aws-sdk-fms 1.84.0 → 1.85.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ebce3b13ed731da3bdc84c48d95048df82160fcbb2183f289f4f867a16fe56d9
4
- data.tar.gz: 70f5047dbdfe3733c07ae498903ef695327a90dc4c0a00c7401156a5d0de32cd
3
+ metadata.gz: 7d2561eef33bdc50c82844067358b74031daf4bb6b946e82824aa0e49507391c
4
+ data.tar.gz: 9cd91805243df01cb41440aecf5ccb6069957218402413cce948a261e029fcc9
5
5
  SHA512:
6
- metadata.gz: 24c879ec0cc699f346fd8e19268583c75ab37f233d52df376bc10bd30d826f9d12e06271c764b2bc2ec5f18cacb02207bbccf7caeaa93fd83fd8a49a63ec28e8
7
- data.tar.gz: eef722ede4a203b0e98823300a1dab4ebe8b4680ae565f7e659915d43fd749ee2b978f7d2d68aac2bf035a926ac68c806a0355a8b3935af61ddc338afea9ed26
6
+ metadata.gz: 964db7321c8846752e8d5710dbc34733130954261190264f8affb6829712b34c6f0eed4a9d9007aef2e3e6e78e05d7ae3320091fb55e046e12079b85d98e0f98
7
+ data.tar.gz: cab1eef3b037a2597ff6a97901ce887b7af8cf9aec8240646869089a6efc25202c7a524797a848b23826b580c95d6c38687e7c0ac90e6e8793d2ee7540217d9e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.85.0 (2024-11-06)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
4
9
  1.84.0 (2024-10-21)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.84.0
1
+ 1.85.0
@@ -2954,7 +2954,7 @@ module Aws::FMS
2954
2954
  tracer: tracer
2955
2955
  )
2956
2956
  context[:gem_name] = 'aws-sdk-fms'
2957
- context[:gem_version] = '1.84.0'
2957
+ context[:gem_version] = '1.85.0'
2958
2958
  Seahorse::Client::Request.new(handlers, context)
2959
2959
  end
2960
2960
 
@@ -3489,17 +3489,16 @@ module Aws::FMS
3489
3489
  # You can specify account IDs, OUs, or a combination:
3490
3490
  #
3491
3491
  # * Specify account IDs by setting the key to `ACCOUNT`. For example,
3492
- # the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
3493
- # “accountID2”]\}`.
3492
+ # the following is a valid map: `{“ACCOUNT” : [“accountID1”,
3493
+ # “accountID2”]}`.
3494
3494
  #
3495
3495
  # * Specify OUs by setting the key to `ORG_UNIT`. For example, the
3496
- # following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
3497
- # “ouid112”]\}`.
3496
+ # following is a valid map: `{“ORG_UNIT” : [“ouid111”, “ouid112”]}`.
3498
3497
  #
3499
3498
  # * Specify accounts and OUs together in a single map, separated with
3500
- # a comma. For example, the following is a valid map: `\{“ACCOUNT” :
3499
+ # a comma. For example, the following is a valid map: `{“ACCOUNT” :
3501
3500
  # [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
3502
- # “ouid112”]\}`.
3501
+ # “ouid112”]}`.
3503
3502
  # @return [Hash<String,Array<String>>]
3504
3503
  #
3505
3504
  # @!attribute [rw] exclude_map
@@ -3519,17 +3518,16 @@ module Aws::FMS
3519
3518
  # You can specify account IDs, OUs, or a combination:
3520
3519
  #
3521
3520
  # * Specify account IDs by setting the key to `ACCOUNT`. For example,
3522
- # the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
3523
- # “accountID2”]\}`.
3521
+ # the following is a valid map: `{“ACCOUNT” : [“accountID1”,
3522
+ # “accountID2”]}`.
