aws-sdk-fms 1.51.0 → 1.52.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-fms/client.rb +3 -1
- data/lib/aws-sdk-fms/client_api.rb +6 -0
- data/lib/aws-sdk-fms/types.rb +73 -51
- data/lib/aws-sdk-fms.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 0e69a7fdad74ae2aa7b7fc8b67f42295b0211a835ec7e800da355e86a3d011c7
|
4
|
+
data.tar.gz: 04ba6b611b3310683fad7b90456232a7bb5d44c1d3a559b936a2d7b82deaf366
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9b8903dbaf3fdf2350bba0acca527b28a8aac856010cd206326588cfadb1349e2f066858c45c1b1026428bf394dbc487dce0f7e12d4efc27aa2d416c63e42813
|
7
|
+
data.tar.gz: f3a904693e82da234e54186ecf244138372467b6eb72e3cf7e479355a55ccce00a4901a5d47ad8c032b832ad5bfe816c7820beef084de2ef479c99f0408e6d93
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.52.0
|
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -1063,6 +1063,7 @@ module Aws::FMS
|
|
1063
1063
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
1064
1064
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].resource_id #=> String
|
1065
1065
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].priority #=> Integer
|
1066
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].override.action #=> String, one of "DROP_TO_ALERT"
|
1066
1067
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_default_actions #=> Array
|
1067
1068
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_default_actions[0] #=> String
|
1068
1069
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_engine_options.rule_order #=> String, one of "STRICT_ORDER", "DEFAULT_ACTION_ORDER"
|
@@ -1080,6 +1081,7 @@ module Aws::FMS
|
|
1080
1081
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].rule_group_name #=> String
|
1081
1082
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].resource_id #=> String
|
1082
1083
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].priority #=> Integer
|
1084
|
+
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].override.action #=> String, one of "DROP_TO_ALERT"
|
1083
1085
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_default_actions #=> Array
|
1084
1086
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_default_actions[0] #=> String
|
1085
1087
|
# resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_engine_options.rule_order #=> String, one of "STRICT_ORDER", "DEFAULT_ACTION_ORDER"
|
@@ -2072,7 +2074,7 @@ module Aws::FMS
|
|
2072
2074
|
params: params,
|
2073
2075
|
config: config)
|
2074
2076
|
context[:gem_name] = 'aws-sdk-fms'
|
2075
|
-
context[:gem_version] = '1.
|
2077
|
+
context[:gem_version] = '1.52.0'
|
2076
2078
|
Seahorse::Client::Request.new(handlers, context)
|
2077
2079
|
end
|
2078
2080
|
|
@@ -125,10 +125,12 @@ module Aws::FMS
|
|
125
125
|
NetworkFirewallMissingExpectedRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingExpectedRoutesViolation')
|
126
126
|
NetworkFirewallMissingFirewallViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingFirewallViolation')
|
127
127
|
NetworkFirewallMissingSubnetViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingSubnetViolation')
|
128
|
+
NetworkFirewallOverrideAction = Shapes::StringShape.new(name: 'NetworkFirewallOverrideAction')
|
128
129
|
NetworkFirewallPolicy = Shapes::StructureShape.new(name: 'NetworkFirewallPolicy')
|
129
130
|
NetworkFirewallPolicyDescription = Shapes::StructureShape.new(name: 'NetworkFirewallPolicyDescription')
|
130
131
|
NetworkFirewallPolicyModifiedViolation = Shapes::StructureShape.new(name: 'NetworkFirewallPolicyModifiedViolation')
|
131
132
|
NetworkFirewallResourceName = Shapes::StringShape.new(name: 'NetworkFirewallResourceName')
|
133
|
+
NetworkFirewallStatefulRuleGroupOverride = Shapes::StructureShape.new(name: 'NetworkFirewallStatefulRuleGroupOverride')
|
132
134
|
NetworkFirewallUnexpectedFirewallRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallUnexpectedFirewallRoutesViolation')
|
133
135
|
NetworkFirewallUnexpectedGatewayRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallUnexpectedGatewayRoutesViolation')
|
134
136
|
OrderedRemediationActions = Shapes::ListShape.new(name: 'OrderedRemediationActions')
|
@@ -647,6 +649,9 @@ module Aws::FMS
|
|
647
649
|
NetworkFirewallPolicyModifiedViolation.add_member(:expected_policy_description, Shapes::ShapeRef.new(shape: NetworkFirewallPolicyDescription, location_name: "ExpectedPolicyDescription"))
|
648
650
|
NetworkFirewallPolicyModifiedViolation.struct_class = Types::NetworkFirewallPolicyModifiedViolation
|
649
651
|
|
652
|
+
NetworkFirewallStatefulRuleGroupOverride.add_member(:action, Shapes::ShapeRef.new(shape: NetworkFirewallOverrideAction, location_name: "Action"))
