aws-sdk-fms 1.32.0 → 1.37.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +198 -0
- data/LICENSE.txt +202 -0
- data/VERSION +1 -0
- data/lib/aws-sdk-fms.rb +2 -2
- data/lib/aws-sdk-fms/client.rb +380 -128
- data/lib/aws-sdk-fms/client_api.rb +294 -1
- data/lib/aws-sdk-fms/errors.rb +1 -1
- data/lib/aws-sdk-fms/resource.rb +1 -1
- data/lib/aws-sdk-fms/types.rb +1391 -247
- metadata +11 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c37272a3795fdc60b8570fcb8fb680ae61f694156bcab41f03e1bf86d6f7e47a
|
4
|
+
data.tar.gz: c9cd5778bf9f55358dbb14194f4ea98ecd809d666303f3d88ec3e69ecff311ed
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 825080cf8da456323d7ef9a7b7901d2a5219764157f1562e0ed46738aff341521ce157a039bb887b774674776625bc00b600c82c8a943985642cca4633f66d3b
|
7
|
+
data.tar.gz: 347a45ba0212c33f6090a4f2602061c8867f130def1acc2967337c7012920085ee2fe09405798c34f9bf42a9e8fd1be2f534054101f4f8c473874a4bf453e233
|
data/CHANGELOG.md
ADDED
@@ -0,0 +1,198 @@
|
|
1
|
+
Unreleased Changes
|
2
|
+
------------------
|
3
|
+
|
4
|
+
1.37.0 (2021-07-08)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - AWS Firewall Manager now supports route table monitoring, and provides remediation action recommendations to security administrators for AWS Network Firewall policies with misconfigured routes.
|
8
|
+
|
9
|
+
1.36.0 (2021-04-01)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Added Firewall Manager policy support for AWS Route 53 Resolver DNS Firewall.
|
13
|
+
|
14
|
+
1.35.0 (2021-03-10)
|
15
|
+
------------------
|
16
|
+
|
17
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
18
|
+
|
19
|
+
1.34.0 (2021-02-02)
|
20
|
+
------------------
|
21
|
+
|
22
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
23
|
+
|
24
|
+
1.33.0 (2020-11-17)
|
25
|
+
------------------
|
26
|
+
|
27
|
+
* Feature - Added Firewall Manager policy support for AWS Network Firewall resources.
|
28
|
+
|
29
|
+
1.32.0 (2020-09-30)
|
30
|
+
------------------
|
31
|
+
|
32
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
33
|
+
|
34
|
+
1.31.0 (2020-09-15)
|
35
|
+
------------------
|
36
|
+
|
37
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
38
|
+
|
39
|
+
1.30.0 (2020-08-25)
|
40
|
+
------------------
|
41
|
+
|
42
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
43
|
+
|
44
|
+
1.29.0 (2020-07-20)
|
45
|
+
------------------
|
46
|
+
|
47
|
+
* Feature - Added managed policies for auditing security group rules, including the use of managed application and protocol lists.
|
48
|
+
|
49
|
+
1.28.0 (2020-06-23)
|
50
|
+
------------------
|
51
|
+
|
52
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
53
|
+
|
54
|
+
1.27.1 (2020-06-11)
|
55
|
+
------------------
|
56
|
+
|
57
|
+
* Issue - Republish previous version with correct dependency on `aws-sdk-core`.
|
58
|
+
|
59
|
+
1.27.0 (2020-06-10)
|
60
|
+
------------------
|
61
|
+
|
62
|
+
* Issue - This version has been yanked. (#2327).
|
63
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
64
|
+
|
65
|
+
1.26.0 (2020-05-28)
|
66
|
+
------------------
|
67
|
+
|
68
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
69
|
+
|
70
|
+
1.25.0 (2020-05-07)
|
71
|
+
------------------
|
72
|
+
|
73
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
74
|
+
|
75
|
+
1.24.0 (2020-04-22)
|
76
|
+
------------------
|
77
|
+
|
78
|
+
* Feature - This release is to support AWS Firewall Manager policy with Organizational Unit scope.
|
79
|
+
|
80
|
+
1.23.0 (2020-03-31)
|
81
|
+
------------------
|
82
|
+
|
83
|
+
* Feature - This release contains FMS wafv2 support.
|
84
|
+
|
85
|
+
1.22.0 (2020-03-09)
|
86
|
+
------------------
|
87
|
+
|
88
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
89
|
+
|
90
|
+
1.21.0 (2020-01-08)
|
91
|
+
------------------
|
92
|
+
|
93
|
+
* Feature - AWS Firewall Manager now supports tagging, and tag-based access control, of policies.
|
94
|
+
|
95
|
+
1.20.0 (2019-10-23)
|
96
|
+
------------------
|
97
|
+
|
98
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
99
|
+
|
100
|
+
1.19.0 (2019-10-10)
|
101
|
+
------------------
|
102
|
+
|
103
|
+
* Feature - Firewall Manager now supports Amazon VPC security groups, making it easier to configure and manage security groups across multiple accounts from a single place.
|
104
|
+
|
105
|
+
1.18.0 (2019-07-25)
|
106
|
+
------------------
|
107
|
+
|
108
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
109
|
+
|
110
|
+
1.17.0 (2019-07-01)
|
111
|
+
------------------
|
112
|
+
|
113
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
114
|
+
|
115
|
+
1.16.0 (2019-06-17)
|
116
|
+
------------------
|
117
|
+
|
118
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
119
|
+
|
120
|
+
1.15.0 (2019-05-21)
|
121
|
+
------------------
|
122
|
+
|
123
|
+
* Feature - API update.
|
124
|
+
|
125
|
+
1.14.0 (2019-05-15)
|
126
|
+
------------------
|
127
|
+
|
128
|
+
* Feature - API update.
|
129
|
+
|
130
|
+
1.13.0 (2019-05-14)
|
131
|
+
------------------
|
132
|
+
|
133
|
+
* Feature - API update.
|
134
|
+
|
135
|
+
1.12.0 (2019-03-25)
|
136
|
+
------------------
|
137
|
+
|
138
|
+
* Feature - API update.
|
139
|
+
|
140
|
+
1.11.0 (2019-03-21)
|
141
|
+
------------------
|
142
|
+
|
143
|
+
* Feature - API update.
|
144
|
+
|
145
|
+
1.10.0 (2019-03-18)
|
146
|
+
------------------
|
147
|
+
|
148
|
+
* Feature - API update.
|
149
|
+
|
150
|
+
1.9.0 (2019-03-14)
|
151
|
+
------------------
|
152
|
+
|
153
|
+
* Feature - API update.
|
154
|
+
|
155
|
+
1.8.0 (2019-01-21)
|
156
|
+
------------------
|
157
|
+
|
158
|
+
* Feature - API update.
|
159
|
+
|
160
|
+
1.7.0 (2018-11-20)
|
161
|
+
------------------
|
162
|
+
|
163
|
+
* Feature - API update.
|
164
|
+
|
165
|
+
1.6.0 (2018-10-24)
|
166
|
+
------------------
|
167
|
+
|
168
|
+
* Feature - API update.
|
169
|
+
|
170
|
+
1.5.0 (2018-10-23)
|
171
|
+
------------------
|
172
|
+
|
173
|
+
* Feature - API update.
|
174
|
+
|
175
|
+
1.4.0 (2018-09-12)
|
176
|
+
------------------
|
177
|
+
|
178
|
+
* Feature - API update.
|
179
|
+
|
180
|
+
1.3.0 (2018-09-06)
|
181
|
+
------------------
|
182
|
+
|
183
|
+
* Feature - Adds code paths and plugins for future SDK instrumentation and telemetry.
|
184
|
+
|
185
|
+
1.2.0 (2018-09-05)
|
186
|
+
------------------
|
187
|
+
|
188
|
+
* Feature - API update.
|
189
|
+
|
190
|
+
1.1.0 (2018-06-26)
|
191
|
+
------------------
|
192
|
+
|
193
|
+
* Feature - API update.
|
194
|
+
|
195
|
+
1.0.0 (2018-04-04)
|
196
|
+
------------------
|
197
|
+
|
198
|
+
* Feature - Initial release of `aws-sdk-fms`.
