aws-sdk-fms 1.32.0 → 1.37.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +198 -0
- data/LICENSE.txt +202 -0
- data/VERSION +1 -0
- data/lib/aws-sdk-fms.rb +2 -2
- data/lib/aws-sdk-fms/client.rb +380 -128
- data/lib/aws-sdk-fms/client_api.rb +294 -1
- data/lib/aws-sdk-fms/errors.rb +1 -1
- data/lib/aws-sdk-fms/resource.rb +1 -1
- data/lib/aws-sdk-fms/types.rb +1391 -247
- metadata +11 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c37272a3795fdc60b8570fcb8fb680ae61f694156bcab41f03e1bf86d6f7e47a
|
4
|
+
data.tar.gz: c9cd5778bf9f55358dbb14194f4ea98ecd809d666303f3d88ec3e69ecff311ed
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 825080cf8da456323d7ef9a7b7901d2a5219764157f1562e0ed46738aff341521ce157a039bb887b774674776625bc00b600c82c8a943985642cca4633f66d3b
|
7
|
+
data.tar.gz: 347a45ba0212c33f6090a4f2602061c8867f130def1acc2967337c7012920085ee2fe09405798c34f9bf42a9e8fd1be2f534054101f4f8c473874a4bf453e233
|
data/CHANGELOG.md
ADDED
@@ -0,0 +1,198 @@
|
|
1
|
+
Unreleased Changes
|
2
|
+
------------------
|
3
|
+
|
4
|
+
1.37.0 (2021-07-08)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - AWS Firewall Manager now supports route table monitoring, and provides remediation action recommendations to security administrators for AWS Network Firewall policies with misconfigured routes.
|
8
|
+
|
9
|
+
1.36.0 (2021-04-01)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Added Firewall Manager policy support for AWS Route 53 Resolver DNS Firewall.
|
13
|
+
|
14
|
+
1.35.0 (2021-03-10)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
18
|
+
|
19
|
+
1.34.0 (2021-02-02)
|
20
|
+
------------------
|
21
|
+
|
22
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
23
|
+
|
24
|
+
1.33.0 (2020-11-17)
|
25
|
+
------------------
|
26
|
+
|
27
|
+
* Feature - Added Firewall Manager policy support for AWS Network Firewall resources.
|
28
|
+
|
29
|
+
1.32.0 (2020-09-30)
|
30
|
+
------------------
|
31
|
+
|
32
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
33
|
+
|
34
|
+
1.31.0 (2020-09-15)
|
35
|
+
------------------
|
36
|
+
|
37
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
38
|
+
|
39
|
+
1.30.0 (2020-08-25)
|
40
|
+
------------------
|
41
|
+
|
42
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
43
|
+
|
44
|
+
1.29.0 (2020-07-20)
|
45
|
+
------------------
|
46
|
+
|
47
|
+
* Feature - Added managed policies for auditing security group rules, including the use of managed application and protocol lists.
|
48
|
+
|
49
|
+
1.28.0 (2020-06-23)
|
50
|
+
------------------
|
51
|
+
|
52
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
53
|
+
|
54
|
+
1.27.1 (2020-06-11)
|
55
|
+
------------------
|
56
|
+
|
57
|
+
* Issue - Republish previous version with correct dependency on `aws-sdk-core`.
|
58
|
+
|
59
|
+
1.27.0 (2020-06-10)
|
60
|
+
------------------
|
61
|
+
|
62
|
+
* Issue - This version has been yanked. (#2327).
|
63
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
64
|
+
|
65
|
+
1.26.0 (2020-05-28)
|
66
|
+
------------------
|
67
|
+
|
68
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
69
|
+
|
70
|
+
1.25.0 (2020-05-07)
|
71
|
+
------------------
|
72
|
+
|
73
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
74
|
+
|
75
|
+
1.24.0 (2020-04-22)
|
76
|
+
------------------
|
77
|
+
|
78
|
+
* Feature - This release is to support AWS Firewall Manager policy with Organizational Unit scope.
|
79
|
+
|
80
|
+
1.23.0 (2020-03-31)
|
81
|
+
------------------
|
82
|
+
|
83
|
+
* Feature - This release contains FMS wafv2 support.
|
84
|
+
|
85
|
+
1.22.0 (2020-03-09)
|
86
|
+
------------------
|
87
|
+
|
88
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
89
|
+
|
90
|
+
1.21.0 (2020-01-08)
|
91
|
+
------------------
|
92
|
+
|
93
|
+
* Feature - AWS Firewall Manager now supports tagging, and tag-based access control, of policies.
|
94
|
+
|
95
|
+
1.20.0 (2019-10-23)
|
96
|
+
------------------
|
97
|
+
|
98
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
99
|
+
|
100
|
+
1.19.0 (2019-10-10)
|
101
|
+
------------------
|
102
|
+
|
103
|
+
* Feature - Firewall Manager now supports Amazon VPC security groups, making it easier to configure and manage security groups across multiple accounts from a single place.
|
104
|
+
|
105
|
+
1.18.0 (2019-07-25)
|
106
|
+
------------------
|
107
|
+
|
108
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
109
|
+
|
110
|
+
1.17.0 (2019-07-01)
|
111
|
+
------------------
|
112
|
+
|
113
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
114
|
+
|
115
|
+
1.16.0 (2019-06-17)
|
116
|
+
------------------
|
117
|
+
|
118
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
119
|
+
|
120
|
+
1.15.0 (2019-05-21)
|
121
|
+
------------------
|
122
|
+
|
123
|
+
* Feature - API update.
|
124
|
+
|
125
|
+
1.14.0 (2019-05-15)
|
126
|
+
------------------
|
127
|
+
|
128
|
+
* Feature - API update.
|
129
|
+
|
130
|
+
1.13.0 (2019-05-14)
|
131
|
+
------------------
|
132
|
+
|
133
|
+
* Feature - API update.
|
134
|
+
|
135
|
+
1.12.0 (2019-03-25)
|
136
|
+
------------------
|
137
|
+
|
138
|
+
* Feature - API update.
|
139
|
+
|
140
|
+
1.11.0 (2019-03-21)
|
141
|
+
------------------
|
142
|
+
|
143
|
+
* Feature - API update.
|
144
|
+
|
145
|
+
1.10.0 (2019-03-18)
|
146
|
+
------------------
|
147
|
+
|
148
|
+
* Feature - API update.
|
149
|
+
|
150
|
+
1.9.0 (2019-03-14)
|
151
|
+
------------------
|
152
|
+
|
153
|
+
* Feature - API update.
|
154
|
+
|
155
|
+
1.8.0 (2019-01-21)
|
156
|
+
------------------
|
157
|
+
|
158
|
+
* Feature - API update.
|
159
|
+
|
160
|
+
1.7.0 (2018-11-20)
|
161
|
+
------------------
|
162
|
+
|
163
|
+
* Feature - API update.
|
164
|
+
|
165
|
+
1.6.0 (2018-10-24)
|
166
|
+
------------------
|
167
|
+
|
168
|
+
* Feature - API update.
|
169
|
+
|
170
|
+
1.5.0 (2018-10-23)
|
171
|
+
------------------
|
172
|
+
|
173
|
+
* Feature - API update.
|
174
|
+
|
175
|
+
1.4.0 (2018-09-12)
|
176
|
+
------------------
|
177
|
+
|
178
|
+
* Feature - API update.
|
179
|
+
|
180
|
+
1.3.0 (2018-09-06)
|
181
|
+
------------------
|
182
|
+
|
183
|
+
* Feature - Adds code paths and plugins for future SDK instrumentation and telemetry.
|
184
|
+
|
185
|
+
1.2.0 (2018-09-05)
|
186
|
+
------------------
|
187
|
+
|
188
|
+
* Feature - API update.
|
189
|
+
|
190
|
+
1.1.0 (2018-06-26)
|
191
|
+
------------------
|
192
|
+
|
193
|
+
* Feature - API update.
|
194
|
+
|
195
|
+
1.0.0 (2018-04-04)
|
196
|
+
------------------
|
197
|
+
|
198
|
+
* Feature - Initial release of `aws-sdk-fms`.
