aws-sdk-fms 1.84.0 → 1.85.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ebce3b13ed731da3bdc84c48d95048df82160fcbb2183f289f4f867a16fe56d9
4
- data.tar.gz: 70f5047dbdfe3733c07ae498903ef695327a90dc4c0a00c7401156a5d0de32cd
3
+ metadata.gz: 7d2561eef33bdc50c82844067358b74031daf4bb6b946e82824aa0e49507391c
4
+ data.tar.gz: 9cd91805243df01cb41440aecf5ccb6069957218402413cce948a261e029fcc9
5
5
  SHA512:
6
- metadata.gz: 24c879ec0cc699f346fd8e19268583c75ab37f233d52df376bc10bd30d826f9d12e06271c764b2bc2ec5f18cacb02207bbccf7caeaa93fd83fd8a49a63ec28e8
7
- data.tar.gz: eef722ede4a203b0e98823300a1dab4ebe8b4680ae565f7e659915d43fd749ee2b978f7d2d68aac2bf035a926ac68c806a0355a8b3935af61ddc338afea9ed26
6
+ metadata.gz: 964db7321c8846752e8d5710dbc34733130954261190264f8affb6829712b34c6f0eed4a9d9007aef2e3e6e78e05d7ae3320091fb55e046e12079b85d98e0f98
7
+ data.tar.gz: cab1eef3b037a2597ff6a97901ce887b7af8cf9aec8240646869089a6efc25202c7a524797a848b23826b580c95d6c38687e7c0ac90e6e8793d2ee7540217d9e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.85.0 (2024-11-06)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
4
9
  1.84.0 (2024-10-21)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.84.0
1
+ 1.85.0
@@ -2954,7 +2954,7 @@ module Aws::FMS
2954
2954
  tracer: tracer
2955
2955
  )
2956
2956
  context[:gem_name] = 'aws-sdk-fms'
2957
- context[:gem_version] = '1.84.0'
2957
+ context[:gem_version] = '1.85.0'
2958
2958
  Seahorse::Client::Request.new(handlers, context)
2959
2959
  end
2960
2960
 
@@ -3489,17 +3489,16 @@ module Aws::FMS
3489
3489
  # You can specify account IDs, OUs, or a combination:
3490
3490
  #
3491
3491
  # * Specify account IDs by setting the key to `ACCOUNT`. For example,
3492
- # the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
3493
- # “accountID2”]\}`.
3492
+ # the following is a valid map: `{“ACCOUNT” : [“accountID1”,
3493
+ # “accountID2”]}`.
3494
3494
  #
3495
3495
  # * Specify OUs by setting the key to `ORG_UNIT`. For example, the
3496
- # following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
3497
- # “ouid112”]\}`.
3496
+ # following is a valid map: `{“ORG_UNIT” : [“ouid111”, “ouid112”]}`.
3498
3497
  #
3499
3498
  # * Specify accounts and OUs together in a single map, separated with
3500
- # a comma. For example, the following is a valid map: `\{“ACCOUNT” :
3499
+ # a comma. For example, the following is a valid map: `{“ACCOUNT” :
3501
3500
  # [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
3502
- # “ouid112”]\}`.
3501
+ # “ouid112”]}`.
3503
3502
  # @return [Hash<String,Array<String>>]
3504
3503
  #
3505
3504
  # @!attribute [rw] exclude_map
@@ -3519,17 +3518,16 @@ module Aws::FMS
3519
3518
  # You can specify account IDs, OUs, or a combination:
3520
3519
  #
3521
3520
  # * Specify account IDs by setting the key to `ACCOUNT`. For example,
3522
- # the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
3523
- # “accountID2”]\}`.
3521
+ # the following is a valid map: `{“ACCOUNT” : [“accountID1”,
3522
+ # “accountID2”]}`.
3524
3523
  #
3525
3524
  # * Specify OUs by setting the key to `ORG_UNIT`. For example, the
3526
- # following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
3527
- # “ouid112”]\}`.
3525
+ # following is a valid map: `{“ORG_UNIT” : [“ouid111”, “ouid112”]}`.
3528
3526
  #
3529
3527
  # * Specify accounts and OUs together in a single map, separated with
3530
- # a comma. For example, the following is a valid map: `\{“ACCOUNT” :
3528
+ # a comma. For example, the following is a valid map: `{“ACCOUNT” :
3531
3529
  # [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
3532
- # “ouid112”]\}`.
