy_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type tag_resource_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_nonexistent_item_exception()

  @type untag_resource_errors() ::
          w_a_f_tag_operation_internal_error_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_tag_operation_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_bad_request_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_byte_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_geo_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_ip_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_rate_based_rule_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_regex_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_disallowed_name_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_regex_pattern_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_invalid_regex_pattern_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_rule_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_rule_group_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_size_constraint_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_sql_injection_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_web_acl_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_subscription_not_found_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_referenced_item_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  @type update_xss_match_set_errors() ::
          w_a_f_limits_exceeded_exception()
          | w_a_f_invalid_operation_exception()
          | w_a_f_invalid_parameter_exception()
          | w_a_f_invalid_account_exception()
          | w_a_f_internal_error_exception()
          | w_a_f_nonexistent_container_exception()
          | w_a_f_stale_data_exception()
          | w_a_f_nonexistent_item_exception()

  def metadata do
    %{
      api_version: "2016-11-28",
      content_type: "application/x-amz-json-1.1",
      credential_scope: nil,
      endpoint_prefix: "waf-regional",
      global?: false,
      hostname: nil,
      protocol: "json",
      service_id: "WAF Regional",
      signature_version: "v4",
      signing_name: "waf-regional",
      target_prefix: "AWSWAF_Regional_20161128"
    }
  end

  @doc """

  This is **AWS WAF Classic Regional** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Associates a web ACL with a resource, either an application load balancer or
  Amazon API Gateway stage.
  """
  @spec associate_web_acl(map(), associate_web_acl_request(), list()) ::
          {:ok, associate_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, associate_web_acl_errors()}
  def associate_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "AssociateWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `ByteMatchSet`. You then use `UpdateByteMatchSet` to identify the part
  of a
  web request that you want AWS WAF to inspect, such as the values of the
  `User-Agent` header or the query string.
  For example, you can create a `ByteMatchSet` that matches any requests with
  `User-Agent` headers
  that contain the string `BadBot`. You can then configure AWS WAF to reject those
  requests.

  To create and configure a `ByteMatchSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateByteMatchSet` request.

    2.
  Submit a `CreateByteMatchSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateByteMatchSet` request.

    4.
  Submit an `UpdateByteMatchSet` request to specify the part of the request that
  you want AWS WAF to inspect
  (for example, the header or the URI) and the value that you want AWS WAF to
  watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_byte_match_set(map(), create_byte_match_set_request(), list()) ::
          {:ok, create_byte_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_byte_match_set_errors()}
  def create_byte_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateByteMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates an `GeoMatchSet`, which you use to specify which web requests you want
  to allow or block based on the country
  that the requests originate from. For example, if you're receiving a lot of
  requests from one or more countries and you want to block the requests, you can
  create an `GeoMatchSet` that contains those countries and then configure AWS WAF
  to block the requests.

  To create and configure a `GeoMatchSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateGeoMatchSet` request.

    2.
  Submit a `CreateGeoMatchSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateGeoMatchSet` request.

    4.
  Submit an `UpdateGeoMatchSetSet` request to specify the countries that you want
  AWS WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_geo_match_set(map(), create_geo_match_set_request(), list()) ::
          {:ok, create_geo_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_geo_match_set_errors()}
  def create_geo_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateGeoMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates an `IPSet`, which you use to specify which web requests
  that
  you want to allow or block based on the IP addresses that the requests
  originate from. For example, if you're receiving a lot of requests from one or
  more
  individual IP addresses or one or more ranges of IP addresses and you want to
  block the
  requests, you can create an `IPSet` that contains those IP addresses and then
  configure AWS WAF to block the requests.

  To create and configure an `IPSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateIPSet` request.

    2.
  Submit a `CreateIPSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateIPSet` request.

    4.
  Submit an `UpdateIPSet` request to specify the IP addresses that you want AWS
  WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_ip_set(map(), create_ip_set_request(), list()) ::
          {:ok, create_ip_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_ip_set_errors()}
  def create_ip_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateIPSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `RateBasedRule`. The `RateBasedRule` contains a
  `RateLimit`, which specifies the maximum number of requests that AWS WAF allows
  from a specified IP address in a five-minute period.
  The `RateBasedRule` also
  contains the `IPSet` objects, `ByteMatchSet` objects, and other
  predicates that identify the requests that you want to count or block if these
  requests
  exceed the `RateLimit`.

  If you add more than one predicate to a `RateBasedRule`, a request not
  only must exceed the `RateLimit`, but it also must match all the
  conditions to be counted or blocked. For example, suppose you add the following
  to a
  `RateBasedRule`:

    *
  An `IPSet` that matches the IP address `192.0.2.44/32`

    *
  A `ByteMatchSet` that matches `BadBot` in the
  `User-Agent` header

  Further, you specify a `RateLimit` of 1,000.

  You then add the `RateBasedRule` to a `WebACL` and specify that
  you want to block requests that meet the conditions in the rule. For a request
  to be
  blocked, it must come from the IP address 192.0.2.44 *and* the
  `User-Agent` header in the request must contain the value
  `BadBot`. Further, requests that match these two conditions must be received at
  a rate of more than 1,000 requests every five minutes. If both conditions are
  met and the
  rate is exceeded, AWS WAF blocks the requests. If the rate drops below 1,000 for
  a
  five-minute period, AWS WAF no longer blocks the requests.

  As a second example, suppose you want to limit requests to a particular page on
  your site. To do this, you could add the following to a
  `RateBasedRule`:

    *
  A `ByteMatchSet` with `FieldToMatch` of `URI`

    *
  A `PositionalConstraint` of `STARTS_WITH`

    *
  A `TargetString` of `login`

  Further, you specify a `RateLimit` of 1,000.

  By adding this `RateBasedRule` to a `WebACL`, you could limit requests to your
  login page without affecting the rest of your site.

  To create and configure a `RateBasedRule`, perform the following
  steps:

    1.
  Create and update the predicates that you want to include in the rule. For more
  information, see `CreateByteMatchSet`, `CreateIPSet`,
  and `CreateSqlInjectionMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide
  in the `ChangeToken` parameter of a `CreateRule`
  request.

    3.
  Submit a `CreateRateBasedRule` request.

    4.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an `UpdateRule`
  request.

    5.
  Submit an `UpdateRateBasedRule` request to specify the predicates
  that you want to include in the rule.

    6.
  Create and update a `WebACL` that contains the
  `RateBasedRule`. For more information, see `CreateWebACL`.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests,
  see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_rate_based_rule(map(), create_rate_based_rule_request(), list()) ::
          {:ok, create_rate_based_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_rate_based_rule_errors()}
  def create_rate_based_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateRateBasedRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `RegexMatchSet`. You then use `UpdateRegexMatchSet` to identify the
  part of a
  web request that you want AWS WAF to inspect, such as the values of the
  `User-Agent` header or the query string.
  For example, you can create a `RegexMatchSet` that contains a `RegexMatchTuple`
  that looks for any requests with `User-Agent` headers
  that match a `RegexPatternSet` with pattern `B[a@]dB[o0]t`. You can then configure AWS WAF to reject those requests.

  To create and configure a `RegexMatchSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateRegexMatchSet` request.