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,202 @@
|
|
1
|
+
|
2
|
+
Apache License
|
3
|
+
Version 2.0, January 2004
|
4
|
+
http://www.apache.org/licenses/
|
5
|
+
|
6
|
+
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
7
|
+
|
8
|
+
1. Definitions.
|
9
|
+
|
10
|
+
"License" shall mean the terms and conditions for use, reproduction,
|
11
|
+
and distribution as defined by Sections 1 through 9 of this document.
|
12
|
+
|
13
|
+
"Licensor" shall mean the copyright owner or entity authorized by
|
14
|
+
the copyright owner that is granting the License.
|
15
|
+
|
16
|
+
"Legal Entity" shall mean the union of the acting entity and all
|
17
|
+
other entities that control, are controlled by, or are under common
|
18
|
+
control with that entity. For the purposes of this definition,
|
19
|
+
"control" means (i) the power, direct or indirect, to cause the
|
20
|
+
direction or management of such entity, whether by contract or
|
21
|
+
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
22
|
+
outstanding shares, or (iii) beneficial ownership of such entity.
|
23
|
+
|
24
|
+
"You" (or "Your") shall mean an individual or Legal Entity
|
25
|
+
exercising permissions granted by this License.
|
26
|
+
|
27
|
+
"Source" form shall mean the preferred form for making modifications,
|
28
|
+
including but not limited to software source code, documentation
|
29
|
+
source, and configuration files.
|
30
|
+
|
31
|
+
"Object" form shall mean any form resulting from mechanical
|
32
|
+
transformation or translation of a Source form, including but
|
33
|
+
not limited to compiled object code, generated documentation,
|
34
|
+
and conversions to other media types.
|
35
|
+
|
36
|
+
"Work" shall mean the work of authorship, whether in Source or
|
37
|
+
Object form, made available under the License, as indicated by a
|
38
|
+
copyright notice that is included in or attached to the work
|
39
|
+
(an example is provided in the Appendix below).
|
40
|
+
|
41
|
+
"Derivative Works" shall mean any work, whether in Source or Object
|
42
|
+
form, that is based on (or derived from) the Work and for which the
|
43
|
+
editorial revisions, annotations, elaborations, or other modifications
|
44
|
+
represent, as a whole, an original work of authorship. For the purposes
|
45
|
+
of this License, Derivative Works shall not include works that remain
|
46
|
+
separable from, or merely link (or bind by name) to the interfaces of,
|
47
|
+
the Work and Derivative Works thereof.
|
48
|
+
|
49
|
+
"Contribution" shall mean any work of authorship, including
|
50
|
+
the original version of the Work and any modifications or additions
|
51
|
+
to that Work or Derivative Works thereof, that is intentionally
|
52
|
+
submitted to Licensor for inclusion in the Work by the copyright owner
|
53
|
+
or by an individual or Legal Entity authorized to submit on behalf of
|
54
|
+
the copyright owner. For the purposes of this definition, "submitted"
|
55
|
+
means any form of electronic, verbal, or written communication sent
|
56
|
+
to the Licensor or its representatives, including but not limited to
|
57
|
+
communication on electronic mailing lists, source code control systems,
|
58
|
+
and issue tracking systems that are managed by, or on behalf of, the
|
59
|
+
Licensor for the purpose of discussing and improving the Work, but
|
60
|
+
excluding communication that is conspicuously marked or otherwise
|
61
|
+
designated in writing by the copyright owner as "Not a Contribution."
|
62
|
+
|
63
|
+
"Contributor" shall mean Licensor and any individual or Legal Entity
|
64
|
+
on behalf of whom a Contribution has been received by Licensor and
|
65
|
+
subsequently incorporated within the Work.
|
66
|
+
|
67
|
+
2. Grant of Copyright License. Subject to the terms and conditions of
|
68
|
+
this License, each Contributor hereby grants to You a perpetual,
|
69
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
70
|
+
copyright license to reproduce, prepare Derivative Works of,
|
71
|
+
publicly display, publicly perform, sublicense, and distribute the
|
72
|
+
Work and such Derivative Works in Source or Object form.
|
73
|
+
|
74
|
+
3. Grant of Patent License. Subject to the terms and conditions of
|
75
|
+
this License, each Contributor hereby grants to You a perpetual,
|
76
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
77
|
+
(except as stated in this section) patent license to make, have made,
|
78
|
+
use, offer to sell, sell, import, and otherwise transfer the Work,
|
79
|
+
where such license applies only to those patent claims licensable
|
80
|
+
by such Contributor that are necessarily infringed by their
|
81
|
+
Contribution(s) alone or by combination of their Contribution(s)
|
82
|
+
with the Work to which such Contribution(s) was submitted. If You
|
83
|
+
institute patent litigation against any entity (including a
|
84
|
+
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
85
|
+
or a Contribution incorporated within the Work constitutes direct
|
86
|
+
or contributory patent infringement, then any patent licenses
|
87
|
+
granted to You under this License for that Work shall terminate
|
88
|
+
as of the date such litigation is filed.
|
89
|
+
|
90
|
+
4. Redistribution. You may reproduce and distribute copies of the
|
91
|
+
Work or Derivative Works thereof in any medium, with or without
|
92
|
+
modifications, and in Source or Object form, provided that You
|
93
|
+
meet the following conditions:
|
94
|
+
|
95
|
+
(a) You must give any other recipients of the Work or
|
96
|
+
Derivative Works a copy of this License; and
|
97
|
+
|
98
|
+
(b) You must cause any modified files to carry prominent notices
|
99
|
+
stating that You changed the files; and
|
100
|
+
|
101
|
+
(c) You must retain, in the Source form of any Derivative Works
|
102
|
+
that You distribute, all copyright, patent, trademark, and
|
103
|
+
attribution notices from the Source form of the Work,
|
104
|
+
excluding those notices that do not pertain to any part of
|
105
|
+
the Derivative Works; and
|
106
|
+
|
107
|
+
(d) If the Work includes a "NOTICE" text file as part of its
|
108
|
+
distribution, then any Derivative Works that You distribute must
|
109
|
+
include a readable copy of the attribution notices contained
|
110
|
+
within such NOTICE file, excluding those notices that do not
|
111
|
+
pertain to any part of the Derivative Works, in at least one
|
112
|
+
of the following places: within a NOTICE text file distributed
|
113
|
+
as part of the Derivative Works; within the Source form or
|
114
|
+
documentation, if provided along with the Derivative Works; or,
|
115
|
+
within a display generated by the Derivative Works, if and
|
116
|
+
wherever such third-party notices normally appear. The contents
|
117
|
+
of the NOTICE file are for informational purposes only and
|
118
|
+
do not modify the License. You may add Your own attribution
|
119
|
+
notices within Derivative Works that You distribute, alongside
|
120
|
+
or as an addendum to the NOTICE text from the Work, provided
|
121
|
+
that such additional attribution notices cannot be construed
|
122
|
+
as modifying the License.
|
123
|
+
|
124
|
+
You may add Your own copyright statement to Your modifications and
|
125
|
+
may provide additional or different license terms and conditions
|
126
|
+
for use, reproduction, or distribution of Your modifications, or
|
127
|
+
for any such Derivative Works as a whole, provided Your use,
|
128
|
+
reproduction, and distribution of the Work otherwise complies with
|
129
|
+
the conditions stated in this License.
|
130
|
+
|
131
|
+
5. Submission of Contributions. Unless You explicitly state otherwise,
|
132
|
+
any Contribution intentionally submitted for inclusion in the Work
|
133
|
+
by You to the Licensor shall be under the terms and conditions of
|
134
|
+
this License, without any additional terms or conditions.