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,202 @@
|
|
1
|
+
|
2
|
+
Apache License
|
3
|
+
Version 2.0, January 2004
|
4
|
+
http://www.apache.org/licenses/
|
5
|
+
|
6
|
+
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
7
|
+
|
8
|
+
1. Definitions.
|
9
|
+
|
10
|
+
"License" shall mean the terms and conditions for use, reproduction,
|
11
|
+
and distribution as defined by Sections 1 through 9 of this document.
|
12
|
+
|
13
|
+
"Licensor" shall mean the copyright owner or entity authorized by
|
14
|
+
the copyright owner that is granting the License.
|
15
|
+
|
16
|
+
"Legal Entity" shall mean the union of the acting entity and all
|
17
|
+
other entities that control, are controlled by, or are under common
|
18
|
+
control with that entity. For the purposes of this definition,
|
19
|
+
"control" means (i) the power, direct or indirect, to cause the
|
20
|
+
direction or management of such entity, whether by contract or
|
21
|
+
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
22
|
+
outstanding shares, or (iii) beneficial ownership of such entity.
|
23
|
+
|
24
|
+
"You" (or "Your") shall mean an individual or Legal Entity
|
25
|
+
exercising permissions granted by this License.
|
26
|
+
|
27
|
+
"Source" form shall mean the preferred form for making modifications,
|
28
|
+
including but not limited to software source code, documentation
|
29
|
+
source, and configuration files.
|
30
|
+
|
31
|
+
"Object" form shall mean any form resulting from mechanical
|
32
|
+
transformation or translation of a Source form, including but
|
33
|
+
not limited to compiled object code, generated documentation,
|
34
|
+
and conversions to other media types.
|
35
|
+
|
36
|
+
"Work" shall mean the work of authorship, whether in Source or
|
37
|
+
Object form, made available under the License, as indicated by a
|
38
|
+
copyright notice that is included in or attached to the work
|
39
|
+
(an example is provided in the Appendix below).
|
40
|
+
|
41
|
+
"Derivative Works" shall mean any work, whether in Source or Object
|
42
|
+
form, that is based on (or derived from) the Work and for which the
|
43
|
+
editorial revisions, annotations, elaborations, or other modifications
|
44
|
+
represent, as a whole, an original work of authorship. For the purposes
|
45
|
+
of this License, Derivative Works shall not include works that remain
|
46
|
+
separable from, or merely link (or bind by name) to the interfaces of,
|
47
|
+
the Work and Derivative Works thereof.
|
48
|
+
|
49
|
+
"Contribution" shall mean any work of authorship, including
|
50
|
+
the original version of the Work and any modifications or additions
|
51
|
+
to that Work or Derivative Works thereof, that is intentionally
|
52
|
+
submitted to Licensor for inclusion in the Work by the copyright owner
|
53
|
+
or by an individual or Legal Entity authorized to submit on behalf of
|
54
|
+
the copyright owner. For the purposes of this definition, "submitted"
|
55
|
+
means any form of electronic, verbal, or written communication sent
|
56
|
+
to the Licensor or its representatives, including but not limited to
|
57
|
+
communication on electronic mailing lists, source code control systems,
|
58
|
+
and issue tracking systems that are managed by, or on behalf of, the
|
59
|
+
Licensor for the purpose of discussing and improving the Work, but
|
60
|
+
excluding communication that is conspicuously marked or otherwise
|
61
|
+
designated in writing by the copyright owner as "Not a Contribution."
|
62
|
+
|
63
|
+
"Contributor" shall mean Licensor and any individual or Legal Entity
|
64
|
+
on behalf of whom a Contribution has been received by Licensor and
|
65
|
+
subsequently incorporated within the Work.
|
66
|
+
|
67
|
+
2. Grant of Copyright License. Subject to the terms and conditions of
|
68
|
+
this License, each Contributor hereby grants to You a perpetual,
|
69
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
70
|
+
copyright license to reproduce, prepare Derivative Works of,
|
71
|
+
publicly display, publicly perform, sublicense, and distribute the
|
72
|
+
Work and such Derivative Works in Source or Object form.
|
73
|
+
|
74
|
+
3. Grant of Patent License. Subject to the terms and conditions of
|
75
|
+
this License, each Contributor hereby grants to You a perpetual,
|
76
|
+
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
77
|
+
(except as stated in this section) patent license to make, have made,
|
78
|
+
use, offer to sell, sell, import, and otherwise transfer the Work,
|
79
|
+
where such license applies only to those patent claims licensable
|
80
|
+
by such Contributor that are necessarily infringed by their
|
81
|
+
Contribution(s) alone or by combination of their Contribution(s)
|
82
|
+
with the Work to which such Contribution(s) was submitted. If You
|
83
|
+
institute patent litigation against any entity (including a
|
84
|
+
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
85
|
+
or a Contribution incorporated within the Work constitutes direct
|
86
|
+
or contributory patent infringement, then any patent licenses
|
87
|
+
granted to You under this License for that Work shall terminate
|
88
|
+
as of the date such litigation is filed.
|
89
|
+
|
90
|
+
4. Redistribution. You may reproduce and distribute copies of the
|
91
|
+
Work or Derivative Works thereof in any medium, with or without
|
92
|
+
modifications, and in Source or Object form, provided that You
|
93
|
+
meet the following conditions:
|
94
|
+
|
95
|
+
(a) You must give any other recipients of the Work or
|
96
|
+
Derivative Works a copy of this License; and
|
97
|
+
|
98
|
+
(b) You must cause any modified files to carry prominent notices
|
99
|
+
stating that You changed the files; and
|
100
|
+
|
101
|
+
(c) You must retain, in the Source form of any Derivative Works
|
102
|
+
that You distribute, all copyright, patent, trademark, and
|
103
|
+
attribution notices from the Source form of the Work,
|
104
|
+
excluding those notices that do not pertain to any part of
|
105
|
+
the Derivative Works; and
|
106
|
+
|
107
|
+
(d) If the Work includes a "NOTICE" text file as part of its
|
108
|
+
distribution, then any Derivative Works that You distribute must
|
109
|
+
include a readable copy of the attribution notices contained
|
110
|
+
within such NOTICE file, excluding those notices that do not
|
111
|
+
pertain to any part of the Derivative Works, in at least one
|
112
|
+
of the following places: within a NOTICE text file distributed
|
113
|
+
as part of the Derivative Works; within the Source form or
|
114
|
+
documentation, if provided along with the Derivative Works; or,
|
115
|
+
within a display generated by the Derivative Works, if and
|
116
|
+
wherever such third-party notices normally appear. The contents
|
117
|
+
of the NOTICE file are for informational purposes only and
|
118
|
+
do not modify the License. You may add Your own attribution
|
119
|
+
notices within Derivative Works that You distribute, alongside
|
120
|
+
or as an addendum to the NOTICE text from the Work, provided
|
121
|
+
that such additional attribution notices cannot be construed
|
122
|
+
as modifying the License.
|
123
|
+
|
124
|
+
You may add Your own copyright statement to Your modifications and
|
125
|
+
may provide additional or different license terms and conditions
|
126
|
+
for use, reproduction, or distribution of Your modifications, or
|
127
|
+
for any such Derivative Works as a whole, provided Your use,
|
128
|
+
reproduction, and distribution of the Work otherwise complies with
|
129
|
+
the conditions stated in this License.
|
130
|
+
|
131
|
+
5. Submission of Contributions. Unless You explicitly state otherwise,
|
132
|
+
any Contribution intentionally submitted for inclusion in the Work
|
133
|
+
by You to the Licensor shall be under the terms and conditions of
|
134
|
+
this License, without any additional terms or conditions.