3524
3523
  #
3525
3524
  # * Specify OUs by setting the key to `ORG_UNIT`. For example, the
3526
- # following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
3527
- # “ouid112”]\}`.
3525
+ # following is a valid map: `{“ORG_UNIT” : [“ouid111”, “ouid112”]}`.
3528
3526
  #
3529
3527
  # * Specify accounts and OUs together in a single map, separated with
3530
- # a comma. For example, the following is a valid map: `\{“ACCOUNT” :
3528
+ # a comma. For example, the following is a valid map: `{“ACCOUNT” :
3531
3529
  # [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
3532
- # “ouid112”]\}`.
3530
+ # “ouid112”]}`.
3533
3531
  # @return [Hash<String,Array<String>>]
3534
3532
  #
3535
3533
  # @!attribute [rw] resource_set_ids
@@ -4824,7 +4822,7 @@ module Aws::FMS
4824
4822
  #
4825
4823
  # * Example: `DNS_FIREWALL`
4826
4824
  #
4827
- # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
4825
+ # `"{"type":"DNS_FIREWALL","preProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-1","priority":10}],"postProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-2","priority":9911}]}"`
4828
4826
  #
4829
4827
  # <note markdown="1"> Valid values for `preProcessRuleGroups` are between 1 and 99.
4830
4828
  # Valid values for `postProcessRuleGroups` are between 9901 and
@@ -4834,9 +4832,9 @@ module Aws::FMS
4834
4832
  #
4835
4833
  # * Example: `IMPORT_NETWORK_FIREWALL`
4836
4834
  #
4837
- # `"\{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8\}],"networkFirewallStatefulEngineOptions":\{"ruleOrder":"STRICT_ORDER"\},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]\}\}"`
4835
+ # `"{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":{"networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8}],"networkFirewallStatefulEngineOptions":{"ruleOrder":"STRICT_ORDER"},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]}}"`
4838
4836
  #
4839
- # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
4837
+ # `"{"type":"DNS_FIREWALL","preProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-1","priority":10}],"postProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-2","priority":9911}]}"`
4840
4838
  #
4841
4839
  # <note markdown="1"> Valid values for `preProcessRuleGroups` are between 1 and 99.
4842
4840
  # Valid values for `postProcessRuleGroups` are between 9901 and
@@ -4846,7 +4844,7 @@ module Aws::FMS
4846
4844
  #
4847
4845
  # * Example: `NETWORK_FIREWALL` - Centralized deployment model
4848
4846
  #
4849
- # `"\{"type":"NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\},"firewallDeploymentModel":\{"centralizedFirewallDeploymentModel":\{"centralizedFirewallOrchestrationConfig":\{"inspectionVpcIds":[\{"resourceId":"vpc-1234","accountId":"123456789011"\}],"firewallCreationConfig":\{"endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneId":null,"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\}]\}\},"allowedIPV4CidrList":[]\}\}\}\}"`
4847
+ # `"{"type":"NETWORK_FIREWALL","awsNetworkFirewallConfig":{"networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}},"firewallDeploymentModel":{"centralizedFirewallDeploymentModel":{"centralizedFirewallOrchestrationConfig":{"inspectionVpcIds":[{"resourceId":"vpc-1234","accountId":"123456789011"}],"firewallCreationConfig":{"endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneId":null,"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]}]}},"allowedIPV4CidrList":[]}}}}"`