3530
+ # “ouid112”]}`.
3533
3531
  # @return [Hash<String,Array<String>>]
3534
3532
  #
3535
3533
  # @!attribute [rw] resource_set_ids
@@ -4824,7 +4822,7 @@ module Aws::FMS
4824
4822
  #
4825
4823
  # * Example: `DNS_FIREWALL`
4826
4824
  #
4827
- # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
4825
+ # `"{"type":"DNS_FIREWALL","preProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-1","priority":10}],"postProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-2","priority":9911}]}"`
4828
4826
  #
4829
4827
  # <note markdown="1"> Valid values for `preProcessRuleGroups` are between 1 and 99.
4830
4828
  # Valid values for `postProcessRuleGroups` are between 9901 and
@@ -4834,9 +4832,9 @@ module Aws::FMS
4834
4832
  #
4835
4833
  # * Example: `IMPORT_NETWORK_FIREWALL`
4836
4834
  #
4837
- # `"\{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8\}],"networkFirewallStatefulEngineOptions":\{"ruleOrder":"STRICT_ORDER"\},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]\}\}"`
4835
+ # `"{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":{"networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8}],"networkFirewallStatefulEngineOptions":{"ruleOrder":"STRICT_ORDER"},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]}}"`
4838
4836
  #
4839
- # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
4837
+ # `"{"type":"DNS_FIREWALL","preProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-1","priority":10}],"postProcessRuleGroups":[{"ruleGroupId":"rslvr-frg-2","priority":9911}]}"`
4840
4838
  #
4841
4839
  # <note markdown="1"> Valid values for `preProcessRuleGroups` are between 1 and 99.
4842
4840
  # Valid values for `postProcessRuleGroups` are between 9901 and
@@ -4846,7 +4844,7 @@ module Aws::FMS
4846
4844
  #
4847
4845
  # * Example: `NETWORK_FIREWALL` - Centralized deployment model
4848
4846
  #
4849
- # `"\{"type":"NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\},"firewallDeploymentModel":\{"centralizedFirewallDeploymentModel":\{"centralizedFirewallOrchestrationConfig":\{"inspectionVpcIds":[\{"resourceId":"vpc-1234","accountId":"123456789011"\}],"firewallCreationConfig":\{"endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneId":null,"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\}]\}\},"allowedIPV4CidrList":[]\}\}\}\}"`
4847
+ # `"{"type":"NETWORK_FIREWALL","awsNetworkFirewallConfig":{"networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}},"firewallDeploymentModel":{"centralizedFirewallDeploymentModel":{"centralizedFirewallOrchestrationConfig":{"inspectionVpcIds":[{"resourceId":"vpc-1234","accountId":"123456789011"}],"firewallCreationConfig":{"endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneId":null,"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]}]}},"allowedIPV4CidrList":[]}}}}"`