|
135
|
+
Notwithstanding the above, nothing herein shall supersede or modify
|
136
|
+
the terms of any separate license agreement you may have executed
|
137
|
+
with Licensor regarding such Contributions.
|
138
|
+
|
139
|
+
6. Trademarks. This License does not grant permission to use the trade
|
140
|
+
names, trademarks, service marks, or product names of the Licensor,
|
141
|
+
except as required for reasonable and customary use in describing the
|
142
|
+
origin of the Work and reproducing the content of the NOTICE file.
|
143
|
+
|
144
|
+
7. Disclaimer of Warranty. Unless required by applicable law or
|
145
|
+
agreed to in writing, Licensor provides the Work (and each
|
146
|
+
Contributor provides its Contributions) on an "AS IS" BASIS,
|
147
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
148
|
+
implied, including, without limitation, any warranties or conditions
|
149
|
+
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
150
|
+
PARTICULAR PURPOSE. You are solely responsible for determining the
|
151
|
+
appropriateness of using or redistributing the Work and assume any
|
152
|
+
risks associated with Your exercise of permissions under this License.
|
153
|
+
|
154
|
+
8. Limitation of Liability. In no event and under no legal theory,
|
155
|
+
whether in tort (including negligence), contract, or otherwise,
|
156
|
+
unless required by applicable law (such as deliberate and grossly
|
157
|
+
negligent acts) or agreed to in writing, shall any Contributor be
|
158
|
+
liable to You for damages, including any direct, indirect, special,
|
159
|
+
incidental, or consequential damages of any character arising as a
|
160
|
+
result of this License or out of the use or inability to use the
|
161
|
+
Work (including but not limited to damages for loss of goodwill,
|
162
|
+
work stoppage, computer failure or malfunction, or any and all
|
163
|
+
other commercial damages or losses), even if such Contributor
|
164
|
+
has been advised of the possibility of such damages.
|
165
|
+
|
166
|
+
9. Accepting Warranty or Additional Liability. While redistributing
|
167
|
+
the Work or Derivative Works thereof, You may choose to offer,
|
168
|
+
and charge a fee for, acceptance of support, warranty, indemnity,
|
169
|
+
or other liability obligations and/or rights consistent with this
|
170
|
+
License. However, in accepting such obligations, You may act only
|
171
|
+
on Your own behalf and on Your sole responsibility, not on behalf
|
172
|
+
of any other Contributor, and only if You agree to indemnify,
|
173
|
+
defend, and hold each Contributor harmless for any liability
|
174
|
+
incurred by, or claims asserted against, such Contributor by reason
|
175
|
+
of your accepting any such warranty or additional liability.
|
176
|
+
|
177
|
+
END OF TERMS AND CONDITIONS
|
178
|
+
|
179
|
+
APPENDIX: How to apply the Apache License to your work.
|
180
|
+
|
181
|
+
To apply the Apache License to your work, attach the following
|
182
|
+
boilerplate notice, with the fields enclosed by brackets "[]"
|
183
|
+
replaced with your own identifying information. (Don't include
|
184
|
+
the brackets!) The text should be enclosed in the appropriate
|
185
|
+
comment syntax for the file format. We also recommend that a
|
186
|
+
file or class name and description of purpose be included on the
|
187
|
+
same "printed page" as the copyright notice for easier
|
188
|
+
identification within third-party archives.
|
189
|
+
|
190
|
+
Copyright [yyyy] [name of copyright owner]
|
191
|
+
|
192
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
193
|
+
you may not use this file except in compliance with the License.
|
194
|
+
You may obtain a copy of the License at
|
195
|
+
|
196
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
197
|
+
|
198
|
+
Unless required by applicable law or agreed to in writing, software
|
199
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
200
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
201
|
+
See the License for the specific language governing permissions and
|
202
|
+
limitations under the License.
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
1.37.0
|
data/lib/aws-sdk-fms.rb
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-fms/customizations'
|
|
48
48
|
# @!group service
|
49
49
|
module Aws::FMS
|
50
50
|
|
51
|
-
GEM_VERSION = '1.
|
51
|
+
GEM_VERSION = '1.37.0'
|
52
52
|
|
53
53
|
end
|
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -3,7 +3,7 @@
|
|
3
3
|
# WARNING ABOUT GENERATED CODE
|
4
4
|
#
|
5
5
|
# This file is generated. See the contributing guide for more information:
|
6
|
-
# https://github.com/aws/aws-sdk-ruby/blob/
|
6
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
7
7
|
#
|
8
8
|
# WARNING ABOUT GENERATED CODE
|
9
9
|
|
@@ -337,22 +337,20 @@ module Aws::FMS
|
|
337
337
|
|
338
338
|
# @!group API Operations
|
339
339
|
|
340
|
-
# Sets the
|
341
|
-
#
|
342
|
-
#
|
343
|
-
#
|
344
|
-
# AWS Organizations master account, AWS Firewall Manager will set the
|
345
|
-
# appropriate permissions for the given member account.
|
340
|
+
# Sets the Firewall Manager administrator account. The account must be a
|
341
|
+
# member of the organization in Organizations whose resources you want
|
342
|
+
# to protect. Firewall Manager sets the permissions that allow the
|
343
|
+
# account to administer your Firewall Manager policies.
|
346
344
|
#
|
347
|
-
# The account that you associate with
|
348
|
-
#
|
345
|
+
# The account that you associate with Firewall Manager is called the
|
346
|
+
# Firewall Manager administrator account.
|
349
347
|
#
|
350
348
|
# @option params [required, String] :admin_account
|
351
|
-
# The
|
352
|
-
# Firewall Manager administrator account. This
|
353
|
-
# Organizations
|
354
|
-
#
|
355
|
-
#
|
349
|
+
# The Amazon Web Services account ID to associate with Firewall Manager
|
350
|
+
# as the Firewall Manager administrator account. This must be an
|
351
|
+
# Organizations member account. For more information about
|
352
|
+
# Organizations, see [Managing the Amazon Web Services Accounts in Your
|
353
|
+
# Organization][1].
|
356
354
|
#
|
357
355
|
#
|
358
356
|
#
|
@@ -375,7 +373,7 @@ module Aws::FMS
|
|
375
373
|
req.send_request(options)
|
376
374
|
end
|
377
375
|
|
378
|
-
# Permanently deletes an
|
376
|
+
# Permanently deletes an Firewall Manager applications list.
|
379
377
|
#
|
380
378
|
# @option params [required, String] :list_id
|
381
379
|
# The ID of the applications list that you want to delete. You can
|
@@ -399,9 +397,9 @@ module Aws::FMS
|
|
399
397
|
req.send_request(options)
|
400
398
|
end
|
401
399
|
|
402
|
-
# Deletes an
|
400
|
+
# Deletes an Firewall Manager association with the IAM role and the
|
403
401
|
# Amazon Simple Notification Service (SNS) topic that is used to record
|
404
|
-
#
|
402
|
+
# Firewall Manager SNS logs.
|
405
403
|
#
|
406
404
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
407
405
|
#
|
@@ -414,7 +412,7 @@ module Aws::FMS
|
|
414
412
|
req.send_request(options)