|
135
|
+
Notwithstanding the above, nothing herein shall supersede or modify
|
136
|
+
the terms of any separate license agreement you may have executed
|
137
|
+
with Licensor regarding such Contributions.
|
138
|
+
|
139
|
+
6. Trademarks. This License does not grant permission to use the trade
|
140
|
+
names, trademarks, service marks, or product names of the Licensor,
|
141
|
+
except as required for reasonable and customary use in describing the
|
142
|
+
origin of the Work and reproducing the content of the NOTICE file.
|
143
|
+
|
144
|
+
7. Disclaimer of Warranty. Unless required by applicable law or
|
145
|
+
agreed to in writing, Licensor provides the Work (and each
|
146
|
+
Contributor provides its Contributions) on an "AS IS" BASIS,
|
147
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
148
|
+
implied, including, without limitation, any warranties or conditions
|
149
|
+
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
150
|
+
PARTICULAR PURPOSE. You are solely responsible for determining the
|
151
|
+
appropriateness of using or redistributing the Work and assume any
|
152
|
+
risks associated with Your exercise of permissions under this License.
|
153
|
+
|
154
|
+
8. Limitation of Liability. In no event and under no legal theory,
|
155
|
+
whether in tort (including negligence), contract, or otherwise,
|
156
|
+
unless required by applicable law (such as deliberate and grossly
|
157
|
+
negligent acts) or agreed to in writing, shall any Contributor be
|
158
|
+
liable to You for damages, including any direct, indirect, special,
|
159
|
+
incidental, or consequential damages of any character arising as a
|
160
|
+
result of this License or out of the use or inability to use the
|
161
|
+
Work (including but not limited to damages for loss of goodwill,
|
162
|
+
work stoppage, computer failure or malfunction, or any and all
|
163
|
+
other commercial damages or losses), even if such Contributor
|
164
|
+
has been advised of the possibility of such damages.
|
165
|
+
|
166
|
+
9. Accepting Warranty or Additional Liability. While redistributing
|
167
|
+
the Work or Derivative Works thereof, You may choose to offer,
|
168
|
+
and charge a fee for, acceptance of support, warranty, indemnity,
|
169
|
+
or other liability obligations and/or rights consistent with this
|
170
|
+
License. However, in accepting such obligations, You may act only
|
171
|
+
on Your own behalf and on Your sole responsibility, not on behalf
|
172
|
+
of any other Contributor, and only if You agree to indemnify,
|
173
|
+
defend, and hold each Contributor harmless for any liability
|
174
|
+
incurred by, or claims asserted against, such Contributor by reason
|
175
|
+
of your accepting any such warranty or additional liability.
|
176
|
+
|
177
|
+
END OF TERMS AND CONDITIONS
|
178
|
+
|
179
|
+
APPENDIX: How to apply the Apache License to your work.
|
180
|
+
|
181
|
+
To apply the Apache License to your work, attach the following
|
182
|
+
boilerplate notice, with the fields enclosed by brackets "[]"
|
183
|
+
replaced with your own identifying information. (Don't include
|
184
|
+
the brackets!) The text should be enclosed in the appropriate
|
185
|
+
comment syntax for the file format. We also recommend that a
|
186
|
+
file or class name and description of purpose be included on the
|
187
|
+
same "printed page" as the copyright notice for easier
|
188
|
+
identification within third-party archives.
|
189
|
+
|
190
|
+
Copyright [yyyy] [name of copyright owner]
|
191
|
+
|
192
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
193
|
+
you may not use this file except in compliance with the License.
|
194
|
+
You may obtain a copy of the License at
|
195
|
+
|
196
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
197
|
+
|
198
|
+
Unless required by applicable law or agreed to in writing, software
|
199
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
200
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
201
|
+
See the License for the specific language governing permissions and
|
202
|
+
limitations under the License.
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
1.37.0
|
data/lib/aws-sdk-fms.rb
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-fms/customizations'
|
|
48
48
|
# @!group service
|
49
49
|
module Aws::FMS
|
50
50
|
|
51
|
-
GEM_VERSION = '1.
|
51
|
+
GEM_VERSION = '1.37.0'
|
52
52
|
|
53
53
|
end
|
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -337,22 +337,20 @@ module Aws::FMS
|
|
337
337
|
|
338
338
|
# @!group API Operations
|
339
339
|
|
340
|
-
# Sets the
|
341
|
-
#
|
342
|
-
#
|
343
|
-
#
|
344
|
-
# AWS Organizations master account, AWS Firewall Manager will set the
|
345
|
-
# appropriate permissions for the given member account.
|
340
|
+
# Sets the Firewall Manager administrator account. The account must be a
|
341
|
+
# member of the organization in Organizations whose resources you want
|
342
|
+
# to protect. Firewall Manager sets the permissions that allow the
|
343
|
+
# account to administer your Firewall Manager policies.
|
346
344
|
#
|
347
|
-
# The account that you associate with
|
348
|
-
#
|
345
|
+
# The account that you associate with Firewall Manager is called the
|
346
|
+
# Firewall Manager administrator account.
|
349
347
|
#
|
350
348
|
# @option params [required, String] :admin_account
|
351
|
-
# The
|
352
|
-
# Firewall Manager administrator account. This
|
353
|
-
# Organizations
|
354
|
-
#
|
355
|
-
#
|
349
|
+
# The Amazon Web Services account ID to associate with Firewall Manager
|
350
|
+
# as the Firewall Manager administrator account. This must be an
|
351
|
+
# Organizations member account. For more information about
|
352
|
+
# Organizations, see [Managing the Amazon Web Services Accounts in Your
|
353
|
+
# Organization][1].
|
356
354
|
#
|
357
355
|
#
|
358
356
|
#
|
@@ -375,7 +373,7 @@ module Aws::FMS
|
|
375
373
|
req.send_request(options)
|
376
374
|
end
|
377
375
|
|
378
|
-
# Permanently deletes an
|
376
|
+
# Permanently deletes an Firewall Manager applications list.
|
379
377
|
#
|
380
378
|
# @option params [required, String] :list_id
|
381
379
|
# The ID of the applications list that you want to delete. You can
|
@@ -399,9 +397,9 @@ module Aws::FMS
|
|
399
397
|
req.send_request(options)
|
400
398
|
end
|
401
399
|
|
402
|
-
# Deletes an
|
400
|
+
# Deletes an Firewall Manager association with the IAM role and the
|
403
401
|
# Amazon Simple Notification Service (SNS) topic that is used to record
|
404
|
-
#
|
402
|
+
# Firewall Manager SNS logs.
|
405
403
|
#
|
406
404
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
407
405
|
#
|
@@ -414,7 +412,7 @@ module Aws::FMS
|
|
414
412
|
req.send_request(options)
|
415
413
|
end
|
416
414
|
|
417
|
-
# Permanently deletes an
|
415
|
+
# Permanently deletes an Firewall Manager policy.
|
418
416
|
#
|
419
417
|
# @option params [required, String] :policy_id
|
420
418
|
# The ID of the policy that you want to delete. You can retrieve this ID
|
@@ -423,10 +421,9 @@ module Aws::FMS
|
|
423
421
|
# @option params [Boolean] :delete_all_policy_resources
|
424
422
|
# If `True`, the request performs cleanup according to the policy type.
|
425
423
|
#
|
426
|
-
# For
|
427
|
-
# following:
|
424
|
+
# For WAF and Shield Advanced policies, the cleanup does the following:
|
428
425
|
#
|
429
|
-
# * Deletes rule groups created by
|
426
|
+
# * Deletes rule groups created by Firewall Manager
|
430
427
|
#
|
431
428
|
# * Removes web ACLs from in-scope resources
|
432
429
|
#
|
@@ -468,7 +465,7 @@ module Aws::FMS
|
|
468
465
|
req.send_request(options)