|
653
|
+
NetworkFirewallStatefulRuleGroupOverride.struct_class = Types::NetworkFirewallStatefulRuleGroupOverride
|
654
|
+
|
650
655
|
NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:firewall_subnet_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallSubnetId"))
|
651
656
|
NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:violating_routes, Shapes::ShapeRef.new(shape: Routes, location_name: "ViolatingRoutes"))
|
652
657
|
NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:route_table_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "RouteTableId"))
|
@@ -885,6 +890,7 @@ module Aws::FMS
|
|
885
890
|
StatefulRuleGroup.add_member(:rule_group_name, Shapes::ShapeRef.new(shape: NetworkFirewallResourceName, location_name: "RuleGroupName"))
|
886
891
|
StatefulRuleGroup.add_member(:resource_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "ResourceId"))
|
887
892
|
StatefulRuleGroup.add_member(:priority, Shapes::ShapeRef.new(shape: PriorityNumber, location_name: "Priority"))
|
893
|
+
StatefulRuleGroup.add_member(:override, Shapes::ShapeRef.new(shape: NetworkFirewallStatefulRuleGroupOverride, location_name: "Override"))
|
888
894
|
StatefulRuleGroup.struct_class = Types::StatefulRuleGroup
|
889
895
|
|
890
896
|
StatefulRuleGroupList.member = Shapes::ShapeRef.new(shape: StatefulRuleGroup)
|
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -2382,6 +2382,22 @@ module Aws::FMS
|
|
2382
2382
|
include Aws::Structure
|
2383
2383
|
end
|
2384
2384
|
|
2385
|
+
# The setting that allows the policy owner to change the behavior of the
|
2386
|
+
# rule group within a policy.
|
2387
|
+
#
|
2388
|
+
# @!attribute [rw] action
|
2389
|
+
# The action that changes the rule group from `DROP` to `ALERT`. This
|
2390
|
+
# only applies to managed rule groups.
|
2391
|
+
# @return [String]
|
2392
|
+
#
|
2393
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkFirewallStatefulRuleGroupOverride AWS API Documentation
|
2394
|
+
#
|
2395
|
+
class NetworkFirewallStatefulRuleGroupOverride < Struct.new(
|
2396
|
+
:action)
|
2397
|
+
SENSITIVE = []
|
2398
|
+
include Aws::Structure
|
2399
|
+
end
|
2400
|
+
|
2385
2401
|
# Violation detail for an unexpected route that's present in a route
|
2386
2402
|
# table.
|
2387
2403
|
#
|
@@ -3815,56 +3831,6 @@ module Aws::FMS
|
|
3815
3831
|
# "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
|
3816
3832
|
# "allowedIPV4CidrList":[ ] \} \} \} \}"`
|
3817
3833
|
#
|
3818
|
-
# * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
|
3819
|
-
# distributions
|
3820
|
-
#
|
3821
|
-
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
3822
|
-
# \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
|
3823
|
-
# "automaticResponseAction":"BLOCK|COUNT"\},
|
3824
|
-
# "overrideCustomerWebaclClassic":true|false\}"`
|
3825
|
-
#
|
3826
|
-
# For example:
|
3827
|
-
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
3828
|
-
# \{"automaticResponseStatus":"ENABLED",
|
3829
|
-
# "automaticResponseAction":"COUNT"\}\}"`
|
3830
|
-
#
|
3831
|
-
# The default value for `automaticResponseStatus` is `IGNORED`. The
|
3832
|
-
# value for `automaticResponseAction` is only required when
|
3833
|
-
# `automaticResponseStatus` is set to `ENABLED`. The default value
|
3834
|
-
# for `overrideCustomerWebaclClassic` is `false`.
|
3835
|
-
#
|
3836
|
-
# For other resource types that you can protect with a Shield
|
3837
|
-
# Advanced policy, this `ManagedServiceData` configuration is an
|
3838
|
-
# empty string.
|
3839
|
-
#
|
3840
|
-
# * Example: `WAFV2`
|
3841
|
-
#
|
3842
|
-
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAmazonIpReputationList"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
|
3843
|
-
#
|
3844
|
-
# In the `loggingConfiguration`, you can specify one
|
3845
|
-
# `logDestinationConfigs`, you can optionally provide up to 20
|
3846
|
-
# `redactedFields`, and the `RedactedFieldType` must be one of
|
3847
|
-
# `URI`, `QUERY_STRING`, `HEADER`, or `METHOD`.
|
3848
|
-
#
|
3849
|
-
# * Example: `WAF Classic`
|
3850
|
-
#
|
3851
|
-
# `"\{"type": "WAF", "ruleGroups":
|
3852
|
-
# [\{"id":"12345678-1bcd-9012-efga-0987654321ab",
|
3853
|
-
# "overrideAction" : \{"type": "COUNT"\}\}],
|
3854
|
-
# "defaultAction": \{"type": "BLOCK"\}\}"`
|
3855
|
-
#
|
3856
|
-
# * Example: `WAFV2` - Firewall Manager support for WAF managed rule
|
3857
|
-
# group versioning
|
3858
|
-
#
|
3859
|
-
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":true,"version":"Version_2.0","vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesCommonRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