|
415
413
|
end
|
416
414
|
|
417
|
-
# Permanently deletes an
|
415
|
+
# Permanently deletes an Firewall Manager policy.
|
418
416
|
#
|
419
417
|
# @option params [required, String] :policy_id
|
420
418
|
# The ID of the policy that you want to delete. You can retrieve this ID
|
@@ -423,10 +421,9 @@ module Aws::FMS
|
|
423
421
|
# @option params [Boolean] :delete_all_policy_resources
|
424
422
|
# If `True`, the request performs cleanup according to the policy type.
|
425
423
|
#
|
426
|
-
# For
|
427
|
-
# following:
|
424
|
+
# For WAF and Shield Advanced policies, the cleanup does the following:
|
428
425
|
#
|
429
|
-
# * Deletes rule groups created by
|
426
|
+
# * Deletes rule groups created by Firewall Manager
|
430
427
|
#
|
431
428
|
# * Removes web ACLs from in-scope resources
|
432
429
|
#
|
@@ -468,7 +465,7 @@ module Aws::FMS
|
|
468
465
|
req.send_request(options)
|
469
466
|
end
|
470
467
|
|
471
|
-
# Permanently deletes an
|
468
|
+
# Permanently deletes an Firewall Manager protocols list.
|
472
469
|
#
|
473
470
|
# @option params [required, String] :list_id
|
474
471
|
# The ID of the protocols list that you want to delete. You can retrieve
|
@@ -492,10 +489,9 @@ module Aws::FMS
|
|
492
489
|
req.send_request(options)
|
493
490
|
end
|
494
491
|
|
495
|
-
# Disassociates the account that has been set as the
|
496
|
-
#
|
497
|
-
#
|
498
|
-
# request.
|
492
|
+
# Disassociates the account that has been set as the Firewall Manager
|
493
|
+
# administrator account. To set a different account as the administrator
|
494
|
+
# account, you must submit an `AssociateAdminAccount` request.
|
499
495
|
#
|
500
496
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
501
497
|
#
|
@@ -508,8 +504,8 @@ module Aws::FMS
|
|
508
504
|
req.send_request(options)
|
509
505
|
end
|
510
506
|
|
511
|
-
# Returns the
|
512
|
-
#
|
507
|
+
# Returns the Organizations account that is associated with Firewall
|
508
|
+
# Manager as the Firewall Manager administrator.
|
513
509
|
#
|
514
510
|
# @return [Types::GetAdminAccountResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
515
511
|
#
|
@@ -530,15 +526,15 @@ module Aws::FMS
|
|
530
526
|
req.send_request(options)
|
531
527
|
end
|
532
528
|
|
533
|
-
# Returns information about the specified
|
534
|
-
#
|
529
|
+
# Returns information about the specified Firewall Manager applications
|
530
|
+
# list.
|
535
531
|
#
|
536
532
|
# @option params [required, String] :list_id
|
537
|
-
# The ID of the
|
533
|
+
# The ID of the Firewall Manager applications list that you want the
|
538
534
|
# details for.
|
539
535
|
#
|
540
536
|
# @option params [Boolean] :default_list
|
541
|
-
# Specifies whether the list to retrieve is a default list owned by
|
537
|
+
# Specifies whether the list to retrieve is a default list owned by
|
542
538
|
# Firewall Manager.
|
543
539
|
#
|
544
540
|
# @return [Types::GetAppsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -582,20 +578,33 @@ module Aws::FMS
|
|
582
578
|
|
583
579
|
# Returns detailed compliance information about the specified member
|
584
580
|
# account. Details include resources that are in and out of compliance
|
585
|
-
# with the specified policy.
|
586
|
-
#
|
587
|
-
#
|
588
|
-
#
|
589
|
-
#
|
590
|
-
#
|
581
|
+
# with the specified policy.
|
582
|
+
#
|
583
|
+
# * Resources are considered noncompliant for WAF and Shield Advanced
|
584
|
+
# policies if the specified policy has not been applied to them.
|
585
|
+
#
|
586
|
+
# * Resources are considered noncompliant for security group policies if
|
587
|
+
# they are in scope of the policy, they violate one or more of the
|
588
|
+
# policy rules, and remediation is disabled or not possible.
|
589
|
+
#
|
590
|
+
# * Resources are considered noncompliant for Network Firewall policies
|
591
|
+
# if a firewall is missing in the VPC, if the firewall endpoint isn't
|
592
|
+
# set up in an expected Availability Zone and subnet, if a subnet
|
593
|
+
# created by the Firewall Manager doesn't have the expected route
|
594
|
+
# table, and for modifications to a firewall policy that violate the
|
595
|
+
# Firewall Manager policy's rules.
|
596
|
+
#
|
597
|
+
# * Resources are considered noncompliant for DNS Firewall policies if a
|
598
|
+
# DNS Firewall rule group is missing from the rule group associations
|
599
|
+
# for the VPC.
|
591
600
|
#
|
592
601
|
# @option params [required, String] :policy_id
|
593
602
|
# The ID of the policy that you want to get the details for. `PolicyId`
|
594
603
|
# is returned by `PutPolicy` and by `ListPolicies`.
|
595
604
|
#
|
596
605
|
# @option params [required, String] :member_account
|
597
|
-
# The
|
598
|
-
# details for.
|
606
|
+
# The Amazon Web Services account that owns the resources that you want
|
607
|
+
# to get the details for.
|
599
608
|
#
|
600
609
|
# @return [Types::GetComplianceDetailResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
601
610
|
#
|
@@ -615,7 +624,7 @@ module Aws::FMS
|
|
615
624
|
# resp.policy_compliance_detail.member_account #=> String
|
616
625
|
# resp.policy_compliance_detail.violators #=> Array
|
617
626
|
# resp.policy_compliance_detail.violators[0].resource_id #=> String
|
618
|
-
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
|
627
|
+
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT", "FMS_CREATED_SECURITY_GROUP_EDITED", "MISSING_FIREWALL", "MISSING_FIREWALL_SUBNET_IN_AZ", "MISSING_EXPECTED_ROUTE_TABLE", "NETWORK_FIREWALL_POLICY_MODIFIED", "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE", "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE", "UNEXPECTED_FIREWALL_ROUTES", "UNEXPECTED_TARGET_GATEWAY_ROUTES", "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY", "INVALID_ROUTE_CONFIGURATION", "MISSING_TARGET_GATEWAY", "INTERNET_TRAFFIC_NOT_INSPECTED", "BLACK_HOLE_ROUTE_DETECTED", "BLACK_HOLE_ROUTE_DETECTED_IN_FIREWALL_SUBNET", "RESOURCE_MISSING_DNS_FIREWALL"
|
619
628
|
# resp.policy_compliance_detail.violators[0].resource_type #=> String
|
620
629
|
# resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
|
621
630
|
# resp.policy_compliance_detail.expired_at #=> Time
|
@@ -632,7 +641,7 @@ module Aws::FMS
|
|
632
641
|
end
|
633
642
|
|
634
643
|
# Information about the Amazon Simple Notification Service (SNS) topic
|
635
|
-
# that is used to record
|
644
|
+
# that is used to record Firewall Manager SNS logs.
|
636
645
|
#
|
637
646
|
# @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
638
647
|
#
|
@@ -653,11 +662,10 @@ module Aws::FMS
|
|
653
662
|
req.send_request(options)