4850
4848
  #
4851
4849
  # To use the centralized deployment model, you must set
4852
4850
  # [PolicyOption][1] to `CENTRALIZED`.
@@ -4855,7 +4853,7 @@ module Aws::FMS
4855
4853
  # automatic Availability Zone configuration
4856
4854
  #
4857
4855
  # `
4858
- # "\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"OFF"\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\}"
4856
+ # "{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"OFF"},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}}"
4859
4857
  # `
4860
4858
  #
4861
4859
  # With automatic Availbility Zone configuration, Firewall Manager
@@ -4867,8 +4865,8 @@ module Aws::FMS
4867
4865
  # automatic Availability Zone configuration and route management
4868
4866
  #
4869
4867
  # `
4870
- # "\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"]\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":
4871
- # "FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":true\}\}"
4868
+ # "{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":["10.0.0.0/28","192.168.0.0/28"],"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"]},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":
4869
+ # "FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":true}}"
4872
4870
  # `
4873
4871
  #
4874
4872
  # To use the distributed deployment model, you must set
@@ -4877,11 +4875,11 @@ module Aws::FMS
4877
4875
  # * Example: `NETWORK_FIREWALL` - Distributed deployment model with
4878
4876
  # custom Availability Zone configuration
4879
4877
  #
4880
- # `"\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName",
4881
- # "actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\},\{"actionName":"fragmentcustomactionname","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"fragmentmetricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"firewallCreationConfig":\{
4882
- # "endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\},\{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":[
4883
- # "10.0.0.0/28"]\}]\}
4884
- # \},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"OFF","networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":boolean\}\}"
4878
+ # `"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName",
4879
+ # "actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}},{"actionName":"fragmentcustomactionname","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"fragmentmetricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"firewallCreationConfig":{
4880
+ # "endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]},{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":[
4881
+ # "10.0.0.0/28"]}]}
4882
+ # },"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"OFF","networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":boolean}}"
4885
4883
  # `
4886
4884
  #
4887
4885
  # With custom Availability Zone configuration, you define which
@@ -4897,7 +4895,7 @@ module Aws::FMS
4897
4895
  # * Example: `NETWORK_FIREWALL` - Distributed deployment model with
4898
4896
  # custom Availability Zone configuration and route management
4899
4897
  #
4900
- # `"\{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[\{"actionName":"customActionName","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"metricdimensionvalue"\}]\}\}\},\{"actionName":"fragmentcustomactionname","actionDefinition":\{"publishMetricAction":\{"dimensions":[\{"value":"fragmentmetricdimensionvalue"\}]\}\}\}],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"\}],"networkFirewallOrchestrationConfig":\{"firewallCreationConfig":\{"endpointLocation":\{"availabilityZoneConfigList":[\{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]\},\{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":["10.0.0.0/28"]\}]\}\},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"],"routeManagementConfig":\{"allowCrossAZTrafficIfNoEndpoint":true\}\},"networkFirewallLoggingConfiguration":\{"logDestinationConfigs":[\{"logDestinationType":"S3","logType":"ALERT","logDestination":\{"bucketName":"s3-bucket-name"\}\},\{"logDestinationType":"S3","logType":"FLOW","logDestination":\{"bucketName":"s3-bucket-name"\}\}],"overrideExistingConfig":boolean\}\}"
4898