|
3860
|
-
#
|
3861
|
-
# To use a specific version of a WAF managed rule group in your
|
3862
|
-
# Firewall Manager policy, you must set `versionEnabled` to `true`,
|
3863
|
-
# and set `version` to the version you'd like to use. If you don't
|
3864
|
-
# set `versionEnabled` to `true`, or if you omit `versionEnabled`,
|
3865
|
-
# then Firewall Manager uses the default version of the WAF managed
|
3866
|
-
# rule group.
|
3867
|
-
#
|
3868
3834
|
# * Example: `SECURITY_GROUPS_COMMON`
|
3869
3835
|
#
|
3870
3836
|
# `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
@@ -3911,6 +3877,56 @@ module Aws::FMS
|
|
3911
3877
|
#
|
3912
3878
|
# `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"`
|
3913
3879
|
#
|
3880
|
+
# * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
|
3881
|
+
# distributions
|
3882
|
+
#
|
3883
|
+
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
3884
|
+
# \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
|
3885
|
+
# "automaticResponseAction":"BLOCK|COUNT"\},
|
3886
|
+
# "overrideCustomerWebaclClassic":true|false\}"`
|
3887
|
+
#
|
3888
|
+
# For example:
|
3889
|
+
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
3890
|
+
# \{"automaticResponseStatus":"ENABLED",
|
3891
|
+
# "automaticResponseAction":"COUNT"\}\}"`
|
3892
|
+
#
|
3893
|
+
# The default value for `automaticResponseStatus` is `IGNORED`. The
|
3894
|
+
# value for `automaticResponseAction` is only required when
|
3895
|
+
# `automaticResponseStatus` is set to `ENABLED`. The default value
|
3896
|
+
# for `overrideCustomerWebaclClassic` is `false`.
|
3897
|
+
#
|
3898
|
+
# For other resource types that you can protect with a Shield
|
3899
|
+
# Advanced policy, this `ManagedServiceData` configuration is an
|
3900
|
+
# empty string.
|
3901
|
+
#
|
3902
|
+
# * Example: `WAFV2`
|
3903
|
+
#
|
3904
|
+
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAmazonIpReputationList"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
|
3905
|
+
#
|
3906
|
+
# In the `loggingConfiguration`, you can specify one
|
3907
|
+
# `logDestinationConfigs`, you can optionally provide up to 20
|
3908
|
+
# `redactedFields`, and the `RedactedFieldType` must be one of
|
3909
|
+
# `URI`, `QUERY_STRING`, `HEADER`, or `METHOD`.
|
3910
|
+
#
|
3911
|
+
# * Example: `WAFV2` - Firewall Manager support for WAF managed rule
|
3912
|
+
# group versioning
|
3913
|
+
#
|
3914
|
+
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":true,"version":"Version_2.0","vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesCommonRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
|
3915
|
+
#
|
3916
|
+
# To use a specific version of a WAF managed rule group in your
|
3917
|
+
# Firewall Manager policy, you must set `versionEnabled` to `true`,
|
3918
|
+
# and set `version` to the version you'd like to use. If you don't
|
3919
|
+
# set `versionEnabled` to `true`, or if you omit `versionEnabled`,
|
3920
|
+
# then Firewall Manager uses the default version of the WAF managed
|
3921
|
+
# rule group.
|
3922
|
+
#
|
3923
|
+
# * Example: `WAF Classic`
|
3924
|
+
#
|
3925
|
+
# `"\{"type": "WAF", "ruleGroups":
|
3926
|
+
# [\{"id":"12345678-1bcd-9012-efga-0987654321ab",
|
3927
|
+
# "overrideAction" : \{"type": "COUNT"\}\}],
|
3928
|
+
# "defaultAction": \{"type": "BLOCK"\}\}"`
|
3929
|
+
#
|
3914
3930
|
#
|
3915
3931
|
#
|
3916
3932
|
# [1]: https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html
|
@@ -3983,12 +3999,18 @@ module Aws::FMS
|
|
3983
3999
|
# on.
|
3984
4000
|
# @return [Integer]
|
3985
4001
|
#
|
4002
|
+
# @!attribute [rw] override
|
4003
|
+
# The action that allows the policy owner to override the behavior of
|
4004
|
+
# the rule group within a policy.
|
4005
|
+
# @return [Types::NetworkFirewallStatefulRuleGroupOverride]
|
4006
|
+
#
|
3986
4007
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/StatefulRuleGroup AWS API Documentation
|
3987
4008
|
#
|
3988
4009
|
class StatefulRuleGroup < Struct.new(
|
3989
4010
|
:rule_group_name,
|
3990
4011
|
:resource_id,
|
3991
|
-
:priority
|
4012
|
+
:priority,
|
4013
|
+
:override)
|
3992
4014
|
SENSITIVE = []
|
3993
4015
|
include Aws::Structure
|
3994
4016
|
end
|
data/lib/aws-sdk-fms.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-fms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.52.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-10-
|
11
|
+
date: 2022-10-27 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|