|
654
663
|
end
|
655
664
|
|
656
|
-
# Returns information about the specified
|
665
|
+
# Returns information about the specified Firewall Manager policy.
|
657
666
|
#
|
658
667
|
# @option params [required, String] :policy_id
|
659
|
-
# The ID of the
|
660
|
-
# for.
|
668
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
661
669
|
#
|
662
670
|
# @return [Types::GetPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
663
671
|
#
|
@@ -675,7 +683,7 @@ module Aws::FMS
|
|
675
683
|
# resp.policy.policy_id #=> String
|
676
684
|
# resp.policy.policy_name #=> String
|
677
685
|
# resp.policy.policy_update_token #=> String
|
678
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
686
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
679
687
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
680
688
|
# resp.policy.resource_type #=> String
|
681
689
|
# resp.policy.resource_type_list #=> Array
|
@@ -710,32 +718,32 @@ module Aws::FMS
|
|
710
718
|
# The ID of the policy for which you want to get the attack information.
|
711
719
|
#
|
712
720
|
# @option params [String] :member_account_id
|
713
|
-
# The
|
714
|
-
# the details for.
|
721
|
+
# The Amazon Web Services account that is in scope of the policy that
|
722
|
+
# you want to get the details for.
|
715
723
|
#
|
716
724
|
# @option params [Time,DateTime,Date,Integer,String] :start_time
|
717
725
|
# The start of the time period to query for the attacks. This is a
|
718
726
|
# `timestamp` type. The request syntax listing indicates a `number` type
|
719
|
-
# because the default used by
|
720
|
-
#
|
727
|
+
# because the default used by Firewall Manager is Unix time in seconds.
|
728
|
+
# However, any valid `timestamp` format is allowed.
|
721
729
|
#
|
722
730
|
# @option params [Time,DateTime,Date,Integer,String] :end_time
|
723
731
|
# The end of the time period to query for the attacks. This is a
|
724
732
|
# `timestamp` type. The request syntax listing indicates a `number` type
|
725
|
-
# because the default used by
|
726
|
-
#
|
733
|
+
# because the default used by Firewall Manager is Unix time in seconds.
|
734
|
+
# However, any valid `timestamp` format is allowed.
|
727
735
|
#
|
728
736
|
# @option params [String] :next_token
|
729
737
|
# If you specify a value for `MaxResults` and you have more objects than
|
730
|
-
# the number that you specify for `MaxResults`,
|
731
|
-
#
|
732
|
-
#
|
738
|
+
# the number that you specify for `MaxResults`, Firewall Manager returns
|
739
|
+
# a `NextToken` value in the response, which you can use to retrieve
|
740
|
+
# another group of objects. For the second and subsequent
|
733
741
|
# `GetProtectionStatus` requests, specify the value of `NextToken` from
|
734
742
|
# the previous response to get information about another batch of
|
735
743
|
# objects.
|
736
744
|
#
|
737
745
|
# @option params [Integer] :max_results
|
738
|
-
# Specifies the number of objects that you want
|
746
|
+
# Specifies the number of objects that you want Firewall Manager to
|
739
747
|
# return for this request. If you have more objects than the number that
|
740
748
|
# you specify for `MaxResults`, the response includes a `NextToken`
|
741
749
|
# value that you can use to get another batch of objects.
|
@@ -761,7 +769,7 @@ module Aws::FMS
|
|
761
769
|
# @example Response structure
|
762
770
|
#
|
763
771
|
# resp.admin_account_id #=> String
|
764
|
-
# resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
772
|
+
# resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
765
773
|
# resp.data #=> String
|
766
774
|
# resp.next_token #=> String
|
767
775
|
#
|
@@ -774,15 +782,15 @@ module Aws::FMS
|
|
774
782
|
req.send_request(options)
|
775
783
|
end
|
776
784
|
|
777
|
-
# Returns information about the specified
|
785
|
+
# Returns information about the specified Firewall Manager protocols
|
778
786
|
# list.
|
779
787
|
#
|
780
788
|
# @option params [required, String] :list_id
|
781
|
-
# The ID of the
|
789
|
+
# The ID of the Firewall Manager protocols list that you want the
|
782
790
|
# details for.
|
783
791
|
#
|
784
792
|
# @option params [Boolean] :default_list
|
785
|
-
# Specifies whether the list to retrieve is a default list owned by
|
793
|
+
# Specifies whether the list to retrieve is a default list owned by
|
786
794
|
# Firewall Manager.
|
787
795
|
#
|
788
796
|
# @return [Types::GetProtocolsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -820,25 +828,25 @@ module Aws::FMS
|
|
820
828
|
req.send_request(options)
|
821
829
|
end
|
822
830
|
|
823
|
-
# Retrieves violations for a resource based on the specified
|
824
|
-
#
|
831
|
+
# Retrieves violations for a resource based on the specified Firewall
|
832
|
+
# Manager policy and Amazon Web Services account.
|
825
833
|
#
|
826
834
|
# @option params [required, String] :policy_id
|
827
|
-
# The ID of the
|
828
|
-
#
|
829
|
-
# policies.
|
835
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
836
|
+
# This currently only supports security group content audit policies.
|
830
837
|
#
|
831
838
|
# @option params [required, String] :member_account
|
832
|
-
# The
|
839
|
+
# The Amazon Web Services account ID that you want the details for.
|
833
840
|
#
|
834
841
|
# @option params [required, String] :resource_id
|
835
842
|
# The ID of the resource that has violations.
|
836
843
|
#
|
837
844
|
# @option params [required, String] :resource_type
|
838
|
-
# The resource type. This is in the format shown in the [
|
839
|
-
# Types Reference][1]. Supported resource types are:
|
840
|
-
# `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`,
|
841
|
-
# `AWS::EC2::SecurityGroup
|
845
|
+
# The resource type. This is in the format shown in the [Amazon Web
|
846
|
+
# Services Resource Types Reference][1]. Supported resource types are:
|
847
|
+
# `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`,
|
848
|
+
# `AWS::EC2::SecurityGroup`, `AWS::NetworkFirewall::FirewallPolicy`, and
|
849
|
+
# `AWS::EC2::Subnet`.
|
842
850
|
#
|
843
851
|
#
|
844
852
|
#
|
@@ -888,6 +896,231 @@ module Aws::FMS
|
|
888
896
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violation_target #=> String
|
889
897
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups #=> Array
|
890
898
|
# resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups[0] #=> String
|
899
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.violation_target #=> String
|
900
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.vpc #=> String
|
901
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.availability_zone #=> String
|
902
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.target_violation_reason #=> String
|
903
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.violation_target #=> String
|
904
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.vpc #=> String
|
905
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.availability_zone #=> String
|
906
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.target_violation_reason #=> String
|
907
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.violation_target #=> String
|
908
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.vpc #=> String
|
909
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.availability_zone #=> String
|
910
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.current_route_table #=> String
|
911
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.expected_route_table #=> String
|
912
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.violation_target #=> String
|
913
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups #=> Array
|
914
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].rule_group_name #=> String
|
915
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].resource_id #=> String
|
916
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].priority #=> Integer
|
917
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions #=> Array
|
918
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions[0] #=> String
|
919
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions #=> Array
|
920
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions[0] #=> String
|
921
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions #=> Array
|
922
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions[0] #=> String
|
923
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups #=> Array
|
924
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
925
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].resource_id #=> String
|
926
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups #=> Array
|
927
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].rule_group_name #=> String
|
928
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].resource_id #=> String
|
929
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].priority #=> Integer
|
930
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions #=> Array
|
931
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions[0] #=> String
|
932
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions #=> Array
|
933
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions[0] #=> String
|
934
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions #=> Array
|
935
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions[0] #=> String
|
936
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups #=> Array
|
937
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
938
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].resource_id #=> String
|
939
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_id #=> String
|
940
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_availability_zone #=> String
|
941
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.route_table_id #=> String
|
942
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes #=> Array
|
943
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
944
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
945
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination #=> String
|
946
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target #=> String
|
947
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.is_route_table_used_in_different_az #=> Boolean
|
948
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_firewall_subnet_route_table #=> String
|
949
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_endpoint #=> String
|
950
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.firewall_subnet_id #=> String
|
951
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes #=> Array
|
952
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
|
953
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
|
954
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
|
955
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
|
956
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