+ # `"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test","priority":1}],"networkFirewallStatelessDefaultActions":["aws:forward_to_sfe","customActionName"],"networkFirewallStatelessFragmentDefaultActions":["aws:forward_to_sfe","fragmentcustomactionname"],"networkFirewallStatelessCustomActions":[{"actionName":"customActionName","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"metricdimensionvalue"}]}}},{"actionName":"fragmentcustomactionname","actionDefinition":{"publishMetricAction":{"dimensions":[{"value":"fragmentmetricdimensionvalue"}]}}}],"networkFirewallStatefulRuleGroupReferences":[{"resourceARN":"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test"}],"networkFirewallOrchestrationConfig":{"firewallCreationConfig":{"endpointLocation":{"availabilityZoneConfigList":[{"availabilityZoneName":"us-east-1a","allowedIPV4CidrList":["10.0.0.0/28"]},{"availabilityZoneName":"us-east-1b","allowedIPV4CidrList":["10.0.0.0/28"]}]}},"singleFirewallEndpointPerVPC":false,"allowedIPV4CidrList":null,"routeManagementAction":"MONITOR","routeManagementTargetTypes":["InternetGateway"],"routeManagementConfig":{"allowCrossAZTrafficIfNoEndpoint":true}},"networkFirewallLoggingConfiguration":{"logDestinationConfigs":[{"logDestinationType":"S3","logType":"ALERT","logDestination":{"bucketName":"s3-bucket-name"}},{"logDestinationType":"S3","logType":"FLOW","logDestination":{"bucketName":"s3-bucket-name"}}],"overrideExistingConfig":boolean}}"
4901
4899
  # `
4902
4900
  #
4903
4901
  # To use the distributed deployment model, you must set
@@ -4905,12 +4903,12 @@ module Aws::FMS
4905
4903
  #
4906
4904
  # * Example: `SECURITY_GROUPS_COMMON`
4907
4905
  #
4908
- # `"\{"type":"SECURITY_GROUPS_COMMON","securityGroups":[\{"id":"sg-03b1f67d69ed00197"\}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":true,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"enableSecurityGroupReferencesDistribution":true\}"`
4906
+ # `"{"type":"SECURITY_GROUPS_COMMON","securityGroups":[{"id":"sg-03b1f67d69ed00197"}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":true,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"enableSecurityGroupReferencesDistribution":true}"`
4909
4907
  #
4910
4908
  # * Example: `SECURITY_GROUPS_COMMON` - Security group tag
4911
4909
  # distribution
4912
4910
  #
4913
- # `""\{"type":"SECURITY_GROUPS_COMMON","securityGroups":[\{"id":"sg-000e55995d61a06bd"\}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":false,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":false,"enableTagDistribution":true\}""`
4911
+ # `""{"type":"SECURITY_GROUPS_COMMON","securityGroups":[{"id":"sg-000e55995d61a06bd"}],"revertManualSecurityGroupChanges":true,"exclusiveResourceSecurityGroupManagement":false,"applyToAllEC2InstanceENIs":false,"includeSharedVPC":false,"enableTagDistribution":true}""`
4914
4912
  #
4915
4913
  # Firewall Manager automatically distributes tags from the primary
4916
4914
  # group to the security groups created by this policy. To use
@@ -4928,13 +4926,13 @@ module Aws::FMS
4928
4926
  # * Example: Shared VPCs. Apply the preceding policy to resources in
4929
4927
  # shared VPCs as well as to those in VPCs that the account owns
4930
4928
  #
4931
- # `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
4932
- # "applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"securityGroups":[\{"id":"
4933
- # sg-000e55995d61a06bd"\}]\}"`
4929
+ # `"{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
4930
+ # "applyToAllEC2InstanceENIs":false,"includeSharedVPC":true,"securityGroups":[{"id":"
4931
+ # sg-000e55995d61a06bd"}]}"`
4934
4932
  #
4935
4933
  # * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
4936
4934
  #
4937
- # `"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","preManagedOptions":[\{"denyProtocolAllValue":true\},\{"auditSgDirection":\{"type":"ALL"\}\}],"securityGroups":[\{"id":"sg-049b2393a25468971"\}],"securityGroupAction":\{"type":"ALLOW"\}\}"`
4935
+ # `"{"type":"SECURITY_GROUPS_CONTENT_AUDIT","preManagedOptions":[{"denyProtocolAllValue":true},{"auditSgDirection":{"type":"ALL"}}],"securityGroups":[{"id":"sg-049b2393a25468971"}],"securityGroupAction":{"type":"ALLOW"}}"`
4938
4936
  #
4939
4937
  # The security group action for content audit can be `ALLOW` or
4940
4938
  # `DENY`. For `ALLOW`, all in-scope security group rules must be
@@ -4945,11 +4943,11 @@ module Aws::FMS
4945
4943
  #
4946
4944
  # * Example: `SECURITY_GROUPS_USAGE_AUDIT`
4947
4945
  #
4948
- # `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true,"optionalDelayForUnusedInMinutes":60\}"`
4946
+ # `"{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true,"optionalDelayForUnusedInMinutes":60}"`