4850
4848
  #
4851
4849
  # To use the centralized deployment model, you must set
4852
4850
  # [PolicyOption][1] to `CENTRALIZED`.
@@ -4855,7 +4853,7 @@ module Aws::FMS
4855
4853
  # automatic Availability Zone configuration
4856
4854
  #
4857
4855
  # `
4858
- # "\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"OFF"\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\}"
4856
+ # "{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"OFF"},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}}"
4859
4857
  # `
4860
4858
  #
4861
4859
  # With automatic Availbility Zone configuration, Firewall Manager
@@ -4867,8 +4865,8 @@ module Aws::FMS
4867
4865
  # automatic Availability Zone configuration and route management
4868
4866
  #
4869
4867
  # `
4870
- # "\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"]\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":
4871
- # "FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\}"
4868
+ # "{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"]},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":
4869
+ # "FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}}"
4872
4870
  # `
4873
4871
  #
4874
4872
  # To use the distributed deployment model, you must set
@@ -4877,11 +4875,11 @@ module Aws::FMS
4877
4875
  # * Example: `NETWORK_FIREWALL` - Distributed deployment model with
4878
4876
  # custom Availability Zone configuration
4879
4877
  #
4880
- # `"\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName",
4881
- # "actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\},\{"actionName":"fragmentcustomactionname","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"fragmentmetricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"firewallCreationConfig":\{
4882
- # "endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\},\{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":[
4883
- # "10.0.0.0/28"]\}]\}
4884
- # \},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"OFF","networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":boolean\}\}"
4878
+ # `"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName",
4879
+ # "actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}},{"actionName":"fragmentcustomactionname","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"fragmentmetricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"firewallCreationConfig":{
4880
+ # "endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]},{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":[
4881
+ # "10.0.0.0/28"]}]}
4882
+ # },"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"OFF","networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":boolean}}"
4885
4883
  # `
4886
4884
  #
4887
4885
  # With custom Availability Zone configuration, you define which
@@ -4897,7 +4895,7 @@ module Aws::FMS
4897
4895
  # * Example: `NETWORK_FIREWALL` - Distributed deployment model with
4898
4896
  # custom Availability Zone configuration and route management
4899
4897
  #
4900
- # `"\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\},\{"actionName":"fragmentcustomactionname","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"fragmentmetricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"firewallCreationConfig":\{"endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\},\{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":["10.0.0.0/28"]\}]\}\},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"],"routeManagementConfig":\{"allowCrossAZTrafficIfNoEndpoint":true\}\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":boolean\}\}"
4898