|
957
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
|
958
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
|
959
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
|
960
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes #=> Array
|
961
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
962
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
963
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination #=> String
|
964
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target #=> String
|
965
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.internet_gateway_id #=> String
|
966
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_internet_gateway_route_table #=> String
|
967
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes #=> Array
|
968
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
|
969
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
|
970
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
|
971
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
|
972
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
|
973
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
|
974
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
|
975
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].route_table_id #=> String
|
976
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes #=> Array
|
977
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
978
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
979
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination #=> String
|
980
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target #=> String
|
981
|
+
# resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.vpc_id #=> String
|
982
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets #=> Array
|
983
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets[0] #=> String
|
984
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.route_table_id #=> String
|
985
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.is_route_table_used_in_different_az #=> Boolean
|
986
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
987
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
988
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination #=> String
|
989
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target #=> String
|
990
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_firewall_subnet_route_table #=> String
|
991
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_endpoint #=> String
|
992
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_endpoint #=> String
|
993
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_id #=> String
|
994
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_id #=> String
|
995
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes #=> Array
|
996
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
|
997
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
|
998
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
|
999
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
|
1000
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
|
1001
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
|
1002
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
|
1003
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
|
1004
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes #=> Array
|
1005
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1006
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1007
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination #=> String
|
1008
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target #=> String
|
1009
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.internet_gateway_id #=> String
|
1010
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_internet_gateway_route_table #=> String
|
1011
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes #=> Array
|
1012
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
|
1013
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
|
1014
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
|
1015
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
|
1016
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
|
1017
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
|
1018
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
|
1019
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].route_table_id #=> String
|
1020
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes #=> Array
|
1021
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1022
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1023
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination #=> String
|
1024
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target #=> String
|
1025
|
+
# resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.vpc_id #=> String
|
1026
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violation_target #=> String
|
1027
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.route_table_id #=> String
|
1028
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.vpc_id #=> String
|
1029
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes #=> Array
|
1030
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1031
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1032
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination #=> String
|
1033
|
+
# resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target #=> String
|
1034
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_subnet_id #=> String
|
1035
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes #=> Array
|
1036
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1037
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1038
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination #=> String
|
1039
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target #=> String
|
1040
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.route_table_id #=> String
|
1041
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_endpoint #=> String
|
1042
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.vpc_id #=> String
|
1043
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.gateway_id #=> String
|
1044
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes #=> Array
|
1045
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
|
1046
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
|
1047
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination #=> String
|
1048
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target #=> String
|
1049
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.route_table_id #=> String
|
1050
|
+
# resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.vpc_id #=> String
|
1051
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.violation_target #=> String
|
1052
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes #=> Array
|
1053
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v4_cidr #=> String
|
1054
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].prefix_list_id #=> String
|
1055
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v6_cidr #=> String
|
1056
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets #=> Array
|
1057
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets[0] #=> String
|
1058
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets #=> Array
|
1059
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets[0] #=> String
|
1060
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].route_table_id #=> String
|
1061
|
+
# resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.vpc_id #=> String
|
1062
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target #=> String
|
1063
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target_description #=> String
|
1064
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_priority #=> Integer
|
1065
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_policy_id #=> String
|
1066
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities #=> Array
|
1067
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities[0] #=> Integer
|
1068
|
+
# resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target #=> String
|
1069
|
+
# resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target_description #=> String
|
1070
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target #=> String
|
1071
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target_description #=> String
|
1072
|
+
# resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.number_of_rule_groups_already_associated #=> Integer
|
1073
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.description #=> String
|
1074
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions #=> Array
|
1075
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].description #=> String
|
1076
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions #=> Array
|
1077
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.description #=> String
|
1078
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.description #=> String
|
1079
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_cidr_block #=> String
|
1080
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_prefix_list_id #=> String
|
1081
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_ipv_6_cidr_block #=> String
|
1082
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.resource_id #=> String
|
1083
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.description #=> String
|
1084
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.resource_id #=> String
|
1085
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.description #=> String
|
1086
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.resource_id #=> String
|
1087
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.description #=> String
|
1088
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.description #=> String
|
1089
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_cidr_block #=> String
|
1090
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_prefix_list_id #=> String
|
1091
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_ipv_6_cidr_block #=> String
|
1092
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.resource_id #=> String
|
1093
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.description #=> String
|
1094
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.resource_id #=> String
|
1095
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.description #=> String
|
1096
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.description #=> String
|
1097
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_cidr_block #=> String
|
1098
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_prefix_list_id #=> String
|
1099
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_ipv_6_cidr_block #=> String