    2.
  Submit a `CreateRegexMatchSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRegexMatchSet` request.

    4.
  Submit an `UpdateRegexMatchSet` request to specify the part of the request that
  you want AWS WAF to inspect
  (for example, the header or the URI) and the value, using a `RegexPatternSet`,
  that you want AWS WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer
  Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_regex_match_set(map(), create_regex_match_set_request(), list()) ::
          {:ok, create_regex_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_regex_match_set_errors()}
  def create_regex_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateRegexMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `RegexPatternSet`. You then use `UpdateRegexPatternSet` to specify the
  regular expression (regex) pattern that you want AWS WAF to search for, such as
  `B[a@]dB[o0]t`. You can then configure AWS WAF to reject those requests.   To create and configure a `RegexPatternSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateRegexPatternSet` request.

    2.
  Submit a `CreateRegexPatternSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRegexPatternSet` request.

    4.
  Submit an `UpdateRegexPatternSet` request to specify the string that you want
  AWS WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer
  Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_regex_pattern_set(map(), create_regex_pattern_set_request(), list()) ::
          {:ok, create_regex_pattern_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_regex_pattern_set_errors()}
  def create_regex_pattern_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateRegexPatternSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `Rule`, which contains the `IPSet` objects,
  `ByteMatchSet` objects, and other predicates that identify the requests that
  you want to block. If you add more than one predicate to a `Rule`, a request
  must match all of the specifications to be allowed or blocked. For example,
  suppose
  that
  you add the following to a `Rule`:

    *
  An `IPSet` that matches the IP address `192.0.2.44/32`

    *
  A `ByteMatchSet` that matches `BadBot` in the `User-Agent` header

  You then add the `Rule` to a `WebACL` and specify that you want to blocks
  requests that satisfy the `Rule`.
  For a request to be blocked, it must come from the IP address 192.0.2.44 *and*
  the `User-Agent` header in the request
  must contain the value `BadBot`.

  To create and configure a `Rule`, perform the following steps:

    1.
  Create and update the predicates that you want to include in the `Rule`. For
  more information, see
  `CreateByteMatchSet`, `CreateIPSet`, and `CreateSqlInjectionMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateRule` request.

    3.
  Submit a `CreateRule` request.

    4.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRule` request.

    5.
  Submit an `UpdateRule` request to specify the predicates that you want to
  include in the `Rule`.

    6.
  Create and update a `WebACL` that contains the `Rule`. For more information, see
  `CreateWebACL`.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_rule(map(), create_rule_request(), list()) ::
          {:ok, create_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_rule_errors()}
  def create_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `RuleGroup`. A rule group is a collection of predefined rules that you
  add to a web ACL. You use `UpdateRuleGroup` to add rules to the rule group.

  Rule groups are subject to the following limits:

    *
  Three rule groups per account. You can request an increase to this limit by
  contacting customer support.

    *
  One rule group per web ACL.

    *
  Ten rules per rule group.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_rule_group(map(), create_rule_group_request(), list()) ::
          {:ok, create_rule_group_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_rule_group_errors()}
  def create_rule_group(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateRuleGroup", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `SizeConstraintSet`. You then use `UpdateSizeConstraintSet` to
  identify the part of a
  web request that you want AWS WAF to check for length, such as the length of the
  `User-Agent` header or the length of the query string.
  For example, you can create a `SizeConstraintSet` that matches any requests that
  have a query string that is longer than 100 bytes.
  You can then configure AWS WAF to reject those requests.

  To create and configure a `SizeConstraintSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateSizeConstraintSet` request.

    2.
  Submit a `CreateSizeConstraintSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateSizeConstraintSet` request.

    4.
  Submit an `UpdateSizeConstraintSet` request to specify the part of the request
  that you want AWS WAF to inspect
  (for example, the header or the URI) and the value that you want AWS WAF to
  watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_size_constraint_set(map(), create_size_constraint_set_request(), list()) ::
          {:ok, create_size_constraint_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_size_constraint_set_errors()}
  def create_size_constraint_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateSizeConstraintSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `SqlInjectionMatchSet`, which you use to allow, block, or count
  requests that contain snippets of SQL code in a
  specified part of web requests. AWS WAF searches for character sequences that
  are likely to be malicious strings.

  To create and configure a `SqlInjectionMatchSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateSqlInjectionMatchSet` request.

    2.
  Submit a `CreateSqlInjectionMatchSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateSqlInjectionMatchSet` request.

    4.
  Submit an `UpdateSqlInjectionMatchSet` request to specify the parts of web
  requests in which you want to
  allow, block, or count malicious SQL code.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_sql_injection_match_set(map(), create_sql_injection_match_set_request(), list()) ::
          {:ok, create_sql_injection_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_sql_injection_match_set_errors()}
  def create_sql_injection_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateSqlInjectionMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates a `WebACL`, which contains the `Rules` that identify the CloudFront web
  requests that you want to allow, block, or count.
  AWS WAF evaluates `Rules` in order based on the value of `Priority` for each
  `Rule`.

  You also specify a default action, either `ALLOW` or `BLOCK`. If a web request
  doesn't match
  any of the `Rules` in a `WebACL`, AWS WAF responds to the request with the
  default action.

  To create and configure a `WebACL`, perform the following steps:

    1.
  Create and update the `ByteMatchSet` objects and other predicates that you want
  to include in `Rules`.
  For more information, see `CreateByteMatchSet`, `UpdateByteMatchSet`,
  `CreateIPSet`, `UpdateIPSet`,
  `CreateSqlInjectionMatchSet`, and `UpdateSqlInjectionMatchSet`.

    2.
  Create and update the `Rules` that you want to include in the `WebACL`. For more
  information, see
  `CreateRule` and `UpdateRule`.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateWebACL` request.

    4.
  Submit a `CreateWebACL` request.

    5.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateWebACL` request.

    6.
  Submit an `UpdateWebACL` request to specify the `Rules` that you want to include
  in the `WebACL`,
  to specify the default action, and to associate the `WebACL` with a CloudFront
  distribution.

  For more information about how to use the AWS WAF API, see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_web_acl(map(), create_web_acl_request(), list()) ::
          {:ok, create_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_web_acl_errors()}
  def create_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateWebACL", input, options)
  end

  @doc """
  Creates an AWS CloudFormation WAFV2 template for the specified web ACL in the
  specified Amazon S3 bucket.

  Then, in CloudFormation, you create a stack from the template, to create the web
  ACL and its resources in AWS WAFV2.
  Use this to migrate your AWS WAF Classic web ACL to the latest version of AWS
  WAF.

  This is part of a larger migration procedure for web ACLs from AWS WAF Classic
  to the latest version of AWS WAF.
  For the full procedure, including caveats and manual steps to complete
  the migration and switch over to the new web ACL, see
  [Migrating your AWS WAF Classic resources to AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-migrating-from-classic.html)
  in the [AWS WAF Developer
  Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  """
  @spec create_web_acl_migration_stack(map(), create_web_acl_migration_stack_request(), list()) ::
          {:ok, create_web_acl_migration_stack_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_web_acl_migration_stack_errors()}
  def create_web_acl_migration_stack(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateWebACLMigrationStack", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Creates an `XssMatchSet`, which you use to allow, block, or count requests that
  contain cross-site scripting attacks
  in the specified part of web requests. AWS WAF searches for character sequences
  that are likely to be malicious strings.

  To create and configure an `XssMatchSet`, perform the following steps:

    1.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `CreateXssMatchSet` request.