+ # `"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}},{"actionName":"fragmentcustomactionname","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"fragmentmetricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"firewallCreationConfig":{"endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]},{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":["10.0.0.0/28"]}]}},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"],"routeManagementConfig":{"allowCrossAZTrafficIfNoEndpoint":true}},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":boolean}}"
4901
4899
  # `
4902
4900
  #
4903
4901
  # To use the distributed deployment model, you must set
@@ -4905,12 +4903,12 @@ module Aws::FMS
4905
4903
  #
4906
4904
  # * Example: `SECURITY_GROUPS_COMMON`
4907
4905
  #
4908
- # `"\{"type":"SECURITY_GROUPS_COMMON","securityGroups":[\{"id":"sg-03b1f67d69ed00197"\}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":true,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"enableSecurityGroupReferencesDistribution":true\}"`
4906
+ # `"{"type":"SECURITY_GROUPS_COMMON","securityGroups":[{"id":"sg-03b1f67d69ed00197"}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":true,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"enableSecurityGroupReferencesDistribution":true}"`
4909
4907
  #
4910
4908
  # * Example: `SECURITY_GROUPS_COMMON` - Security group tag
4911
4909
  # distribution
4912
4910
  #
4913
- # `""\{"type":"SECURITY_GROUPS_COMMON","securityGroups":[\{"id":"sg-000e55995d61a06bd"\}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":false,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":false,"enableTagDistribution":true\}""`
4911
+ # `""{"type":"SECURITY_GROUPS_COMMON","securityGroups":[{"id":"sg-000e55995d61a06bd"}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":false,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":false,"enableTagDistribution":true}""`
4914
4912
  #
4915
4913
  # Firewall Manager automatically distributes tags from the primary
4916
4914
  # group to the security groups created by this policy. To use
@@ -4928,13 +4926,13 @@ module Aws::FMS
4928
4926
  # * Example: Shared VPCs. Apply the preceding policy to resources in
4929
4927
  # shared VPCs as well as to those in VPCs that the account owns
4930
4928
  #
4931
- # `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
4932
- # "applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"securityGroups":[\{"id":"
4933
- # sg-000e55995d61a06bd"\}]\}"`
4929
+ # `"{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
4930
+ # "applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"securityGroups":[{"id":"
4931
+ # sg-000e55995d61a06bd"}]}"`
4934
4932
  #
4935
4933
  # * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
4936
4934
  #
4937
- # `"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","preManagedOptions":[\{"denyProtocolAllValue":true\},\{"auditSgDirection":\{"type":"ALL"\}\}],"securityGroups":[\{"id":"sg-049b2393a25468971"\}],"securityGroupAction":\{"type":"ALLOW"\}\}"`
4935
+ # `"{"type":"SECURITY_GROUPS_CONTENT_AUDIT","preManagedOptions":[{"denyProtocolAllValue":true},{"auditSgDirection":{"type":"ALL"}}],"securityGroups":[{"id":"sg-049b2393a25468971"}],"securityGroupAction":{"type":"ALLOW"}}"`
4938
4936
  #
4939
4937
  # The security group action for content audit can be `ALLOW` or
4940
4938
  # `DENY`. For `ALLOW`, all in-scope security group rules must be
@@ -4945,11 +4943,11 @@ module Aws::FMS
4945
4943
  #
4946
4944
  # * Example: `SECURITY_GROUPS_USAGE_AUDIT`
4947
4945
  #
4948
- # `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true,"optionalDelayForUnusedInMinutes":60\}"`
4946
+ # `"{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true,"optionalDelayForUnusedInMinutes":60}"`