|
469
466
|
end
|
470
467
|
|
471
|
-
# Permanently deletes an
|
468
|
+
# Permanently deletes an Firewall Manager protocols list.
|
472
469
|
#
|
473
470
|
# @option params [required, String] :list_id
|
474
471
|
# The ID of the protocols list that you want to delete. You can retrieve
|
@@ -492,10 +489,9 @@ module Aws::FMS
|
|
492
489
|
req.send_request(options)
|
493
490
|
end
|
494
491
|
|
495
|
-
# Disassociates the account that has been set as the
|
496
|
-
#
|
497
|
-
#
|
498
|
-
# request.
|
492
|
+
# Disassociates the account that has been set as the Firewall Manager
|
493
|
+
# administrator account. To set a different account as the administrator
|
494
|
+
# account, you must submit an `AssociateAdminAccount` request.
|
499
495
|
#
|
500
496
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
501
497
|
#
|
@@ -508,8 +504,8 @@ module Aws::FMS
|
|
508
504
|
req.send_request(options)
|
509
505
|
end
|
510
506
|
|
511
|
-
# Returns the
|
512
|
-
#
|
507
|
+
# Returns the Organizations account that is associated with Firewall
|
508
|
+
# Manager as the Firewall Manager administrator.
|
513
509
|
#
|
514
510
|
# @return [Types::GetAdminAccountResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
515
511
|
#
|
@@ -530,15 +526,15 @@ module Aws::FMS
|
|
530
526
|
req.send_request(options)
|
531
527
|
end
|
532
528
|
|
533
|
-
# Returns information about the specified
|
534
|
-
#
|
529
|
+
# Returns information about the specified Firewall Manager applications
|
530
|
+
# list.
|
535
531
|
#
|
536
532
|
# @option params [required, String] :list_id
|
537
|
-
# The ID of the
|
533
|
+
# The ID of the Firewall Manager applications list that you want the
|
538
534
|
# details for.
|
539
535
|
#
|
540
536
|
# @option params [Boolean] :default_list
|
541
|
-
# Specifies whether the list to retrieve is a default list owned by
|
537
|
+
# Specifies whether the list to retrieve is a default list owned by
|
542
538
|
# Firewall Manager.
|
543
539
|
#
|
544
540
|
# @return [Types::GetAppsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -582,20 +578,33 @@ module Aws::FMS
|
|
582
578
|
|
583
579
|
# Returns detailed compliance information about the specified member
|
584
580
|
# account. Details include resources that are in and out of compliance
|
585
|
-
# with the specified policy.
|
586
|
-
#
|
587
|
-
#
|
588
|
-
#
|
589
|
-
#
|
590
|
-
#
|
581
|
+
# with the specified policy.
|
582
|
+
#
|
583
|
+
# * Resources are considered noncompliant for WAF and Shield Advanced
|
584
|
+
# policies if the specified policy has not been applied to them.
|
585
|
+
#
|
586
|
+
# * Resources are considered noncompliant for security group policies if
|
587
|
+
# they are in scope of the policy, they violate one or more of the
|
588
|
+
# policy rules, and remediation is disabled or not possible.
|
589
|
+
#
|
590
|
+
# * Resources are considered noncompliant for Network Firewall policies
|
591
|
+
# if a firewall is missing in the VPC, if the firewall endpoint isn't
|
592
|
+
# set up in an expected Availability Zone and subnet, if a subnet
|
593
|
+
# created by the Firewall Manager doesn't have the expected route
|
594
|
+
# table, and for modifications to a firewall policy that violate the
|
595
|
+
# Firewall Manager policy's rules.
|
596
|
+
#
|
597
|
+
# * Resources are considered noncompliant for DNS Firewall policies if a
|
598
|
+
# DNS Firewall rule group is missing from the rule group associations
|
599
|
+
# for the VPC.
|
591
600
|
#
|
592
601
|
# @option params [required, String] :policy_id
|
593
602
|
# The ID of the policy that you want to get the details for. `PolicyId`
|
594
603
|
# is returned by `PutPolicy` and by `ListPolicies`.
|
595
604
|
#
|
596
605
|
# @option params [required, String] :member_account
|
597
|
-
# The
|
598
|
-
# details for.
|
606
|
+
# The Amazon Web Services account that owns the resources that you want
|
607
|
+
# to get the details for.
|
599
608
|
#
|
600
609
|
# @return [Types::GetComplianceDetailResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
601
610
|
#
|
@@ -615,7 +624,7 @@ module Aws::FMS
|
|
615
624
|
# resp.policy_compliance_detail.member_account #=> String
|
616
625
|
# resp.policy_compliance_detail.violators #=> Array
|
617
626
|
# resp.policy_compliance_detail.violators[0].resource_id #=> String
|
618
|
-
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
|
627
|
+
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT", "FMS_CREATED_SECURITY_GROUP_EDITED", "MISSING_FIREWALL", "MISSING_FIREWALL_SUBNET_IN_AZ", "MISSING_EXPECTED_ROUTE_TABLE", "NETWORK_FIREWALL_POLICY_MODIFIED", "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE", "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE", "UNEXPECTED_FIREWALL_ROUTES", "UNEXPECTED_TARGET_GATEWAY_ROUTES", "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY", "INVALID_ROUTE_CONFIGURATION", "MISSING_TARGET_GATEWAY", "INTERNET_TRAFFIC_NOT_INSPECTED", "BLACK_HOLE_ROUTE_DETECTED", "BLACK_HOLE_ROUTE_DETECTED_IN_FIREWALL_SUBNET", "RESOURCE_MISSING_DNS_FIREWALL"
|
619
628
|
# resp.policy_compliance_detail.violators[0].resource_type #=> String
|
620
629
|
# resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
|
621
630
|
# resp.policy_compliance_detail.expired_at #=> Time
|
@@ -632,7 +641,7 @@ module Aws::FMS
|
|
632
641
|
end
|
633
642
|
|
634
643
|
# Information about the Amazon Simple Notification Service (SNS) topic
|
635
|
-
# that is used to record
|
644
|
+
# that is used to record Firewall Manager SNS logs.
|
636
645
|
#
|
637
646
|
# @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
638
647
|
#
|
@@ -653,11 +662,10 @@ module Aws::FMS
|
|
653
662
|
req.send_request(options)