    2.
  Submit a `CreateXssMatchSet` request.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateXssMatchSet` request.

    4.
  Submit an `UpdateXssMatchSet` request to specify the parts of web requests in
  which you want to
  allow, block, or count cross-site scripting attacks.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec create_xss_match_set(map(), create_xss_match_set_request(), list()) ::
          {:ok, create_xss_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, create_xss_match_set_errors()}
  def create_xss_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "CreateXssMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `ByteMatchSet`. You can't delete a `ByteMatchSet` if it's
  still used in any `Rules`
  or if it still includes any `ByteMatchTuple` objects (any filters).

  If you just want to remove a `ByteMatchSet` from a `Rule`, use `UpdateRule`.

  To permanently delete a `ByteMatchSet`, perform the following steps:

    1.
  Update the `ByteMatchSet` to remove filters, if any. For more information, see
  `UpdateByteMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteByteMatchSet` request.

    3.
  Submit a `DeleteByteMatchSet` request.
  """
  @spec delete_byte_match_set(map(), delete_byte_match_set_request(), list()) ::
          {:ok, delete_byte_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_byte_match_set_errors()}
  def delete_byte_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteByteMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `GeoMatchSet`. You can't delete a `GeoMatchSet` if it's
  still used in any `Rules` or
  if it still includes any countries.

  If you just want to remove a `GeoMatchSet` from a `Rule`, use `UpdateRule`.

  To permanently delete a `GeoMatchSet` from AWS WAF, perform the following steps:

    1.
  Update the `GeoMatchSet` to remove any countries. For more information, see
  `UpdateGeoMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteGeoMatchSet` request.

    3.
  Submit a `DeleteGeoMatchSet` request.
  """
  @spec delete_geo_match_set(map(), delete_geo_match_set_request(), list()) ::
          {:ok, delete_geo_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_geo_match_set_errors()}
  def delete_geo_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteGeoMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes an `IPSet`. You can't delete an `IPSet` if it's still used
  in any `Rules` or
  if it still includes any IP addresses.

  If you just want to remove an `IPSet` from a `Rule`, use `UpdateRule`.

  To permanently delete an `IPSet` from AWS WAF, perform the following steps:

    1.
  Update the `IPSet` to remove IP address ranges, if any. For more information,
  see `UpdateIPSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteIPSet` request.

    3.
  Submit a `DeleteIPSet` request.
  """
  @spec delete_ip_set(map(), delete_ip_set_request(), list()) ::
          {:ok, delete_ip_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_ip_set_errors()}
  def delete_ip_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteIPSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes the `LoggingConfiguration` from the specified web
  ACL.
  """
  @spec delete_logging_configuration(map(), delete_logging_configuration_request(), list()) ::
          {:ok, delete_logging_configuration_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_logging_configuration_errors()}
  def delete_logging_configuration(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteLoggingConfiguration", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes an IAM policy from the specified RuleGroup.

  The user making the request must be the owner of the RuleGroup.
  """
  @spec delete_permission_policy(map(), delete_permission_policy_request(), list()) ::
          {:ok, delete_permission_policy_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_permission_policy_errors()}
  def delete_permission_policy(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeletePermissionPolicy", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `RateBasedRule`. You can't delete a rule if
  it's still used in any `WebACL` objects or if it still includes any predicates,
  such as `ByteMatchSet` objects.

  If you just want to remove a rule from a `WebACL`, use `UpdateWebACL`.

  To permanently delete a `RateBasedRule` from AWS WAF, perform the following
  steps:

    1.
  Update the `RateBasedRule` to remove predicates, if any. For more
  information, see `UpdateRateBasedRule`.

    2.
  Use `GetChangeToken` to get the change token that you provide
  in the `ChangeToken` parameter of a `DeleteRateBasedRule`
  request.

    3.
  Submit a `DeleteRateBasedRule` request.
  """
  @spec delete_rate_based_rule(map(), delete_rate_based_rule_request(), list()) ::
          {:ok, delete_rate_based_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_rate_based_rule_errors()}
  def delete_rate_based_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteRateBasedRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `RegexMatchSet`. You can't delete a `RegexMatchSet` if
  it's still used in any `Rules`
  or if it still includes any `RegexMatchTuples` objects (any filters).

  If you just want to remove a `RegexMatchSet` from a `Rule`, use `UpdateRule`.

  To permanently delete a `RegexMatchSet`, perform the following steps:

    1.
  Update the `RegexMatchSet` to remove filters, if any. For more information, see
  `UpdateRegexMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteRegexMatchSet` request.

    3.
  Submit a `DeleteRegexMatchSet` request.
  """
  @spec delete_regex_match_set(map(), delete_regex_match_set_request(), list()) ::
          {:ok, delete_regex_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_regex_match_set_errors()}
  def delete_regex_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteRegexMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `RegexPatternSet`. You can't delete a `RegexPatternSet` if
  it's still used in any `RegexMatchSet`
  or if the `RegexPatternSet` is not empty.
  """
  @spec delete_regex_pattern_set(map(), delete_regex_pattern_set_request(), list()) ::
          {:ok, delete_regex_pattern_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_regex_pattern_set_errors()}
  def delete_regex_pattern_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteRegexPatternSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `Rule`. You can't delete a `Rule` if it's still used in
  any `WebACL`
  objects or if it still includes any predicates, such as `ByteMatchSet` objects.

  If you just want to remove a `Rule` from a `WebACL`, use `UpdateWebACL`.

  To permanently delete a `Rule` from AWS WAF, perform the following steps:

    1.
  Update the `Rule` to remove predicates, if any. For more information, see
  `UpdateRule`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteRule` request.

    3.
  Submit a `DeleteRule` request.
  """
  @spec delete_rule(map(), delete_rule_request(), list()) ::
          {:ok, delete_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_rule_errors()}
  def delete_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `RuleGroup`. You can't delete a `RuleGroup` if it's still
  used in any `WebACL`
  objects or if it still includes any rules.

  If you just want to remove a `RuleGroup` from a `WebACL`, use `UpdateWebACL`.

  To permanently delete a `RuleGroup` from AWS WAF, perform the following steps:

    1.
  Update the `RuleGroup` to remove rules, if any. For more information, see
  `UpdateRuleGroup`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteRuleGroup` request.

    3.
  Submit a `DeleteRuleGroup` request.
  """
  @spec delete_rule_group(map(), delete_rule_group_request(), list()) ::
          {:ok, delete_rule_group_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_rule_group_errors()}
  def delete_rule_group(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteRuleGroup", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `SizeConstraintSet`. You can't delete a
  `SizeConstraintSet` if it's still used in any `Rules`
  or if it still includes any `SizeConstraint` objects (any filters).

  If you just want to remove a `SizeConstraintSet` from a `Rule`, use
  `UpdateRule`.

  To permanently delete a `SizeConstraintSet`, perform the following steps:

    1.
  Update the `SizeConstraintSet` to remove filters, if any. For more information,
  see `UpdateSizeConstraintSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteSizeConstraintSet` request.

    3.
  Submit a `DeleteSizeConstraintSet` request.
  """
  @spec delete_size_constraint_set(map(), delete_size_constraint_set_request(), list()) ::
          {:ok, delete_size_constraint_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_size_constraint_set_errors()}
  def delete_size_constraint_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteSizeConstraintSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `SqlInjectionMatchSet`. You can't delete a
  `SqlInjectionMatchSet` if it's
  still used in any `Rules` or if it still contains any `SqlInjectionMatchTuple`
  objects.

  If you just want to remove a `SqlInjectionMatchSet` from a `Rule`, use
  `UpdateRule`.