4949
4947
  #
4950
4948
  # * Example: `SHIELD_ADVANCED` with web ACL management
4951
4949
  #
4952
- # `"\{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true\}"`
4950
+ # `"{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true}"`
4953
4951
  #
4954
4952
  # If you set `optimizeUnassociatedWebACL` to `true`, Firewall
4955
4953
  # Manager creates web ACLs in accounts within the policy scope if
@@ -4976,16 +4974,16 @@ module Aws::FMS
4976
4974
  # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
4977
4975
  # distributions
4978
4976
  #
4979
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4980
- # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4981
- # "automaticResponseAction":"BLOCK|COUNT"\},
4977
+ # `"{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4978
+ # {"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4979
+ # "automaticResponseAction":"BLOCK|COUNT"},
4982
4980
  # "overrideCustomerWebaclClassic":true|false,
4983
- # "optimizeUnassociatedWebACL":true|false\}"`
4981
+ # "optimizeUnassociatedWebACL":true|false}"`
4984
4982
  #
4985
4983
  # For example:
4986
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4987
- # \{"automaticResponseStatus":"ENABLED",
4988
- # "automaticResponseAction":"COUNT"\}\}"`
4984
+ # `"{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4985
+ # {"automaticResponseStatus":"ENABLED",
4986
+ # "automaticResponseAction":"COUNT"}}"`
4989
4987
  #
4990
4988
  # The default value for `automaticResponseStatus` is `IGNORED`. The
4991
4989
  # value for `automaticResponseAction` is only required when
@@ -5001,23 +4999,22 @@ module Aws::FMS
5001
4999
  # Replace `THIRD_PARTY_FIREWALL_NAME` with the name of the
5002
5000
  # third-party firewall.
5003
5001
  #
5004
- # `"\{ "type":"THIRD_PARTY_FIREWALL",
5002
+ # `"{ "type":"THIRD_PARTY_FIREWALL",
5005
5003
  # "thirdPartyFirewall":"THIRD_PARTY_FIREWALL_NAME",
5006
- # "thirdPartyFirewallConfig":\{
5007
- # "thirdPartyFirewallPolicyList":["global-1"] \},
5008
- # "firewallDeploymentModel":\{
5009
- # "distributedFirewallDeploymentModel":\{
5010
- # "distributedFirewallOrchestrationConfig":\{
5011
- # "firewallCreationConfig":\{ "endpointLocation":\{
5012
- # "availabilityZoneConfigList":[ \{
5013
- # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
5014
- # "allowedIPV4CidrList":[ ] \} \} \} \}"`
5004
+ # "thirdPartyFirewallConfig":{
5005
+ # "thirdPartyFirewallPolicyList":["global-1"] },
5006
+ # "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{
5007
+ # "distributedFirewallOrchestrationConfig":{
5008
+ # "firewallCreationConfig":{ "endpointLocation":{
5009
+ # "availabilityZoneConfigList":[ {
5010
+ # "availabilityZoneName":"${AvailabilityZone}" } ] } },
5011
+ # "allowedIPV4CidrList":[ ] } } } }"`
5015
5012
  #
5016
5013
  # * Example: `WAFV2` - Account takeover prevention, Bot Control
5017
5014
  # managed rule groups, optimize unassociated web ACL, and rule
5018
5015
  # action override
5019
5016
  #
5020
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true\}"`
5017
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[{"awsmanagedRulesATPRuleSet":{"loginPath":"/loginpath","requestInspection":{"payloadType":"FORM_ENCODED|JSON","usernameField":{"identifier":"/form/username"},"passwordField":{"identifier":"/form/password"}}}}]},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true},{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[{"awsmanagedRulesBotControlRuleSet":{"inspectionLevel":"TARGETED|COMMON"}}]},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[{"name":"Rule1","actionToUse":{"allow|block|count|captcha|challenge":{}}},{"name":"Rule2","actionToUse":{"allow|block|count|captcha|challenge":{}}}]}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true}"`
5021
5018
  #
5022
5019
  # * Bot Control - For information about
5023
5020
  # `AWSManagedRulesBotControlRuleSet` managed rule groups, see
@@ -5061,7 +5058,7 @@ module Aws::FMS
5061
5058
  #
5062
5059
  # * Example: `WAFV2` - `CAPTCHA` and `Challenge` configs
5063
5060
  #
5064
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"],"associationConfig":\{"requestBody":\{"CLOUDFRONT":\{"defaultSizeInspectionLimit":"KB_16"\}\}\}\}"`
5061
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":{"immunityTimeProperty":{"immunityTime":500}},"challengeConfig":{"immunityTimeProperty":{"immunityTime":800}},"tokenDomains":["google.com","amazon.com"],"associationConfig":{"requestBody":{"CLOUDFRONT":{"defaultSizeInspectionLimit":"KB_16"}}}}"`
5065
5062
  #
5066
5063
  # * `CAPTCHA` and `Challenge` configs - If you update the policy's
5067
5064