|
654
663
|
end
|
655
664
|
|
656
|
-
# Returns information about the specified
|
665
|
+
# Returns information about the specified Firewall Manager policy.
|
657
666
|
#
|
658
667
|
# @option params [required, String] :policy_id
|
659
|
-
# The ID of the
|
660
|
-
# for.
|
668
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
661
669
|
#
|
662
670
|
# @return [Types::GetPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
663
671
|
#
|
@@ -675,7 +683,7 @@ module Aws::FMS
|
|
675
683
|
# resp.policy.policy_id #=> String
|
676
684
|
# resp.policy.policy_name #=> String
|
677
685
|
# resp.policy.policy_update_token #=> String
|
678
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
686
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
679
687
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
680
688
|
# resp.policy.resource_type #=> String
|
681
689
|
# resp.policy.resource_type_list #=> Array
|
@@ -710,32 +718,32 @@ module Aws::FMS
|
|
710
718
|
# The ID of the policy for which you want to get the attack information.
|
711
719
|
#
|
712
720
|
# @option params [String] :member_account_id
|
713
|
-
# The
|
714
|
-
# the details for.
|
721
|
+
# The Amazon Web Services account that is in scope of the policy that
|
722
|
+
# you want to get the details for.
|
715
723
|
#
|
716
724
|
# @option params [Time,DateTime,Date,Integer,String] :start_time
|
717
725
|
# The start of the time period to query for the attacks. This is a
|
718
726
|
# `timestamp` type. The request syntax listing indicates a `number` type
|
719
|
-
# because the default used by
|
720
|
-
#
|
727
|
+
# because the default used by Firewall Manager is Unix time in seconds.
|
728
|
+
# However, any valid `timestamp` format is allowed.
|
721
729
|
#
|
722
730
|
# @option params [Time,DateTime,Date,Integer,String] :end_time
|
723
731
|
# The end of the time period to query for the attacks. This is a
|
724
732
|
# `timestamp` type. The request syntax listing indicates a `number` type
|
725
|
-
# because the default used by
|
726
|
-
#
|
733
|
+
# because the default used by Firewall Manager is Unix time in seconds.
|
734
|
+
# However, any valid `timestamp` format is allowed.
|
727
735
|
#
|
728
736
|
# @option params [String] :next_token
|
729
737
|
# If you specify a value for `MaxResults` and you have more objects than
|
730
|
-
# the number that you specify for `MaxResults`,
|
731
|
-
#
|
732
|
-
#
|
738
|
+
# the number that you specify for `MaxResults`, Firewall Manager returns
|
739
|
+
# a `NextToken` value in the response, which you can use to retrieve
|
740
|
+
# another group of objects. For the second and subsequent
|
733
741
|
# `GetProtectionStatus` requests, specify the value of `NextToken` from
|
734
742
|
# the previous response to get information about another batch of
|
735
743
|
# objects.
|
736
744
|
#
|
737
745
|
# @option params [Integer] :max_results
|
738
|
-
# Specifies the number of objects that you want
|
746
|
+
# Specifies the number of objects that you want Firewall Manager to
|
739
747
|
# return for this request. If you have more objects than the number that
|
740
748
|
# you specify for `MaxResults`, the response includes a `NextToken`
|
741
749
|
# value that you can use to get another batch of objects.
|
@@ -761,7 +769,7 @@ module Aws::FMS
|
|
761
769
|
# @example Response structure
|
762
770
|
#
|
763
771
|
# resp.admin_account_id #=> String
|
764
|
-
# resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
772
|
+
# resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
765
773
|
# resp.data #=> String
|
766
774
|
# resp.next_token #=> String
|
767
775
|
#
|
@@ -774,15 +782,15 @@ module Aws::FMS
|
|
774
782
|
req.send_request(options)
|
775
783
|
end
|
776
784
|
|
777
|
-
# Returns information about the specified
|
785
|
+
# Returns information about the specified Firewall Manager protocols
|
778
786
|
# list.
|
779
787
|
#
|
780
788
|
# @option params [required, String] :list_id
|
781
|
-
# The ID of the
|
789
|
+
# The ID of the Firewall Manager protocols list that you want the
|
782
790
|
# details for.
|
783
791
|
#
|
784
792
|
# @option params [Boolean] :default_list
|
785
|
-
# Specifies whether the list to retrieve is a default list owned by
|
793
|
+
# Specifies whether the list to retrieve is a default list owned by
|
786
794
|
# Firewall Manager.
|
787
795
|
#
|
788
796
|
# @return [Types::GetProtocolsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -820,25 +828,25 @@ module Aws::FMS
|
|
820
828
|
req.send_request(options)
|
821
829
|
end
|
822
830
|
|
823
|
-
# Retrieves violations for a resource based on the specified
|
824
|
-
#
|
831
|
+
# Retrieves violations for a resource based on the specified Firewall
|
832
|
+
# Manager policy and Amazon Web Services account.
|
825
833
|
#
|
826
834
|
# @option params [required, String] :policy_id
|
827
|
-
# The ID of the
|
828
|
-
#
|
829
|
-
# policies.
|
835
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
836
|
+
# This currently only supports security group content audit policies.
|
830
837
|
#
|
831
838
|
# @option params [required, String] :member_account
|
832
|
-
# The
|
839
|
+
# The Amazon Web Services account ID that you want the details for.
|
833
840
|
#
|
834
841
|
# @option params [required, String] :resource_id
|
835
842
|
# The ID of the resource that has violations.
|
836
843
|
#
|
837
844
|
# @option params [required, String] :resource_type
|
838
|
-
# The resource type. This is in the format shown in the [
|
839
|
-
# Types Reference][1]. Supported resource types are:
|
840
|
-
# `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`,
|
841
|
-
# `AWS::EC2::SecurityGroup
|
845
|
+
# The resource type. This is in the format shown in the [Amazon Web
|
846
|
+
# Services Resource Types Reference][1]. Supported resource types are:
|
847
|
+
# `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`,
|
848
|
+
# `AWS::EC2::SecurityGroup`, `AWS::NetworkFirewall::FirewallPolicy`, and
|
849
|
+
# `AWS::EC2::Subnet`.
|
842
850
|
#
|
843
851
|
#
|
844
852
|
#
|
@@ -888,6 +896,231 @@ module Aws::FMS
|
|
888
896
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violation_target #=> String
|
889
897
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups #=> Array
|
890
898
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups[0] #=> String
|
899
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.violation_target #=> String
|
900
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.vpc #=> String
|
901
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.availability_zone #=> String
|
902
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.target_violation_reason #=> String
|
903
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.violation_target #=> String
|
904
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.vpc #=> String
|
905
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.availability_zone #=> String
|
906
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.target_violation_reason #=> String
|
907
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.violation_target #=> String
|
908
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.vpc #=> String
|
909
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.availability_zone #=> String
|
910
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.current_route_table #=> String
|
911
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.expected_route_table #=> String
|
912
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.violation_target #=> String
|
913
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups #=> Array
|
914
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].rule_group_name #=> String
|
915
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].resource_id #=> String
|
916
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].priority #=> Integer
|
917
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions #=> Array
|
918
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions[0] #=> String
|
919
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions #=> Array
|
920
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions[0] #=> String
|
921
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions #=> Array
|
922
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions[0] #=> String
|
923
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups #=> Array
|
924
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
925
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].resource_id #=> String
|
926
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups #=> Array
|
927
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].rule_group_name #=> String
|
928
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].resource_id #=> String
|
929
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].priority #=> Integer
|
930
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions #=> Array
|
931
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions[0] #=> String
|
932
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions #=> Array
|
933
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions[0] #=> String
|
934
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions #=> Array
|
935
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions[0] #=> String
|
936
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups #=> Array
|
937
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
938
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].resource_id #=> String
|
939
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_id #=> String
|
940
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_availability_zone #=> String
|
941
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.route_table_id #=> String
|
942
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes #=> Array
|
943
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
944
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
945
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination #=> String
|
946
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target #=> String
|
947
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.is_route_table_used_in_different_az #=> Boolean
|
948
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_firewall_subnet_route_table #=> String
|
949
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_endpoint #=> String
|
950
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.firewall_subnet_id #=> String
|
951
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes #=> Array
|
952
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
|
953
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
|
954
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
|
955
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
|
956
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
|
957
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
|
958
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
|
959
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
|
960
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes #=> Array
|
961
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
962
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
963
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination #=> String
|
964
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target #=> String
|
965
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.internet_gateway_id #=> String
|
966
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_internet_gateway_route_table #=> String
|
967
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes #=> Array
|
968
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
|
969
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
|
970
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
|