  To permanently delete a `SqlInjectionMatchSet` from AWS WAF, perform the
  following steps:

    1.
  Update the `SqlInjectionMatchSet` to remove filters, if any. For more
  information, see
  `UpdateSqlInjectionMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteSqlInjectionMatchSet` request.

    3.
  Submit a `DeleteSqlInjectionMatchSet` request.
  """
  @spec delete_sql_injection_match_set(map(), delete_sql_injection_match_set_request(), list()) ::
          {:ok, delete_sql_injection_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_sql_injection_match_set_errors()}
  def delete_sql_injection_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteSqlInjectionMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes a `WebACL`. You can't delete a `WebACL` if it still contains
  any `Rules`.

  To delete a `WebACL`, perform the following steps:

    1.
  Update the `WebACL` to remove `Rules`, if any. For more information, see
  `UpdateWebACL`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteWebACL` request.

    3.
  Submit a `DeleteWebACL` request.
  """
  @spec delete_web_acl(map(), delete_web_acl_request(), list()) ::
          {:ok, delete_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_web_acl_errors()}
  def delete_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Permanently deletes an `XssMatchSet`. You can't delete an `XssMatchSet` if it's
  still used in any `Rules` or if it still contains any `XssMatchTuple` objects.

  If you just want to remove an `XssMatchSet` from a `Rule`, use `UpdateRule`.

  To permanently delete an `XssMatchSet` from AWS WAF, perform the following
  steps:

    1.
  Update the `XssMatchSet` to remove filters, if any. For more information, see
  `UpdateXssMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of a
  `DeleteXssMatchSet` request.

    3.
  Submit a `DeleteXssMatchSet` request.
  """
  @spec delete_xss_match_set(map(), delete_xss_match_set_request(), list()) ::
          {:ok, delete_xss_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, delete_xss_match_set_errors()}
  def delete_xss_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DeleteXssMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic Regional** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Removes a web ACL from the specified resource, either an application load
  balancer or Amazon API Gateway stage.
  """
  @spec disassociate_web_acl(map(), disassociate_web_acl_request(), list()) ::
          {:ok, disassociate_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, disassociate_web_acl_errors()}
  def disassociate_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "DisassociateWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `ByteMatchSet` specified by `ByteMatchSetId`.
  """
  @spec get_byte_match_set(map(), get_byte_match_set_request(), list()) ::
          {:ok, get_byte_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_byte_match_set_errors()}
  def get_byte_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetByteMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  When you want to create, update, or delete AWS WAF objects, get a change token
  and include the change token in the create, update, or delete request. Change
  tokens ensure that your application doesn't submit conflicting requests to AWS
  WAF.

  Each create, update, or delete request must use a unique change token. If your
  application submits a `GetChangeToken` request
  and then submits a second `GetChangeToken` request before submitting a create,
  update, or delete request, the second
  `GetChangeToken` request returns the same value as the first `GetChangeToken`
  request.

  When you use a change token in a create, update, or delete request, the status
  of the change token changes to `PENDING`,
  which indicates that AWS WAF is propagating the change to all AWS WAF servers.
  Use `GetChangeTokenStatus` to determine the
  status of your change token.
  """
  @spec get_change_token(map(), get_change_token_request(), list()) ::
          {:ok, get_change_token_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_change_token_errors()}
  def get_change_token(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetChangeToken", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the status of a `ChangeToken` that you got by calling `GetChangeToken`.
  `ChangeTokenStatus` is
  one of the following values:

    *

  `PROVISIONED`: You requested the change token by calling `GetChangeToken`, but
  you haven't used it yet
  in a call to create, update, or delete an AWS WAF object.

    *

  `PENDING`: AWS WAF is propagating the create, update, or delete request to all
  AWS WAF servers.

    *

  `INSYNC`: Propagation is complete.
  """
  @spec get_change_token_status(map(), get_change_token_status_request(), list()) ::
          {:ok, get_change_token_status_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_change_token_status_errors()}
  def get_change_token_status(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetChangeTokenStatus", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `GeoMatchSet` that is specified by `GeoMatchSetId`.
  """
  @spec get_geo_match_set(map(), get_geo_match_set_request(), list()) ::
          {:ok, get_geo_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_geo_match_set_errors()}
  def get_geo_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetGeoMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `IPSet` that is specified by `IPSetId`.
  """
  @spec get_ip_set(map(), get_ip_set_request(), list()) ::
          {:ok, get_ip_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_ip_set_errors()}
  def get_ip_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetIPSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `LoggingConfiguration` for the specified web ACL.
  """
  @spec get_logging_configuration(map(), get_logging_configuration_request(), list()) ::
          {:ok, get_logging_configuration_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_logging_configuration_errors()}
  def get_logging_configuration(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetLoggingConfiguration", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the IAM policy attached to the RuleGroup.
  """
  @spec get_permission_policy(map(), get_permission_policy_request(), list()) ::
          {:ok, get_permission_policy_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_permission_policy_errors()}
  def get_permission_policy(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetPermissionPolicy", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `RateBasedRule` that is specified by the
  `RuleId` that you included in the `GetRateBasedRule`
  request.
  """
  @spec get_rate_based_rule(map(), get_rate_based_rule_request(), list()) ::
          {:ok, get_rate_based_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_rate_based_rule_errors()}
  def get_rate_based_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRateBasedRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of IP addresses currently being blocked by the `RateBasedRule`
  that is specified by the `RuleId`. The maximum
  number of managed keys that will be blocked is 10,000. If more than 10,000
  addresses exceed
  the rate limit, the 10,000 addresses with the highest rates will be blocked.
  """
  @spec get_rate_based_rule_managed_keys(
          map(),
          get_rate_based_rule_managed_keys_request(),
          list()
        ) ::
          {:ok, get_rate_based_rule_managed_keys_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_rate_based_rule_managed_keys_errors()}
  def get_rate_based_rule_managed_keys(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRateBasedRuleManagedKeys", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `RegexMatchSet` specified by `RegexMatchSetId`.
  """
  @spec get_regex_match_set(map(), get_regex_match_set_request(), list()) ::
          {:ok, get_regex_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_regex_match_set_errors()}
  def get_regex_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRegexMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `RegexPatternSet` specified by `RegexPatternSetId`.
  """
  @spec get_regex_pattern_set(map(), get_regex_pattern_set_request(), list()) ::
          {:ok, get_regex_pattern_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_regex_pattern_set_errors()}
  def get_regex_pattern_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRegexPatternSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `Rule` that is specified by the `RuleId` that you included in the
  `GetRule` request.
  """
  @spec get_rule(map(), get_rule_request(), list()) ::
          {:ok, get_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_rule_errors()}
  def get_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `RuleGroup` that is specified by the `RuleGroupId` that you included
  in the `GetRuleGroup` request.

  To view the rules in a rule group, use `ListActivatedRulesInRuleGroup`.
  """
  @spec get_rule_group(map(), get_rule_group_request(), list()) ::
          {:ok, get_rule_group_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_rule_group_errors()}
  def get_rule_group(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetRuleGroup", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Gets detailed information about a specified number of requests--a sample--that
  AWS WAF randomly selects from among the first 5,000 requests that your AWS
  resource received during a time range that you choose. You can specify a sample
  size of up to 500 requests, and you can specify any time range in the previous
  three hours.