  # values for `associationConfig`, `captchaConfig`,
@@ -5084,7 +5081,7 @@ module Aws::FMS
5084
5081
  # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
5085
5082
  # group versioning
5086
5083
  #
5087
- # `"\{"preProcessRuleGroups":[\{"ruleGroupType":"ManagedRuleGroup","overrideAction":\{"type":"NONE"\},"sampledRequestsEnabled":true,"managedRuleGroupIdentifier":\{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendorName":"AWS","managedRuleGroupConfigs":null\}\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"tokenDomains":null,"customResponse":null,"type":"WAFV2","overrideCustomerWebACLAssociation":false,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true,"webACLSource":"RETROFIT_EXISTING"\}"`
5084
+ # `"{"preProcessRuleGroups":[{"ruleGroupType":"ManagedRuleGroup","overrideAction":{"type":"NONE"},"sampledRequestsEnabled":true,"managedRuleGroupIdentifier":{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendorName":"AWS","managedRuleGroupConfigs":null}}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"tokenDomains":null,"customResponse":null,"type":"WAFV2","overrideCustomerWebACLAssociation":false,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true,"webACLSource":"RETROFIT_EXISTING"}"`
5088
5085
  #
5089
5086
  # To use a specific version of a WAF managed rule group in your
5090
5087
  # Firewall Manager policy, you must set `versionEnabled` to `true`,
@@ -5095,21 +5092,21 @@ module Aws::FMS
5095
5092
  #
5096
5093
  # * Example: `WAFV2` - Logging configurations
5097
5094
  #
5098
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,
5099
- # "overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":
5100
- # \{"versionEnabled":null,"version":null,"vendorName":"AWS",
5101
- # "managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\}
5095
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,
5096
+ # "overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":
5097
+ # {"versionEnabled":null,"version":null,"vendorName":"AWS",
5098
+ # "managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"}
5102
5099
  # ,"ruleGroupType":"ManagedRuleGroup","excludeRules":[],
5103
- # "sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],
5104
- # "defaultAction":\{"type":"ALLOW"\},"customRequestHandling"
5100
+ # "sampledRequestsEnabled":true}],"postProcessRuleGroups":[],
5101
+ # "defaultAction":{"type":"ALLOW"},"customRequestHandling"
5105
5102
  # \:null,"customResponse":null,"overrideCustomerWebACLAssociation"
5106
- # \:false,"loggingConfiguration":\{"logDestinationConfigs":
5103
+ # \:false,"loggingConfiguration":{"logDestinationConfigs":
5107
5104
  # ["arn:aws:s3:::aws-waf-logs-example-bucket"]
5108
- # ,"redactedFields":[],"loggingFilterConfigs":\{"defaultBehavior":"KEEP",
5109
- # "filters":[\{"behavior":"KEEP","requirement":"MEETS_ALL",
5110
- # "conditions":[\{"actionCondition":"CAPTCHA"\},\{"actionCondition":
5111
- # "CHALLENGE"\},
5112
- # \{"actionCondition":"EXCLUDED_AS_COUNT"\}]\}]\}\},"sampledRequestsEnabledForDefaultActions":true\}"`
5105
+ # ,"redactedFields":[],"loggingFilterConfigs":{"defaultBehavior":"KEEP",
5106
+ # "filters":[{"behavior":"KEEP","requirement":"MEETS_ALL",
5107
+ # "conditions":[{"actionCondition":"CAPTCHA"},{"actionCondition":
5108
+ # "CHALLENGE"},
5109
+ # {"actionCondition":"EXCLUDED_AS_COUNT"}]}]}},"sampledRequestsEnabledForDefaultActions":true}"`
5113
5110
  #
5114
5111
  # Firewall Manager supports Amazon Kinesis Data Firehose and Amazon
5115
5112
  # S3 as the `logDestinationConfigs` in your `loggingConfiguration`.
@@ -5123,7 +5120,7 @@ module Aws::FMS
5123
5120
  #
5124
5121
  # * Example: `WAF Classic`
5125
5122
  #
5126
- # `"\{"ruleGroups":[\{"id":"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659","overrideAction":\{"type":"NONE"\}\}],"overrideCustomerWebACLAssociation":true,"defaultAction":\{"type":"ALLOW"\},"type":"WAF"\}"`
5123
+ # `"{"ruleGroups":[{"id":"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659","overrideAction":{"type":"NONE"}}],"overrideCustomerWebACLAssociation":true,"defaultAction":{"type":"ALLOW"},"type":"WAF"}"`
5127
5124
  #
5128
5125
  #
5129
5126
  #
data/lib/aws-sdk-fms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::FMS
54
54
  autoload :EndpointProvider, 'aws-sdk-fms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-fms/endpoints'
56
56
 
57
- GEM_VERSION = '1.84.0'
57
+ GEM_VERSION = '1.85.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.84.0
4
+ version: 1.85.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-21 00:00:00.000000000 Z
11
+ date: 2024-11-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core