971
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
|
972
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
|
973
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
|
974
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
|
975
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].route_table_id #=> String
|
976
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes #=> Array
|
977
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
978
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
979
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination #=> String
|
980
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target #=> String
|
981
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.vpc_id #=> String
|
982
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets #=> Array
|
983
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets[0] #=> String
|
984
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.route_table_id #=> String
|
985
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.is_route_table_used_in_different_az #=> Boolean
|
986
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
987
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
988
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination #=> String
|
989
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target #=> String
|
990
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_firewall_subnet_route_table #=> String
|
991
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_endpoint #=> String
|
992
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_endpoint #=> String
|
993
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_id #=> String
|
994
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_id #=> String
|
995
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes #=> Array
|
996
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
|
997
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
|
998
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
|
999
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
|
1000
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
|
1001
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
|
1002
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
|
1003
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
|
1004
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes #=> Array
|
1005
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1006
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1007
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination #=> String
|
1008
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target #=> String
|
1009
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.internet_gateway_id #=> String
|
1010
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_internet_gateway_route_table #=> String
|
1011
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes #=> Array
|
1012
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
|
1013
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
|
1014
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
|
1015
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
|
1016
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
|
1017
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
|
1018
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
|
1019
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].route_table_id #=> String
|
1020
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes #=> Array
|
1021
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1022
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1023
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination #=> String
|
1024
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target #=> String
|
1025
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.vpc_id #=> String
|
1026
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violation_target #=> String
|
1027
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.route_table_id #=> String
|
1028
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.vpc_id #=> String
|
1029
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes #=> Array
|
1030
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1031
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1032
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination #=> String
|
1033
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target #=> String
|
1034
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_subnet_id #=> String
|
1035
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes #=> Array
|
1036
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1037
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1038
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination #=> String
|
1039
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target #=> String
|
1040
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.route_table_id #=> String
|
1041
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_endpoint #=> String
|
1042
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.vpc_id #=> String
|
1043
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.gateway_id #=> String
|
1044
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes #=> Array
|
1045
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1046
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1047
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination #=> String
|
1048
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target #=> String
|
1049
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.route_table_id #=> String
|
1050
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.vpc_id #=> String
|
1051
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.violation_target #=> String
|
1052
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes #=> Array
|
1053
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v4_cidr #=> String
|
1054
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].prefix_list_id #=> String
|
1055
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v6_cidr #=> String
|
1056
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets #=> Array
|
1057
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets[0] #=> String
|
1058
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets #=> Array
|
1059
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets[0] #=> String
|
1060
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].route_table_id #=> String
|
1061
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.vpc_id #=> String
|
1062
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target #=> String
|
1063
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target_description #=> String
|
1064
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_priority #=> Integer
|
1065
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_policy_id #=> String
|
1066
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities #=> Array
|
1067
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities[0] #=> Integer
|
1068
|
+
# resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target #=> String
|
1069
|
+
# resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target_description #=> String
|
1070
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target #=> String
|
1071
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target_description #=> String
|
1072
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.number_of_rule_groups_already_associated #=> Integer
|
1073
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.description #=> String
|
1074
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions #=> Array
|
1075
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].description #=> String
|
1076
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions #=> Array
|
1077
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.description #=> String
|
1078
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.description #=> String
|
1079
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_cidr_block #=> String
|
1080
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_prefix_list_id #=> String
|
1081
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_ipv_6_cidr_block #=> String
|
1082
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.resource_id #=> String
|
1083
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.description #=> String
|
1084
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.resource_id #=> String
|
1085
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.description #=> String
|
1086
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.resource_id #=> String
|
1087
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.description #=> String
|
1088
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.description #=> String
|
1089
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_cidr_block #=> String
|
1090
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_prefix_list_id #=> String
|
1091
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_ipv_6_cidr_block #=> String
|
1092
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.resource_id #=> String
|
1093
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.description #=> String
|
1094
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.resource_id #=> String
|
1095
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.description #=> String
|
1096
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.description #=> String
|
1097
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_cidr_block #=> String
|
1098
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_prefix_list_id #=> String
|
1099
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_ipv_6_cidr_block #=> String
|
1100
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.resource_id #=> String
|
1101
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.description #=> String
|
1102
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.description #=> String
|
1103
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.resource_id #=> String
|
1104
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.description #=> String
|
1105
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.resource_id #=> String
|
1106
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.description #=> String
|
1107
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.description #=> String
|
1108
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.resource_id #=> String
|
1109
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.description #=> String
|
1110
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.resource_id #=> String
|
1111
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.description #=> String
|
1112
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.description #=> String
|
1113
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.resource_id #=> String
|
1114
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.description #=> String
|
1115
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.resource_id #=> String
|
1116
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.description #=> String
|
1117
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.resource_id #=> String
|
1118
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.description #=> String
|
1119
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.description #=> String
|
1120
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.resource_id #=> String
|
1121
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.description #=> String
|
1122
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].order #=> Integer
|
1123
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].is_default_action #=> Boolean