  `GetSampledRequests` returns a time range, which is usually the time range that
  you specified. However, if your resource
  (such as a CloudFront distribution) received 5,000 requests before the specified
  time range elapsed, `GetSampledRequests`
  returns an updated time range. This new time range indicates the actual period
  during which AWS WAF selected the requests in the sample.
  """
  @spec get_sampled_requests(map(), get_sampled_requests_request(), list()) ::
          {:ok, get_sampled_requests_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_sampled_requests_errors()}
  def get_sampled_requests(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetSampledRequests", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `SizeConstraintSet` specified by `SizeConstraintSetId`.
  """
  @spec get_size_constraint_set(map(), get_size_constraint_set_request(), list()) ::
          {:ok, get_size_constraint_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_size_constraint_set_errors()}
  def get_size_constraint_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetSizeConstraintSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `SqlInjectionMatchSet` that is specified by
  `SqlInjectionMatchSetId`.
  """
  @spec get_sql_injection_match_set(map(), get_sql_injection_match_set_request(), list()) ::
          {:ok, get_sql_injection_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_sql_injection_match_set_errors()}
  def get_sql_injection_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetSqlInjectionMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `WebACL` that is specified by `WebACLId`.
  """
  @spec get_web_acl(map(), get_web_acl_request(), list()) ::
          {:ok, get_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_web_acl_errors()}
  def get_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic Regional** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the web ACL for the specified resource, either an application load
  balancer or Amazon API Gateway stage.
  """
  @spec get_web_acl_for_resource(map(), get_web_acl_for_resource_request(), list()) ::
          {:ok, get_web_acl_for_resource_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_web_acl_for_resource_errors()}
  def get_web_acl_for_resource(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetWebACLForResource", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns the `XssMatchSet` that is specified by `XssMatchSetId`.
  """
  @spec get_xss_match_set(map(), get_xss_match_set_request(), list()) ::
          {:ok, get_xss_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, get_xss_match_set_errors()}
  def get_xss_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "GetXssMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `ActivatedRule` objects.
  """
  @spec list_activated_rules_in_rule_group(
          map(),
          list_activated_rules_in_rule_group_request(),
          list()
        ) ::
          {:ok, list_activated_rules_in_rule_group_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_activated_rules_in_rule_group_errors()}
  def list_activated_rules_in_rule_group(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListActivatedRulesInRuleGroup", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `ByteMatchSetSummary` objects.
  """
  @spec list_byte_match_sets(map(), list_byte_match_sets_request(), list()) ::
          {:ok, list_byte_match_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_byte_match_sets_errors()}
  def list_byte_match_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListByteMatchSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `GeoMatchSetSummary` objects in the response.
  """
  @spec list_geo_match_sets(map(), list_geo_match_sets_request(), list()) ::
          {:ok, list_geo_match_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_geo_match_sets_errors()}
  def list_geo_match_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListGeoMatchSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `IPSetSummary` objects in the response.
  """
  @spec list_ip_sets(map(), list_ip_sets_request(), list()) ::
          {:ok, list_ip_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_ip_sets_errors()}
  def list_ip_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListIPSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `LoggingConfiguration` objects.
  """
  @spec list_logging_configurations(map(), list_logging_configurations_request(), list()) ::
          {:ok, list_logging_configurations_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_logging_configurations_errors()}
  def list_logging_configurations(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListLoggingConfigurations", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RuleSummary` objects.
  """
  @spec list_rate_based_rules(map(), list_rate_based_rules_request(), list()) ::
          {:ok, list_rate_based_rules_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_rate_based_rules_errors()}
  def list_rate_based_rules(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListRateBasedRules", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RegexMatchSetSummary` objects.
  """
  @spec list_regex_match_sets(map(), list_regex_match_sets_request(), list()) ::
          {:ok, list_regex_match_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_regex_match_sets_errors()}
  def list_regex_match_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListRegexMatchSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RegexPatternSetSummary` objects.
  """
  @spec list_regex_pattern_sets(map(), list_regex_pattern_sets_request(), list()) ::
          {:ok, list_regex_pattern_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_regex_pattern_sets_errors()}
  def list_regex_pattern_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListRegexPatternSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic Regional** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of resources associated with the specified web ACL.
  """
  @spec list_resources_for_web_acl(map(), list_resources_for_web_acl_request(), list()) ::
          {:ok, list_resources_for_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_resources_for_web_acl_errors()}
  def list_resources_for_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListResourcesForWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RuleGroup` objects.
  """
  @spec list_rule_groups(map(), list_rule_groups_request(), list()) ::
          {:ok, list_rule_groups_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_rule_groups_errors()}
  def list_rule_groups(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListRuleGroups", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RuleSummary` objects.
  """
  @spec list_rules(map(), list_rules_request(), list()) ::
          {:ok, list_rules_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_rules_errors()}
  def list_rules(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListRules", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `SizeConstraintSetSummary` objects.
  """
  @spec list_size_constraint_sets(map(), list_size_constraint_sets_request(), list()) ::
          {:ok, list_size_constraint_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_size_constraint_sets_errors()}
  def list_size_constraint_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListSizeConstraintSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `SqlInjectionMatchSet` objects.
  """
  @spec list_sql_injection_match_sets(map(), list_sql_injection_match_sets_request(), list()) ::
          {:ok, list_sql_injection_match_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_sql_injection_match_sets_errors()}
  def list_sql_injection_match_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListSqlInjectionMatchSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `RuleGroup` objects that you are subscribed to.
  """
  @spec list_subscribed_rule_groups(map(), list_subscribed_rule_groups_request(), list()) ::
          {:ok, list_subscribed_rule_groups_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_subscribed_rule_groups_errors()}
  def list_subscribed_rule_groups(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListSubscribedRuleGroups", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Retrieves the tags associated with the specified AWS resource. Tags are
  key:value pairs that you can use to categorize and manage your resources, for
  purposes like billing. For example, you might set the tag key to "customer" and
  the value to the customer name or ID. You can specify one or more tags to add to
  each AWS resource, up to 50 tags for a resource.

  Tagging is only available through the API, SDKs, and CLI. You can't manage or
  view tags through the AWS WAF Classic console. You can tag the AWS resources
  that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.
  """
  @spec list_tags_for_resource(map(), list_tags_for_resource_request(), list()) ::
          {:ok, list_tags_for_resource_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_tags_for_resource_errors()}
  def list_tags_for_resource(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListTagsForResource", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `WebACLSummary` objects in the response.
  """
  @spec list_web_acls(map(), list_web_acls_request(), list()) ::
          {:ok, list_web_acls_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_web_acls_errors()}
  def list_web_acls(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListWebACLs", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Returns an array of `XssMatchSet` objects.
  """
  @spec list_xss_match_sets(map(), list_xss_match_sets_request(), list()) ::
          {:ok, list_xss_match_sets_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, list_xss_match_sets_errors()}
  def list_xss_match_sets(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "ListXssMatchSets", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Associates a `LoggingConfiguration` with a specified web ACL.

  You can access information about all traffic that AWS WAF inspects using the
  following
  steps:

    1.
  Create an Amazon Kinesis Data
  Firehose.

  Create the data firehose with a PUT source and in the region that you are
  operating. However, if you are capturing logs for Amazon CloudFront, always
  create the firehose in US East (N. Virginia).

  Do not create the data firehose using a `Kinesis stream` as your source.

    2.
  Associate that firehose to your web ACL using a `PutLoggingConfiguration`
  request.

  When you successfully enable logging using a `PutLoggingConfiguration` request,
  AWS WAF will create a service linked role with the necessary permissions to
  write logs to the Amazon Kinesis Data Firehose. For more information, see
  [Logging Web ACL Traffic Information](https://docs.aws.amazon.com/waf/latest/developerguide/logging.html)
  in the *AWS WAF Developer Guide*.
  """
  @spec put_logging_configuration(map(), put_logging_configuration_request(), list()) ::
          {:ok, put_logging_configuration_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, put_logging_configuration_errors()}
  def put_logging_configuration(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "PutLoggingConfiguration", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Attaches an IAM policy to the specified resource. The only supported use for
  this action is to share a RuleGroup across accounts.