|
1100
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.resource_id #=> String
|
1101
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.description #=> String
|
1102
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.description #=> String
|
1103
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.resource_id #=> String
|
1104
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.description #=> String
|
1105
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.resource_id #=> String
|
1106
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.description #=> String
|
1107
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.description #=> String
|
1108
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.resource_id #=> String
|
1109
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.description #=> String
|
1110
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.resource_id #=> String
|
1111
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.description #=> String
|
1112
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.description #=> String
|
1113
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.resource_id #=> String
|
1114
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.description #=> String
|
1115
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.resource_id #=> String
|
1116
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.description #=> String
|
1117
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.resource_id #=> String
|
1118
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.description #=> String
|
1119
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.description #=> String
|
1120
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.resource_id #=> String
|
1121
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.description #=> String
|
1122
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].order #=> Integer
|
1123
|
+
# resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].is_default_action #=> Boolean
|
891
1124
|
# resp.violation_detail.resource_tags #=> Array
|
892
1125
|
# resp.violation_detail.resource_tags[0].key #=> String
|
893
1126
|
# resp.violation_detail.resource_tags[0].value #=> String
|
@@ -905,23 +1138,23 @@ module Aws::FMS
|
|
905
1138
|
# Returns an array of `AppsListDataSummary` objects.
|
906
1139
|
#
|
907
1140
|
# @option params [Boolean] :default_lists
|
908
|
-
# Specifies whether the lists to retrieve are default lists owned by
|
1141
|
+
# Specifies whether the lists to retrieve are default lists owned by
|
909
1142
|
# Firewall Manager.
|
910
1143
|
#
|
911
1144
|
# @option params [String] :next_token
|
912
1145
|
# If you specify a value for `MaxResults` in your list request, and you
|
913
|
-
# have more objects than the maximum,
|
1146
|
+
# have more objects than the maximum, Firewall Manager returns this
|
914
1147
|
# token in the response. For all but the first request, you provide the
|
915
1148
|
# token returned by the prior request in the request parameters, to
|
916
1149
|
# retrieve the next batch of objects.
|
917
1150
|
#
|
918
1151
|
# @option params [required, Integer] :max_results
|
919
|
-
# The maximum number of objects that you want
|
920
|
-
#
|
921
|
-
#
|
922
|
-
#
|
1152
|
+
# The maximum number of objects that you want Firewall Manager to return
|
1153
|
+
# for this request. If more objects are available, in the response,
|
1154
|
+
# Firewall Manager provides a `NextToken` value that you can use in a
|
1155
|
+
# subsequent call to get the next batch of objects.
|
923
1156
|
#
|
924
|
-
# If you don't specify this,
|
1157
|
+
# If you don't specify this, Firewall Manager returns all available
|
925
1158
|
# objects.
|
926
1159
|
#
|
927
1160
|
# @return [Types::ListAppsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -929,6 +1162,8 @@ module Aws::FMS
|
|
929
1162
|
# * {Types::ListAppsListsResponse#apps_lists #apps_lists} => Array<Types::AppsListDataSummary>
|
930
1163
|
# * {Types::ListAppsListsResponse#next_token #next_token} => String
|
931
1164
|
#
|
1165
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1166
|
+
#
|
932
1167
|
# @example Request syntax with placeholder values
|
933
1168
|
#
|
934
1169
|
# resp = client.list_apps_lists({
|
@@ -963,13 +1198,12 @@ module Aws::FMS
|
|
963
1198
|
# protected by the specified policy.
|
964
1199
|
#
|
965
1200
|
# @option params [required, String] :policy_id
|
966
|
-
# The ID of the
|
967
|
-
# for.
|
1201
|
+
# The ID of the Firewall Manager policy that you want the details for.
|
968
1202
|
#
|
969
1203
|
# @option params [String] :next_token
|
970
1204
|
# If you specify a value for `MaxResults` and you have more
|
971
1205
|
# `PolicyComplianceStatus` objects than the number that you specify for
|
972
|
-
# `MaxResults`,
|
1206
|
+
# `MaxResults`, Firewall Manager returns a `NextToken` value in the
|
973
1207
|
# response that allows you to list another group of
|
974
1208
|
# `PolicyComplianceStatus` objects. For the second and subsequent
|
975
1209
|
# `ListComplianceStatus` requests, specify the value of `NextToken` from
|
@@ -978,7 +1212,7 @@ module Aws::FMS
|
|
978
1212
|
#
|
979
1213
|
# @option params [Integer] :max_results
|
980
1214
|
# Specifies the number of `PolicyComplianceStatus` objects that you want
|
981
|
-
#
|
1215
|
+
# Firewall Manager to return for this request. If you have more
|
982
1216
|
# `PolicyComplianceStatus` objects than the number that you specify for
|
983
1217
|
# `MaxResults`, the response includes a `NextToken` value that you can
|
984
1218
|
# use to get another batch of `PolicyComplianceStatus` objects.
|
@@ -1024,22 +1258,22 @@ module Aws::FMS
|
|
1024
1258
|
end
|
1025
1259
|
|
1026
1260
|
# Returns a `MemberAccounts` object that lists the member accounts in
|
1027
|
-
# the administrator's
|
1261
|
+
# the administrator's Amazon Web Services organization.
|
1028
1262
|
#
|
1029
1263
|
# The `ListMemberAccounts` must be submitted by the account that is set
|
1030
|
-
# as the
|
1264
|
+
# as the Firewall Manager administrator.
|
1031
1265
|
#
|
1032
1266
|
# @option params [String] :next_token
|
1033
1267
|
# If you specify a value for `MaxResults` and you have more account IDs
|
1034
|
-
# than the number that you specify for `MaxResults`,
|
1035
|
-
#
|
1036
|
-
#
|
1268
|
+
# than the number that you specify for `MaxResults`, Firewall Manager
|
1269
|
+
# returns a `NextToken` value in the response that allows you to list
|
1270
|
+
# another group of IDs. For the second and subsequent
|
1037
1271
|
# `ListMemberAccountsRequest` requests, specify the value of `NextToken`
|
1038
1272
|
# from the previous response to get information about another batch of
|
1039
1273
|
# member account IDs.
|
1040
1274
|
#
|
1041
1275
|
# @option params [Integer] :max_results
|
1042
|
-
# Specifies the number of member account IDs that you want
|
1276
|
+
# Specifies the number of member account IDs that you want Firewall
|
1043
1277
|
# Manager to return for this request. If you have more IDs than the
|
1044
1278
|
# number that you specify for `MaxResults`, the response includes a
|
1045
1279
|
# `NextToken` value that you can use to get another batch of member
|
@@ -1079,18 +1313,18 @@ module Aws::FMS
|
|
1079
1313
|
# @option params [String] :next_token
|
1080
1314
|
# If you specify a value for `MaxResults` and you have more
|
1081
1315
|
# `PolicySummary` objects than the number that you specify for
|
1082
|
-
# `MaxResults`,
|
1316
|
+
# `MaxResults`, Firewall Manager returns a `NextToken` value in the
|
1083
1317
|
# response that allows you to list another group of `PolicySummary`
|
1084
1318
|
# objects. For the second and subsequent `ListPolicies` requests,
|
1085
1319
|
# specify the value of `NextToken` from the previous response to get
|
1086
1320
|
# information about another batch of `PolicySummary` objects.
|
1087
1321
|
#
|
1088
1322
|
# @option params [Integer] :max_results
|
1089
|
-
# Specifies the number of `PolicySummary` objects that you want
|
1090
|
-
#
|
1091
|
-
#
|
1092
|
-
#
|
1093
|
-
#
|
1323
|
+
# Specifies the number of `PolicySummary` objects that you want Firewall
|
1324
|
+
# Manager to return for this request. If you have more `PolicySummary`
|
1325
|
+
# objects than the number that you specify for `MaxResults`, the
|
1326
|
+
# response includes a `NextToken` value that you can use to get another
|
1327
|
+
# batch of `PolicySummary` objects.
|
1094
1328
|
#
|
1095
1329
|
# @return [Types::ListPoliciesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1096
1330
|
#
|
@@ -1113,7 +1347,7 @@ module Aws::FMS
|
|
1113
1347
|
# resp.policy_list[0].policy_id #=> String
|
1114
1348
|
# resp.policy_list[0].policy_name #=> String
|
1115
1349
|
# resp.policy_list[0].resource_type #=> String
|
1116
|
-
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
1350
|
+
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
1117
1351
|
# resp.policy_list[0].remediation_enabled #=> Boolean
|
1118
1352
|
# resp.next_token #=> String
|
1119
1353
|
#
|
@@ -1129,23 +1363,23 @@ module Aws::FMS
|
|
1129
1363
|
# Returns an array of `ProtocolsListDataSummary` objects.
|
1130
1364
|
#
|
1131
1365
|
# @option params [Boolean] :default_lists
|
1132
|
-
# Specifies whether the lists to retrieve are default lists owned by
|
1366
|
+
# Specifies whether the lists to retrieve are default lists owned by
|
1133
1367
|
# Firewall Manager.
|
1134
1368
|
#
|
1135
1369
|
# @option params [String] :next_token
|
1136
1370
|
# If you specify a value for `MaxResults` in your list request, and you
|
1137
|
-
# have more objects than the maximum,
|
1371
|
+
# have more objects than the maximum, Firewall Manager returns this
|
1138
1372
|
# token in the response. For all but the first request, you provide the
|
1139
1373
|
# token returned by the prior request in the request parameters, to
|
1140
1374
|
# retrieve the next batch of objects.
|
1141
1375
|
#
|
1142
1376
|
# @option params [required, Integer] :max_results
|
1143
|
-
# The maximum number of objects that you want
|
1144
|
-
#
|
1145
|
-
#
|
1146
|
-
#
|
1377
|
+
# The maximum number of objects that you want Firewall Manager to return
|
1378
|
+
# for this request. If more objects are available, in the response,
|
1379
|
+
# Firewall Manager provides a `NextToken` value that you can use in a
|
1380
|
+
# subsequent call to get the next batch of objects.
|
1147
1381
|
#
|
1148
|
-
# If you don't specify this,
|
1382
|
+
# If you don't specify this, Firewall Manager returns all available
|
1149
1383
|
# objects.
|
1150
1384
|
#
|
1151
1385
|
# @return [Types::ListProtocolsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1153,6 +1387,8 @@ module Aws::FMS
|
|
1153
1387
|
# * {Types::ListProtocolsListsResponse#protocols_lists #protocols_lists} => Array<Types::ProtocolsListDataSummary>
|
1154
1388
|
# * {Types::ListProtocolsListsResponse#next_token #next_token} => String
|
1155
1389
|
#
|
1390
|
+
# The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
|
1391
|
+
#
|
1156
1392
|
# @example Request syntax with placeholder values
|
1157
1393
|
#
|
1158
1394
|
# resp = client.list_protocols_lists({
|
@@ -1180,11 +1416,12 @@ module Aws::FMS
|
|
1180
1416
|
req.send_request(options)
|
1181
1417
|
end
|
1182
1418
|
|
1183
|
-
# Retrieves the list of tags for the specified
|
1419
|
+
# Retrieves the list of tags for the specified Amazon Web Services
|
1420
|
+
# resource.
|
1184
1421
|
#
|
1185
1422
|
# @option params [required, String] :resource_arn
|
1186
1423
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1187
|
-
#
|
1424
|
+
# Firewall Manager resources that support tagging are policies,
|
1188
1425
|
# applications lists, and protocols lists.
|
1189
1426
|
#
|
1190
1427
|
# @return [Types::ListTagsForResourceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -1212,11 +1449,10 @@ module Aws::FMS
|
|
1212
1449
|
req.send_request(options)