|
891
1124
|
# resp.violation_detail.resource_tags #=> Array
|
892
1125
|
# resp.violation_detail.resource_tags[0].key #=> String
|
893
1126
|
# resp.violation_detail.resource_tags[0].value #=> String
|
@@ -905,23 +1138,23 @@ module Aws::FMS
|
|
905
1138
|
# Returns an array of `AppsListDataSummary` objects.
|
906
1139
|
#
|
907
1140
|
# @option params [Boolean] :default_lists
|
908
|
-
# Specifies whether the lists to retrieve are default lists owned by
|
1141
|
+
# Specifies whether the lists to retrieve are default lists owned by
|
909
1142
|
# Firewall Manager.
|
910
1143
|
#
|
911
1144
|
# @option params [String] :next_token
|
912
1145
|
# If you specify a value for `MaxResults` in your list request, and you
|
913
|
-
# have more objects than the maximum,
|
1146
|
+
# have more objects than the maximum, Firewall Manager returns this
|
914
1147
|
# token in the response. For all but the first request, you provide the
|
915
1148
|
# token returned by the prior request in the request parameters, to
|
916
1149
|
# retrieve the next batch of objects.
|
917
1150
|
#
|
918
1151
|
# @option params [required, Integer] :max_results
|
919
|
-
# The maximum number of objects that you want
|
920
|
-
#
|
921
|
-
#
|
922
|
-
#
|
1152
|
+
# The maximum number of objects that you want Firewall Manager to return
|
1153
|
+
# for this request. If more objects are available, in the response,
|
1154
|
+
# Firewall Manager provides a `NextToken` value that you can use in a
|
1155
|
+
# subsequent call to get the next batch of objects.
|
923
1156
|
#
|
924
|
-
# If you don't specify this,
|
1157
|
+
# If you don't specify this, Firewall Manager returns all available
|
925
1158
|
# objects.
|
926
1159
|
#
|
927
1160
|
# @return [Types::ListAppsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -929,6 +1162,8 @@ module Aws::FMS
|
|
929
1162
|
# * {Types::ListAppsListsResponse#apps_lists #apps_lists} => Array<Types::AppsListDataSummary>
|
930
1163
|
# * {Types::ListAppsListsResponse#next_token #next_token} => String
|
931
1164
|
#
|
1165
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1166
|
+
#
|
932
1167
|
# @example Request syntax with placeholder values
|
933
1168
|
#
|
934
1169
|
# resp = client.list_apps_lists({
|
@@ -963,13 +1198,12 @@ module Aws::FMS
|
|
963
1198
|
# protected by the specified policy.
|
964
1199
|
#
|
965
1200
|
# @option params [required, String] :policy_id
|
966
|
-
# The ID of the
|
967
|
-
# for.
|
1201
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
968
1202
|
#
|
969
1203
|
# @option params [String] :next_token
|
970
1204
|
# If you specify a value for `MaxResults` and you have more
|
971
1205
|
# `PolicyComplianceStatus` objects than the number that you specify for
|
972
|
-
# `MaxResults`,
|
1206
|
+
# `MaxResults`, Firewall Manager returns a `NextToken` value in the
|
973
1207
|
# response that allows you to list another group of
|
974
1208
|
# `PolicyComplianceStatus` objects. For the second and subsequent
|
975
1209
|
# `ListComplianceStatus` requests, specify the value of `NextToken` from
|
@@ -978,7 +1212,7 @@ module Aws::FMS
|
|
978
1212
|
#
|
979
1213
|
# @option params [Integer] :max_results
|
980
1214
|
# Specifies the number of `PolicyComplianceStatus` objects that you want
|
981
|
-
#
|
1215
|
+
# Firewall Manager to return for this request. If you have more
|
982
1216
|
# `PolicyComplianceStatus` objects than the number that you specify for
|
983
1217
|
# `MaxResults`, the response includes a `NextToken` value that you can
|
984
1218
|
# use to get another batch of `PolicyComplianceStatus` objects.
|
@@ -1024,22 +1258,22 @@ module Aws::FMS
|
|
1024
1258
|
end
|
1025
1259
|
|
1026
1260
|
# Returns a `MemberAccounts` object that lists the member accounts in
|
1027
|
-
# the administrator's
|
1261
|
+
# the administrator's Amazon Web Services organization.
|
1028
1262
|
#
|
1029
1263
|
# The `ListMemberAccounts` must be submitted by the account that is set
|
1030
|
-
# as the
|
1264
|
+
# as the Firewall Manager administrator.
|
1031
1265
|
#
|
1032
1266
|
# @option params [String] :next_token
|
1033
1267
|
# If you specify a value for `MaxResults` and you have more account IDs
|
1034
|
-
# than the number that you specify for `MaxResults`,
|
1035
|
-
#
|
1036
|
-
#
|
1268
|
+
# than the number that you specify for `MaxResults`, Firewall Manager
|
1269
|
+
# returns a `NextToken` value in the response that allows you to list
|
1270
|
+
# another group of IDs. For the second and subsequent
|
1037
1271
|
# `ListMemberAccountsRequest` requests, specify the value of `NextToken`
|
1038
1272
|
# from the previous response to get information about another batch of
|
1039
1273
|
# member account IDs.
|
1040
1274
|
#
|
1041
1275
|
# @option params [Integer] :max_results
|
1042
|
-
# Specifies the number of member account IDs that you want
|
1276
|
+
# Specifies the number of member account IDs that you want Firewall
|
1043
1277
|
# Manager to return for this request. If you have more IDs than the
|
1044
1278
|
# number that you specify for `MaxResults`, the response includes a
|
1045
1279
|
# `NextToken` value that you can use to get another batch of member
|
@@ -1079,18 +1313,18 @@ module Aws::FMS
|
|
1079
1313
|
# @option params [String] :next_token
|
1080
1314
|
# If you specify a value for `MaxResults` and you have more
|
1081
1315
|
# `PolicySummary` objects than the number that you specify for
|
1082
|
-
# `MaxResults`,
|
1316
|
+
# `MaxResults`, Firewall Manager returns a `NextToken` value in the
|
1083
1317
|
# response that allows you to list another group of `PolicySummary`
|
1084
1318
|
# objects. For the second and subsequent `ListPolicies` requests,
|
1085
1319
|
# specify the value of `NextToken` from the previous response to get
|
1086
1320
|
# information about another batch of `PolicySummary` objects.
|
1087
1321
|
#
|
1088
1322
|
# @option params [Integer] :max_results
|
1089
|
-
# Specifies the number of `PolicySummary` objects that you want
|
1090
|
-
#
|
1091
|
-
#
|
1092
|
-
#
|
1093
|
-
#
|
1323
|
+
# Specifies the number of `PolicySummary` objects that you want Firewall
|
1324
|
+
# Manager to return for this request. If you have more `PolicySummary`
|
1325
|
+
# objects than the number that you specify for `MaxResults`, the
|
1326
|
+
# response includes a `NextToken` value that you can use to get another
|
1327
|
+
# batch of `PolicySummary` objects.
|
1094
1328
|
#
|
1095
1329
|
# @return [Types::ListPoliciesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1096
1330
|
#
|
@@ -1113,7 +1347,7 @@ module Aws::FMS
|
|
1113
1347
|
# resp.policy_list[0].policy_id #=> String
|
1114
1348
|
# resp.policy_list[0].policy_name #=> String
|
1115
1349
|
# resp.policy_list[0].resource_type #=> String
|
1116
|
-
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
1350
|
+
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
1117
1351
|
# resp.policy_list[0].remediation_enabled #=> Boolean
|
1118
1352
|
# resp.next_token #=> String
|
1119
1353
|
#
|
@@ -1129,23 +1363,23 @@ module Aws::FMS
|
|
1129
1363
|
# Returns an array of `ProtocolsListDataSummary` objects.
|
1130
1364
|
#
|
1131
1365
|
# @option params [Boolean] :default_lists
|
1132
|
-
# Specifies whether the lists to retrieve are default lists owned by
|
1366
|
+
# Specifies whether the lists to retrieve are default lists owned by
|
1133
1367
|
# Firewall Manager.
|
1134
1368
|
#
|
1135
1369
|
# @option params [String] :next_token
|
1136
1370
|
# If you specify a value for `MaxResults` in your list request, and you
|
1137
|
-
# have more objects than the maximum,
|
1371
|
+
# have more objects than the maximum, Firewall Manager returns this
|
1138
1372
|
# token in the response. For all but the first request, you provide the
|
1139
1373
|
# token returned by the prior request in the request parameters, to
|
1140
1374
|
# retrieve the next batch of objects.
|
1141
1375
|
#
|
1142
1376
|
# @option params [required, Integer] :max_results
|
1143
|
-
# The maximum number of objects that you want
|
1144
|
-
#
|
1145
|
-
#
|
1146
|
-
#
|
1377
|
+
# The maximum number of objects that you want Firewall Manager to return
|
1378
|
+
# for this request. If more objects are available, in the response,
|
1379
|
+
# Firewall Manager provides a `NextToken` value that you can use in a
|
1380
|
+
# subsequent call to get the next batch of objects.
|
1147
1381
|
#
|
1148
|
-
# If you don't specify this,
|
1382
|
+
# If you don't specify this, Firewall Manager returns all available
|
1149
1383
|
# objects.
|
1150
1384
|
#
|
1151
1385
|
# @return [Types::ListProtocolsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1153,6 +1387,8 @@ module Aws::FMS
|
|
1153
1387
|
# * {Types::ListProtocolsListsResponse#protocols_lists #protocols_lists} => Array<Types::ProtocolsListDataSummary>
|
1154
1388
|
# * {Types::ListProtocolsListsResponse#next_token #next_token} => String
|
1155
1389
|
#
|
1390
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1391
|
+
#
|
1156
1392
|
# @example Request syntax with placeholder values
|
1157
1393
|
#
|
1158
1394
|
# resp = client.list_protocols_lists({
|
@@ -1180,11 +1416,12 @@ module Aws::FMS
|
|
1180
1416
|
req.send_request(options)
|
1181
1417
|
end
|
1182
1418
|
|
1183
|
-
# Retrieves the list of tags for the specified
|
1419
|
+
# Retrieves the list of tags for the specified Amazon Web Services
|
1420
|
+
# resource.
|
1184
1421
|
#
|
1185
1422
|
# @option params [required, String] :resource_arn
|
1186
1423
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1187
|
-
#
|
1424
|
+
# Firewall Manager resources that support tagging are policies,
|
1188
1425
|
# applications lists, and protocols lists.
|
1189
1426
|
#
|
1190
1427
|
# @return [Types::ListTagsForResourceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1212,11 +1449,10 @@ module Aws::FMS
|
|
1212
1449
|
req.send_request(options)