  The `PutPermissionPolicy` is subject to the following restrictions:

    *
  You can attach only one policy with each `PutPermissionPolicy` request.

    *
  The policy must include an `Effect`, `Action` and `Principal`.

    *

  `Effect` must specify `Allow`.

    *
  The `Action` in the policy must be `waf:UpdateWebACL`,
  `waf-regional:UpdateWebACL`, `waf:GetRuleGroup` and `waf-regional:GetRuleGroup`
  . Any extra or wildcard actions in the policy will be rejected.

    *
  The policy cannot include a `Resource` parameter.

    *
  The ARN in the request must be a valid WAF RuleGroup ARN and the RuleGroup must
  exist in the same region.

    *
  The user making the request must be the owner of the RuleGroup.

    *
  Your policy must be composed using IAM Policy version 2012-10-17.

  For more information, see [IAM Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html).

  An example of a valid policy parameter is shown in the Examples section below.
  """
  @spec put_permission_policy(map(), put_permission_policy_request(), list()) ::
          {:ok, put_permission_policy_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, put_permission_policy_errors()}
  def put_permission_policy(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "PutPermissionPolicy", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Associates tags with the specified AWS resource. Tags are key:value pairs that
  you can use to categorize and manage your resources, for purposes like billing.
  For example, you might set the tag key to "customer" and the value to the
  customer name or ID. You can specify one or more tags to add to each AWS
  resource, up to 50 tags for a resource.

  Tagging is only available through the API, SDKs, and CLI. You can't manage or
  view tags through the AWS WAF Classic console. You can use this action to tag
  the AWS resources that you manage through AWS WAF Classic: web ACLs, rule
  groups, and rules.
  """
  @spec tag_resource(map(), tag_resource_request(), list()) ::
          {:ok, tag_resource_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, tag_resource_errors()}
  def tag_resource(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "TagResource", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.
  """
  @spec untag_resource(map(), untag_resource_request(), list()) ::
          {:ok, untag_resource_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, untag_resource_errors()}
  def untag_resource(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UntagResource", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `ByteMatchTuple` objects (filters) in a `ByteMatchSet`. For
  each `ByteMatchTuple` object,
  you specify the following values:

    *
  Whether to insert or delete the object from the array. If you want to change a
  `ByteMatchSetUpdate` object,
  you delete the existing object and add a new one.

    *
  The part of a web request that you want AWS WAF to inspect, such as a query
  string or the value of the `User-Agent` header.

    *
  The bytes (typically a string that corresponds with ASCII characters) that you
  want AWS WAF to look for. For more information, including how you specify
  the values for the AWS WAF API and the AWS CLI or SDKs, see `TargetString` in
  the `ByteMatchTuple` data type.

    *
  Where to look, such as at the beginning or the end of a query string.

    *
  Whether to perform any conversions on the request, such as converting it to
  lowercase, before inspecting it for the specified string.

  For example, you can add a `ByteMatchSetUpdate` object that matches web requests
  in which `User-Agent` headers contain
  the string `BadBot`. You can then configure AWS WAF to block those requests.

  To create and configure a `ByteMatchSet`, perform the following steps:

    1.
  Create a `ByteMatchSet.` For more information, see `CreateByteMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateByteMatchSet` request.

    3.
  Submit an `UpdateByteMatchSet` request to specify the part of the request that
  you want AWS WAF to inspect
  (for example, the header or the URI) and the value that you want AWS WAF to
  watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_byte_match_set(map(), update_byte_match_set_request(), list()) ::
          {:ok, update_byte_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_byte_match_set_errors()}
  def update_byte_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateByteMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `GeoMatchConstraint` objects in an `GeoMatchSet`. For each
  `GeoMatchConstraint` object,
  you specify the following values:

    *
  Whether to insert or delete the object from the array. If you want to change an
  `GeoMatchConstraint` object, you delete the existing object and add a new one.

    *
  The `Type`. The only valid value for `Type` is `Country`.

    *
  The `Value`, which is a two character code for the country to add to the
  `GeoMatchConstraint` object. Valid codes are listed in
  `GeoMatchConstraint$Value`.

  To create and configure an `GeoMatchSet`, perform the following steps:

    1.
  Submit a `CreateGeoMatchSet` request.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateGeoMatchSet` request.

    3.
  Submit an `UpdateGeoMatchSet` request to specify the country that you want AWS
  WAF to watch for.

  When you update an `GeoMatchSet`, you specify the country that you want to add
  and/or the country that you want to delete.
  If you want to change a country, you delete the existing country and add the new
  one.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_geo_match_set(map(), update_geo_match_set_request(), list()) ::
          {:ok, update_geo_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_geo_match_set_errors()}
  def update_geo_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateGeoMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `IPSetDescriptor` objects in an
  `IPSet`. For each `IPSetDescriptor` object, you specify the following
  values:

    *
  Whether to insert or delete the object from the array. If you want to change an
  `IPSetDescriptor` object, you delete the existing object and add a new
  one.

    *
  The IP address version, `IPv4` or `IPv6`.

    *
  The IP address in CIDR notation, for example, `192.0.2.0/24` (for
  the range of IP addresses from `192.0.2.0` to `192.0.2.255`) or
  `192.0.2.44/32` (for the individual IP address
  `192.0.2.44`).

  AWS WAF supports IPv4 address ranges: /8 and any range between /16 through /32.
  AWS
  WAF supports IPv6 address ranges: /24, /32, /48, /56, /64, and /128. For more
  information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain
  Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).

  IPv6 addresses can be represented using any of the following formats:

    *
  1111:0000:0000:0000:0000:0000:0000:0111/128

    *
  1111:0:0:0:0:0:0:0111/128

    *
  1111::0111/128

    *
  1111::111/128

  You use an `IPSet` to specify which web requests you want to allow or
  block based on the IP addresses that the requests originated from. For example,
  if you're
  receiving a lot of requests from one or a small number of IP addresses and you
  want to
  block the requests, you can create an `IPSet` that specifies those IP addresses,
  and then configure AWS WAF to block the requests.

  To create and configure an `IPSet`, perform the following steps:

    1.
  Submit a `CreateIPSet` request.

    2.
  Use `GetChangeToken` to get the change token that you provide
  in the `ChangeToken` parameter of an `UpdateIPSet`
  request.

    3.
  Submit an `UpdateIPSet` request to specify the IP addresses that you
  want AWS WAF to watch for.

  When you update an `IPSet`, you specify the IP addresses that you want to
  add and/or the IP addresses that you want to delete. If you want to change an IP
  address,
  you delete the existing IP address and add the new one.

  You can insert a maximum of 1000 addresses in a single
  request.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_ip_set(map(), update_ip_set_request(), list()) ::
          {:ok, update_ip_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_ip_set_errors()}
  def update_ip_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateIPSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `Predicate` objects in a rule and updates the
  `RateLimit` in the rule.

  Each `Predicate` object identifies a predicate, such as a `ByteMatchSet` or an
  `IPSet`, that specifies the web requests
  that you want to block or count. The `RateLimit` specifies the number of
  requests every five minutes that triggers the rule.