|
1213
1450
|
end
|
1214
1451
|
|
1215
|
-
# Creates an
|
1452
|
+
# Creates an Firewall Manager applications list.
|
1216
1453
|
#
|
1217
1454
|
# @option params [required, Types::AppsListData] :apps_list
|
1218
|
-
# The details of the
|
1219
|
-
# created.
|
1455
|
+
# The details of the Firewall Manager applications list to be created.
|
1220
1456
|
#
|
1221
1457
|
# @option params [Array<Types::Tag>] :tag_list
|
1222
1458
|
# The tags associated with the resource.
|
@@ -1288,15 +1524,25 @@ module Aws::FMS
|
|
1288
1524
|
end
|
1289
1525
|
|
1290
1526
|
# Designates the IAM role and Amazon Simple Notification Service (SNS)
|
1291
|
-
# topic that
|
1527
|
+
# topic that Firewall Manager uses to record SNS logs.
|
1528
|
+
#
|
1529
|
+
# To perform this action outside of the console, you must configure the
|
1530
|
+
# SNS topic to allow the Firewall Manager role `AWSServiceRoleForFMS` to
|
1531
|
+
# publish SNS logs. For more information, see [Firewall Manager required
|
1532
|
+
# permissions for API actions][1] in the *Firewall Manager Developer
|
1533
|
+
# Guide*.
|
1534
|
+
#
|
1535
|
+
#
|
1536
|
+
#
|
1537
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/fms-api-permissions-ref.html
|
1292
1538
|
#
|
1293
1539
|
# @option params [required, String] :sns_topic_arn
|
1294
1540
|
# The Amazon Resource Name (ARN) of the SNS topic that collects
|
1295
|
-
# notifications from
|
1541
|
+
# notifications from Firewall Manager.
|
1296
1542
|
#
|
1297
1543
|
# @option params [required, String] :sns_role_name
|
1298
1544
|
# The Amazon Resource Name (ARN) of the IAM role that allows Amazon SNS
|
1299
|
-
# to record
|
1545
|
+
# to record Firewall Manager activity.
|
1300
1546
|
#
|
1301
1547
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
1302
1548
|
#
|
@@ -1316,21 +1562,27 @@ module Aws::FMS
|
|
1316
1562
|
req.send_request(options)
|
1317
1563
|
end
|
1318
1564
|
|
1319
|
-
# Creates an
|
1565
|
+
# Creates an Firewall Manager policy.
|
1320
1566
|
#
|
1321
1567
|
# Firewall Manager provides the following types of policies:
|
1322
1568
|
#
|
1323
|
-
# *
|
1324
|
-
#
|
1569
|
+
# * An WAF policy (type WAFV2), which defines rule groups to run first
|
1570
|
+
# in the corresponding WAF web ACL and rule groups to run last in the
|
1571
|
+
# web ACL.
|
1325
1572
|
#
|
1326
|
-
# * An
|
1327
|
-
# first in the corresponding AWS WAF web ACL and rule groups to run
|
1328
|
-
# last in the web ACL.
|
1573
|
+
# * An WAF Classic policy (type WAF), which defines a rule group.
|
1329
1574
|
#
|
1330
|
-
# *
|
1575
|
+
# * A Shield Advanced policy, which applies Shield Advanced protection
|
1576
|
+
# to specified accounts and resources.
|
1331
1577
|
#
|
1332
1578
|
# * A security group policy, which manages VPC security groups across
|
1333
|
-
# your
|
1579
|
+
# your Amazon Web Services organization.
|
1580
|
+
#
|
1581
|
+
# * An Network Firewall policy, which provides firewall rules to filter
|
1582
|
+
# network traffic in specified Amazon VPCs.
|
1583
|
+
#
|
1584
|
+
# * A DNS Firewall policy, which provides Route 53 Resolver DNS Firewall
|
1585
|
+
# rules to filter DNS queries for specified VPCs.
|
1334
1586
|
#
|
1335
1587
|
# Each policy is specific to one of the types. If you want to enforce
|
1336
1588
|
# more than one policy type across accounts, create multiple policies.
|
@@ -1345,10 +1597,10 @@ module Aws::FMS
|
|
1345
1597
|
# [1]: https://docs.aws.amazon.com/waf/latest/DDOSAPIReference/API_CreateSubscription.html
|
1346
1598
|
#
|
1347
1599
|
# @option params [required, Types::Policy] :policy
|
1348
|
-
# The details of the
|
1600
|
+
# The details of the Firewall Manager policy to be created.
|
1349
1601
|
#
|
1350
1602
|
# @option params [Array<Types::Tag>] :tag_list
|
1351
|
-
# The tags to add to the
|
1603
|
+
# The tags to add to the Amazon Web Services resource.
|
1352
1604
|
#
|
1353
1605
|
# @return [Types::PutPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1354
1606
|
#
|
@@ -1363,7 +1615,7 @@ module Aws::FMS
|
|
1363
1615
|
# policy_name: "ResourceName", # required
|
1364
1616
|
# policy_update_token: "PolicyUpdateToken",
|
1365
1617
|
# security_service_policy_data: { # required
|
1366
|
-
# type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
1618
|
+
# type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT, NETWORK_FIREWALL, DNS_FIREWALL
|
1367
1619
|
# managed_service_data: "ManagedServiceData",
|
1368
1620
|
# },
|
1369
1621
|
# resource_type: "ResourceType", # required
|
@@ -1396,7 +1648,7 @@ module Aws::FMS
|
|
1396
1648
|
# resp.policy.policy_id #=> String
|
1397
1649
|
# resp.policy.policy_name #=> String
|
1398
1650
|
# resp.policy.policy_update_token #=> String
|
1399
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
1651
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
|
1400
1652
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
1401
1653
|
# resp.policy.resource_type #=> String
|
1402
1654
|
# resp.policy.resource_type_list #=> Array
|
@@ -1423,10 +1675,10 @@ module Aws::FMS
|
|
1423
1675
|
req.send_request(options)
|
1424
1676
|
end
|
1425
1677
|
|
1426
|
-
# Creates an
|
1678
|
+
# Creates an Firewall Manager protocols list.
|
1427
1679
|
#
|
1428
1680
|
# @option params [required, Types::ProtocolsListData] :protocols_list
|
1429
|
-
# The details of the
|
1681
|
+
# The details of the Firewall Manager protocols list to be created.
|
1430
1682
|
#
|
1431
1683
|
# @option params [Array<Types::Tag>] :tag_list
|
1432
1684
|
# The tags associated with the resource.
|
@@ -1481,11 +1733,11 @@ module Aws::FMS
|
|
1481
1733
|
req.send_request(options)
|
1482
1734
|
end
|
1483
1735
|
|
1484
|
-
# Adds one or more tags to an
|
1736
|
+
# Adds one or more tags to an Amazon Web Services resource.
|
1485
1737
|
#
|
1486
1738
|
# @option params [required, String] :resource_arn
|
1487
1739
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1488
|
-
#
|
1740
|
+
# Firewall Manager resources that support tagging are policies,
|
1489
1741
|
# applications lists, and protocols lists.
|
1490
1742
|
#
|
1491
1743
|
# @option params [required, Array<Types::Tag>] :tag_list
|
@@ -1514,11 +1766,11 @@ module Aws::FMS
|
|
1514
1766
|
req.send_request(options)
|
1515
1767
|
end
|
1516
1768
|
|
1517
|
-
# Removes one or more tags from an
|
1769
|
+
# Removes one or more tags from an Amazon Web Services resource.
|
1518
1770
|
#
|
1519
1771
|
# @option params [required, String] :resource_arn
|
1520
1772
|
# The Amazon Resource Name (ARN) of the resource to return tags for. The
|
1521
|
-
#
|
1773
|
+
# Firewall Manager resources that support tagging are policies,
|
1522
1774
|
# applications lists, and protocols lists.
|
1523
1775
|
#
|
1524
1776
|
# @option params [required, Array<String>] :tag_keys
|
@@ -1555,7 +1807,7 @@ module Aws::FMS
|
|
1555
1807
|
params: params,
|
1556
1808
|
config: config)
|
1557
1809
|
context[:gem_name] = 'aws-sdk-fms'
|
1558
|
-
context[:gem_version] = '1.
|
1810
|
+
context[:gem_version] = '1.37.0'
|
1559
1811
|
Seahorse::Client::Request.new(handlers, context)
|
1560
1812
|
end
|
1561
1813
|
|