|
1213
1450
|
end
|
1214
1451
|
|
1215
|
-
# Creates an
|
1452
|
+
# Creates an Firewall Manager applications list.
|
1216
1453
|
#
|
1217
1454
|
# @option params [required, Types::AppsListData] :apps_list
|
1218
|
-
# The details of the
|
1219
|
-
# created.
|
1455
|
+
# The details of the Firewall Manager applications list to be created.
|
1220
1456
|
#
|
1221
1457
|
# @option params [Array<Types::Tag>] :tag_list
|
1222
1458
|
# The tags associated with the resource.
|
@@ -1288,15 +1524,25 @@ module Aws::FMS
|
|
1288
1524
|
end
|
1289
1525
|
|
1290
1526
|
# Designates the IAM role and Amazon Simple Notification Service (SNS)
|
1291
|
-
# topic that
|
1527
|
+
# topic that Firewall Manager uses to record SNS logs.
|
1528
|
+
#
|
1529
|
+
# To perform this action outside of the console, you must configure the
|
1530
|
+
# SNS topic to allow the Firewall Manager role `AWSServiceRoleForFMS` to
|
1531
|
+
# publish SNS logs. For more information, see [Firewall Manager required
|
1532
|
+
# permissions for API actions][1] in the *Firewall Manager Developer
|
1533
|
+
# Guide*.
|
1534
|
+
#
|
1535
|
+
#
|
1536
|
+
#
|
1537
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/fms-api-permissions-ref.html
|
1292
1538
|
#
|
1293
1539
|
# @option params [required, String] :sns_topic_arn
|
1294
1540
|
# The Amazon Resource Name (ARN) of the SNS topic that collects
|
1295
|
-
# notifications from
|
1541
|
+
# notifications from Firewall Manager.
|
1296
1542
|
#
|
1297
1543
|
# @option params [required, String] :sns_role_name
|
1298
1544
|
# The Amazon Resource Name (ARN) of the IAM role that allows Amazon SNS
|
1299
|
-
# to record
|
1545
|
+
# to record Firewall Manager activity.
|
1300
1546
|
#
|
1301
1547
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
1302
1548
|
#
|
@@ -1316,21 +1562,27 @@ module Aws::FMS
|
|
1316
1562
|
req.send_request(options)
|
1317
1563
|
end
|
1318
1564
|
|
1319
|
-
# Creates an
|
1565
|
+
# Creates an Firewall Manager policy.
|
1320
1566
|
#
|
1321
1567
|
# Firewall Manager provides the following types of policies:
|
1322
1568
|
#
|
1323
|
-
# *
|
1324
|
-
#
|
1569
|
+
# * An WAF policy (type WAFV2), which defines rule groups to run first
|
1570
|
+
# in the corresponding WAF web ACL and rule groups to run last in the
|
1571
|
+
# web ACL.
|
1325
1572
|
#
|
1326
|
-
# * An
|
1327
|
-
# first in the corresponding AWS WAF web ACL and rule groups to run
|
1328
|
-
# last in the web ACL.
|
1573
|
+
# * An WAF Classic policy (type WAF), which defines a rule group.
|
1329
1574
|
#
|
1330
|
-
# *
|
1575
|
+
# * A Shield Advanced policy, which applies Shield Advanced protection
|
1576
|
+
# to specified accounts and resources.
|
1331
1577
|
#
|
1332
1578
|
# * A security group policy, which manages VPC security groups across
|
1333
|
-
# your
|
1579
|
+
# your Amazon Web Services organization.
|
1580
|
+
#
|
1581
|
+
# * An Network Firewall policy, which provides firewall rules to filter
|
1582
|
+
# network traffic in specified Amazon VPCs.
|
1583
|
+
#
|
1584
|
+
# * A DNS Firewall policy, which provides Route 53 Resolver DNS Firewall
|
1585
|
+
# rules to filter DNS queries for specified VPCs.
|
1334
1586
|
#
|
1335
1587
|
# Each policy is specific to one of the types. If you want to enforce
|
1336
1588
|
# more than one policy type across accounts, create multiple policies.
|
@@ -1345,10 +1597,10 @@ module Aws::FMS
|
|
1345
1597
|
# [1]: https://docs.aws.amazon.com/waf/latest/DDOSAPIReference/API_CreateSubscription.html
|
1346
1598
|
#
|
1347
1599
|
# @option params [required, Types::Policy] :policy
|
1348
|
-
# The details of the
|
1600
|
+
# The details of the Firewall Manager policy to be created.
|
1349
1601
|
#
|
1350
1602
|
# @option params [Array<Types::Tag>] :tag_list
|
1351
|
-
# The tags to add to the
|
1603
|
+
# The tags to add to the Amazon Web Services resource.
|
1352
1604
|
#
|
1353
1605
|
# @return [Types::PutPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1354
1606
|
#
|
@@ -1363,7 +1615,7 @@ module Aws::FMS
|
|
1363
1615
|
# policy_name: "ResourceName", # required
|
1364
1616
|
# policy_update_token: "PolicyUpdateToken",
|
1365
1617
|
# security_service_policy_data: { # required
|
1366
|
-
# type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
1618
|
+
# type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT, NETWORK_FIREWALL, DNS_FIREWALL
|
1367
1619
|
# managed_service_data: "ManagedServiceData",
|
1368
1620
|
# },
|
1369
1621
|
# resource_type: "ResourceType", # required
|
@@ -1396,7 +1648,7 @@ module Aws::FMS
|
|
1396
1648
|
# resp.policy.policy_id #=> String
|
1397
1649
|
# resp.policy.policy_name #=> String
|
1398
1650
|
# resp.policy.policy_update_token #=> String
|
1399
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
1651
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
1400
1652
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
1401
1653
|
# resp.policy.resource_type #=> String
|
1402
1654
|
# resp.policy.resource_type_list #=> Array
|
@@ -1423,10 +1675,10 @@ module Aws::FMS
|
|
1423
1675
|
req.send_request(options)
|
1424
1676
|
end
|
1425
1677
|
|
1426
|
-
# Creates an
|
1678
|
+
# Creates an Firewall Manager protocols list.
|
1427
1679
|
#
|
1428
1680
|
# @option params [required, Types::ProtocolsListData] :protocols_list
|
1429
|
-
# The details of the
|
1681
|
+
# The details of the Firewall Manager protocols list to be created.
|
1430
1682
|
#
|
1431
1683
|
# @option params [Array<Types::Tag>] :tag_list
|
1432
1684
|
# The tags associated with the resource.
|
@@ -1481,11 +1733,11 @@ module Aws::FMS
|
|
1481
1733
|
req.send_request(options)
|
1482
1734
|
end
|
1483
1735
|
|
1484
|
-
# Adds one or more tags to an
|
1736
|
+
# Adds one or more tags to an Amazon Web Services resource.
|
1485
1737
|
#
|
1486
1738
|
# @option params [required, String] :resource_arn
|
1487
1739
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1488
|
-
#
|
1740
|
+
# Firewall Manager resources that support tagging are policies,
|
1489
1741
|
# applications lists, and protocols lists.
|
1490
1742
|
#
|
1491
1743
|
# @option params [required, Array<Types::Tag>] :tag_list
|
@@ -1514,11 +1766,11 @@ module Aws::FMS
|
|
1514
1766
|
req.send_request(options)
|
1515
1767
|
end
|
1516
1768
|
|
1517
|
-
# Removes one or more tags from an
|
1769
|
+
# Removes one or more tags from an Amazon Web Services resource.
|
1518
1770
|
#
|
1519
1771
|
# @option params [required, String] :resource_arn
|
1520
1772
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1521
|
-
#
|
1773
|
+
# Firewall Manager resources that support tagging are policies,
|
1522
1774
|
# applications lists, and protocols lists.
|
1523
1775
|
#
|
1524
1776
|
# @option params [required, Array<String>] :tag_keys
|
@@ -1555,7 +1807,7 @@ module Aws::FMS
|
|
1555
1807
|
params: params,
|
1556
1808
|
config: config)
|
1557
1809
|
context[:gem_name] = 'aws-sdk-fms'
|
1558
|
-
context[:gem_version] = '1.
|
1810
|
+
context[:gem_version] = '1.37.0'
|
1559
1811
|
Seahorse::Client::Request.new(handlers, context)
|
1560
1812
|
end
|
1561
1813
|
|