  If you add more than one predicate to a `RateBasedRule`, a request must
  match all the predicates and exceed the `RateLimit` to be counted or blocked.
  For example, suppose you add the following to a `RateBasedRule`:

    *
  An `IPSet` that matches the IP address `192.0.2.44/32`

    *
  A `ByteMatchSet` that matches `BadBot` in the
  `User-Agent` header

  Further, you specify a
  `RateLimit` of 1,000.

  You then add the `RateBasedRule` to a `WebACL` and specify that
  you want to block requests that satisfy the rule. For a request to be blocked,
  it must come
  from the IP address 192.0.2.44 *and* the `User-Agent` header
  in the request must contain the value `BadBot`. Further, requests that match
  these two conditions much be received at a rate of more than 1,000 every five
  minutes. If
  the rate drops below this limit, AWS WAF no longer blocks the requests.

  As a second example, suppose you want to limit requests to a particular page on
  your site. To do this, you could add the following to a
  `RateBasedRule`:

    *
  A `ByteMatchSet` with `FieldToMatch` of `URI`

    *
  A `PositionalConstraint` of `STARTS_WITH`

    *
  A `TargetString` of `login`

  Further, you specify a `RateLimit` of 1,000.

  By adding this `RateBasedRule` to a `WebACL`, you could limit requests to your
  login page without affecting the rest of your site.
  """
  @spec update_rate_based_rule(map(), update_rate_based_rule_request(), list()) ::
          {:ok, update_rate_based_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_rate_based_rule_errors()}
  def update_rate_based_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateRateBasedRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `RegexMatchTuple` objects (filters) in a `RegexMatchSet`. For
  each `RegexMatchSetUpdate` object,
  you specify the following values:

    *
  Whether to insert or delete the object from the array. If you want to change a
  `RegexMatchSetUpdate` object,
  you delete the existing object and add a new one.

    *
  The part of a web request that you want AWS WAF to inspectupdate, such as a
  query string or the value of the `User-Agent` header.

    *
  The identifier of the pattern (a regular expression) that you want AWS WAF to
  look for. For more information, see `RegexPatternSet`.

    *
  Whether to perform any conversions on the request, such as converting it to
  lowercase, before inspecting it for the specified string.

  For example, you can create a `RegexPatternSet` that matches any requests with
  `User-Agent` headers
  that contain the string `B[a@]dB[o0]t`. You can then configure AWS WAF to reject those requests.

  To create and configure a `RegexMatchSet`, perform the following steps:

    1.
  Create a `RegexMatchSet.` For more information, see `CreateRegexMatchSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRegexMatchSet` request.

    3.
  Submit an `UpdateRegexMatchSet` request to specify the part of the request that
  you want AWS WAF to inspect
  (for example, the header or the URI) and the identifier of the `RegexPatternSet`
  that contain the regular expression patters you want AWS WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer
  Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_regex_match_set(map(), update_regex_match_set_request(), list()) ::
          {:ok, update_regex_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_regex_match_set_errors()}
  def update_regex_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateRegexMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `RegexPatternString` objects in a `RegexPatternSet`. For each
  `RegexPatternString` object,
  you specify the following values:

    *
  Whether to insert or delete the `RegexPatternString`.

    *
  The regular expression pattern that you want to insert or delete. For more
  information, see `RegexPatternSet`.

  For example, you can create a `RegexPatternString` such as `B[a@]dB[o0]t`. AWS WAF will match this `RegexPatternString` to:

    *
  BadBot

    *
  BadB0t

    *
  B@dBot

    *
  B@dB0t

  To create and configure a `RegexPatternSet`, perform the following steps:

    1.
  Create a `RegexPatternSet.` For more information, see `CreateRegexPatternSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRegexPatternSet` request.

    3.
  Submit an `UpdateRegexPatternSet` request to specify the regular expression
  pattern that you want AWS WAF to watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer
  Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_regex_pattern_set(map(), update_regex_pattern_set_request(), list()) ::
          {:ok, update_regex_pattern_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_regex_pattern_set_errors()}
  def update_regex_pattern_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateRegexPatternSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `Predicate` objects in a `Rule`. Each
  `Predicate` object identifies a predicate, such as a `ByteMatchSet` or an
  `IPSet`, that specifies the web requests
  that you want to allow, block, or count. If you add more than one predicate to a
  `Rule`, a request must match all of the specifications to be allowed,
  blocked, or counted. For example, suppose
  that
  you add the following to a `Rule`:

    *
  A `ByteMatchSet` that matches the value `BadBot` in the `User-Agent` header

    *
  An `IPSet` that matches the IP address `192.0.2.44`

  You then add the `Rule` to a `WebACL` and specify that you want to block
  requests that satisfy the `Rule`.
  For a request to be blocked, the `User-Agent` header in the request must contain
  the value `BadBot`
  *and* the request must originate from the IP address 192.0.2.44.

  To create and configure a `Rule`, perform the following steps:

    1.
  Create and update the predicates that you want to include in the `Rule`.

    2.
  Create the `Rule`. See `CreateRule`.

    3.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRule` request.

    4.
  Submit an `UpdateRule` request to add predicates to the `Rule`.

    5.
  Create and update a `WebACL` that contains the `Rule`. See `CreateWebACL`.

  If you want to replace one `ByteMatchSet` or `IPSet` with another, you delete
  the existing one and
  add the new one.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_rule(map(), update_rule_request(), list()) ::
          {:ok, update_rule_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_rule_errors()}
  def update_rule(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateRule", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `ActivatedRule` objects in a `RuleGroup`.

  You can only insert `REGULAR` rules into a rule group.

  You can have a maximum of ten rules per rule group.

  To create and configure a `RuleGroup`, perform the following steps:

    1.
  Create and update the `Rules` that you want to include in the `RuleGroup`. See
  `CreateRule`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateRuleGroup` request.

    3.
  Submit an `UpdateRuleGroup` request to add `Rules` to the `RuleGroup`.

    4.
  Create and update a `WebACL` that contains the `RuleGroup`. See `CreateWebACL`.

  If you want to replace one `Rule` with another, you delete the existing one and
  add the new one.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_rule_group(map(), update_rule_group_request(), list()) ::
          {:ok, update_rule_group_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_rule_group_errors()}
  def update_rule_group(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateRuleGroup", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `SizeConstraint` objects (filters) in a `SizeConstraintSet`.
  For each `SizeConstraint` object,
  you specify the following values:

    *
  Whether to insert or delete the object from the array. If you want to change a
  `SizeConstraintSetUpdate` object,
  you delete the existing object and add a new one.

    *
  The part of a web request that you want AWS WAF to evaluate, such as the length
  of a query string or the length of the
  `User-Agent` header.

    *
  Whether to perform any transformations on the request, such as converting it to
  lowercase, before checking its length.
  Note that transformations of the request body are not supported because the AWS
  resource forwards only the first `8192` bytes
  of your request to AWS WAF.

  You can only specify a single type of TextTransformation.

    *
  A `ComparisonOperator` used for evaluating the selected part of the request
  against the specified `Size`, such as
  equals, greater than, less than, and so on.

    *
  The length, in bytes, that you want AWS WAF to watch for in selected part of the
  request. The length is computed after applying the transformation.

  For example, you can add a `SizeConstraintSetUpdate` object that matches web
  requests in which the length of the
  `User-Agent` header is greater than 100 bytes. You can then configure AWS WAF to
  block those requests.

  To create and configure a `SizeConstraintSet`, perform the following steps:

    1.
  Create a `SizeConstraintSet.` For more information, see
  `CreateSizeConstraintSet`.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateSizeConstraintSet` request.

    3.
  Submit an `UpdateSizeConstraintSet` request to specify the part of the request
  that you want AWS WAF to inspect
  (for example, the header or the URI) and the value that you want AWS WAF to
  watch for.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_size_constraint_set(map(), update_size_constraint_set_request(), list()) ::
          {:ok, update_size_constraint_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_size_constraint_set_errors()}
  def update_size_constraint_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateSizeConstraintSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `SqlInjectionMatchTuple` objects (filters) in a
  `SqlInjectionMatchSet`.
  For each `SqlInjectionMatchTuple` object, you specify the following values:

    *

  `Action`: Whether to insert the object into or delete the object from the array.
  To change a
  `SqlInjectionMatchTuple`, you delete the existing object and add a new one.

    *

  `FieldToMatch`: The part of web requests that you want AWS WAF to inspect and,
  if you want AWS WAF to inspect a header or custom query parameter,
  the name of the header or parameter.

    *

  `TextTransformation`: Which text transformation, if any, to perform on the web
  request before
  inspecting the request for snippets of malicious SQL code.

  You can only specify a single type of TextTransformation.

  You use `SqlInjectionMatchSet` objects to specify which CloudFront
  requests that
  you want to allow, block, or count. For example, if you're receiving
  requests that contain snippets of SQL code in the query string and you want to
  block the
  requests, you can create a `SqlInjectionMatchSet` with the applicable settings,
  and then configure AWS WAF to block the requests.

  To create and configure a `SqlInjectionMatchSet`, perform the following steps:

    1.
  Submit a `CreateSqlInjectionMatchSet` request.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateIPSet` request.

    3.
  Submit an `UpdateSqlInjectionMatchSet` request to specify the parts of web
  requests that you want AWS WAF to
  inspect for snippets of SQL code.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_sql_injection_match_set(map(), update_sql_injection_match_set_request(), list()) ::
          {:ok, update_sql_injection_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_sql_injection_match_set_errors()}
  def update_sql_injection_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateSqlInjectionMatchSet", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `ActivatedRule` objects in a `WebACL`. Each `Rule` identifies
  web requests that you want to allow, block, or count. When you update a
  `WebACL`, you specify the following values:

    *
  A default action for the `WebACL`, either `ALLOW` or `BLOCK`.
  AWS WAF performs the default action if a request doesn't match the criteria in
  any of the `Rules` in a `WebACL`.

    *
  The `Rules` that you want to add
  or
  delete. If you want to replace one `Rule` with another, you delete the
  existing `Rule` and add the new one.

    *
  For each `Rule`, whether you want AWS WAF to allow requests, block requests, or
  count requests that match
  the conditions in the `Rule`.

    *
  The order in which you want AWS WAF to evaluate the `Rules` in a
  `WebACL`. If you add more than one `Rule` to a
  `WebACL`, AWS WAF evaluates each request against the `Rules`
  in order based on the value of `Priority`. (The `Rule` that has
  the lowest value for `Priority` is evaluated first.) When a web request
  matches all
  the
  predicates (such as `ByteMatchSets` and `IPSets`) in a
  `Rule`, AWS WAF immediately takes the corresponding action, allow or
  block, and doesn't evaluate the request against the remaining `Rules` in
  the `WebACL`, if any.

  To create and configure a `WebACL`, perform the following steps:

    1.
  Create and update the predicates that you want to include in `Rules`.
  For more information, see `CreateByteMatchSet`, `UpdateByteMatchSet`,
  `CreateIPSet`, `UpdateIPSet`,
  `CreateSqlInjectionMatchSet`, and `UpdateSqlInjectionMatchSet`.

    2.
  Create and update the `Rules` that you want to include in the `WebACL`. For more
  information, see
  `CreateRule` and `UpdateRule`.

    3.
  Create a `WebACL`. See `CreateWebACL`.

    4.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateWebACL` request.

    5.
  Submit an `UpdateWebACL` request to specify the `Rules`
  that you want to include in the `WebACL`, to specify the default action,
  and to associate the `WebACL` with a CloudFront distribution.

  The `ActivatedRule` can be a rule group. If you specify a rule group
  as your
  `ActivatedRule`
  ,
  you can exclude specific rules from that rule group.

  If you already have a rule group associated with a web ACL and want to submit
  an `UpdateWebACL` request to exclude certain rules from that rule group,
  you must first remove the rule group from the web ACL, the re-insert it again,
  specifying the excluded rules.
  For details,
  see
  `ActivatedRule$ExcludedRules`
  .

  Be aware that if you try to add a RATE_BASED rule to a web ACL without setting
  the rule type when first creating the rule, the `UpdateWebACL` request will fail
  because the request tries to add a REGULAR rule (the default rule type) with the
  specified ID, which does not exist.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_web_acl(map(), update_web_acl_request(), list()) ::
          {:ok, update_web_acl_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_web_acl_errors()}
  def update_web_acl(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateWebACL", input, options)
  end

  @doc """

  This is **AWS WAF Classic** documentation.

  For
  more information, see [AWS WAF
  Classic](https://docs.aws.amazon.com/waf/latest/developerguide/classic-waf-chapter.html)
  in the developer guide.

  **For the latest version of AWS
  WAF**, use the AWS WAFV2 API and see the [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html).
  With the latest version, AWS WAF has a single set of endpoints for regional and
  global use.

  Inserts or deletes `XssMatchTuple` objects (filters) in an `XssMatchSet`.
  For each `XssMatchTuple` object, you specify the following values:

    *

  `Action`: Whether to insert the object into or delete the object from the
  array. To change an
  `XssMatchTuple`, you delete the existing object and add a new
  one.

    *

  `FieldToMatch`: The part of web requests that you want AWS WAF to inspect and,
  if you want AWS WAF to inspect a header or custom query parameter,
  the name of the header or parameter.

    *

  `TextTransformation`: Which text transformation, if any, to perform on the web
  request before
  inspecting the request for cross-site scripting attacks.

  You can only specify a single type of TextTransformation.

  You use `XssMatchSet` objects to specify which CloudFront requests
  that
  you want to allow, block, or count. For example, if you're receiving
  requests that contain cross-site scripting attacks in the request body and you
  want to
  block the requests, you can create an `XssMatchSet` with the applicable
  settings, and then configure AWS WAF to block the requests.

  To create and configure an `XssMatchSet`, perform the following steps:

    1.
  Submit a `CreateXssMatchSet` request.

    2.
  Use `GetChangeToken` to get the change token that you provide in the
  `ChangeToken` parameter of an
  `UpdateIPSet` request.

    3.
  Submit an `UpdateXssMatchSet` request to specify the parts of web requests that
  you want AWS WAF to
  inspect for cross-site scripting attacks.

  For more information about how to use the AWS WAF API to allow or block HTTP
  requests, see the
  [AWS WAF Developer Guide](https://docs.aws.amazon.com/waf/latest/developerguide/).
  """
  @spec update_xss_match_set(map(), update_xss_match_set_request(), list()) ::
          {:ok, update_xss_match_set_response(), any()}
          | {:error, {:unexpected_response, any()}}
          | {:error, term()}
          | {:error, update_xss_match_set_errors()}
  def update_xss_match_set(%Client{} = client, input, options \\ []) do
    meta = metadata()

    Request.request_post(client, meta, "UpdateXssMatchSet", input, options)
  end
end