4949
4947
  #
4950
4948
  # * Example: `SHIELD_ADVANCED` with web ACL management
4951
4949
  #
4952
- # `"\{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true\}"`
4950
+ # `"{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true}"`
4953
4951
  #
4954
4952
  # If you set `optimizeUnassociatedWebACL` to `true`, Firewall
4955
4953
  # Manager creates web ACLs in accounts within the policy scope if
@@ -4976,16 +4974,16 @@ module Aws::FMS
4976
4974
  # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
4977
4975
  # distributions
4978
4976
  #
4979
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4980
- # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4981
- # "automaticResponseAction":"BLOCK|COUNT"\},
4977
+ # `"{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4978
+ # {"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4979
+ # "automaticResponseAction":"BLOCK|COUNT"},
4982
4980
  # "overrideCustomerWebaclClassic":true|false,
4983
- # "optimizeUnassociatedWebACL":true|false\}"`
4981
+ # "optimizeUnassociatedWebACL":true|false}"`
4984
4982
  #
4985
4983
  # For example:
4986
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4987
- # \{"automaticResponseStatus":"ENABLED",
4988
- # "automaticResponseAction":"COUNT"\}\}"`
4984
+ # `"{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4985
+ # {"automaticResponseStatus":"ENABLED",
4986
+ # "automaticResponseAction":"COUNT"}}"`
4989
4987
  #
4990
4988
  # The default value for `automaticResponseStatus` is `IGNORED`. The
4991
4989
  # value for `automaticResponseAction` is only required when
@@ -5001,23 +4999,22 @@ module Aws::FMS
5001
4999
  # Replace `THIRD_PARTY_FIREWALL_NAME` with the name of the
5002
5000
  # third-party firewall.
5003
5001
  #
5004
- # `"\{ "type":"THIRD_PARTY_FIREWALL",
5002
+ # `"{ "type":"THIRD_PARTY_FIREWALL",
5005
5003
  # "thirdPartyFirewall":"THIRD_PARTY_FIREWALL_NAME",
5006
- # "thirdPartyFirewallConfig":\{
5007
- # "thirdPartyFirewallPolicyList":["global-1"] \},
5008
- # "firewallDeploymentModel":\{
5009
- # "distributedFirewallDeploymentModel":\{
5010
- # "distributedFirewallOrchestrationConfig":\{
5011
- # "firewallCreationConfig":\{ "endpointLocation":\{
5012
- # "availabilityZoneConfigList":[ \{
5013
- # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
5014
- # "allowedIPV4CidrList":[ ] \} \} \} \}"`
5004
+ # "thirdPartyFirewallConfig":{
5005
+ # "thirdPartyFirewallPolicyList":["global-1"] },
5006
+ # "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{
5007
+ # "distributedFirewallOrchestrationConfig":{
5008
+ # "firewallCreationConfig":{ "endpointLocation":{
5009
+ # "availabilityZoneConfigList":[ {
5010
+ # "availabilityZoneName":"${AvailabilityZone}" } ] } },
5011
+ # "allowedIPV4CidrList":[ ] } } } }"`
5015
5012
  #
5016
5013
  # * Example: `WAFV2` - Account takeover prevention, Bot Control
5017
5014
  # managed rule groups, optimize unassociated web ACL, and rule
5018
5015
  # action override
5019
5016
  #
5020
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true\}"`
5017
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[{"awsmanagedRulesATPRuleSet":{"loginPath":"/loginpath","requestInspection":{"payloadType":"FORM_ENCODED|JSON","usernameField":{"identifier":"/form/username"},"passwordField":{"identifier":"/form/password"}}}}]},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true},{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[{"awsmanagedRulesBotControlRuleSet":{"inspectionLevel":"TARGETED|COMMON"}}]},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[{"name":"Rule1","actionToUse":{"allow|block|count|captcha|challenge":{}}},{"name":"Rule2","actionToUse":{"allow|block|count|captcha|challenge":{}}}]}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true}"`
5021
5018
  #
5022
5019
  # * Bot Control - For information about
5023
5020
  # `AWSManagedRulesBotControlRuleSet` managed rule groups, see
@@ -5061,7 +5058,7 @@ module Aws::FMS
5061
5058
  #
5062
5059
  # * Example: `WAFV2` - `CAPTCHA` and `Challenge` configs
5063
5060
  #
5064
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"],"associationConfig":\{"requestBody":\{"CLOUDFRONT":\{"defaultSizeInspectionLimit":"KB_16"\}\}\}\}"`
5061
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,"overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":{"immunityTimeProperty":{"immunityTime":500}},"challengeConfig":{"immunityTimeProperty":{"immunityTime":800}},"tokenDomains":["google.com","amazon.com"],"associationConfig":{"requestBody":{"CLOUDFRONT":{"defaultSizeInspectionLimit":"KB_16"}}}}"`
5065
5062
  #
5066
5063
  # * `CAPTCHA` and `Challenge` configs - If you update the policy's
5067
5064
  # values for `associationConfig`, `captchaConfig`,
@@ -5084,7 +5081,7 @@ module Aws::FMS
5084
5081
  # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
5085
5082
  # group versioning
5086
5083
  #
5087
- # `"\{"preProcessRuleGroups":[\{"ruleGroupType":"ManagedRuleGroup","overrideAction":\{"type":"NONE"\},"sampledRequestsEnabled":true,"managedRuleGroupIdentifier":\{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendorName":"AWS","managedRuleGroupConfigs":null\}\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"tokenDomains":null,"customResponse":null,"type":"WAFV2","overrideCustomerWebACLAssociation":false,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true,"webACLSource":"RETROFIT_EXISTING"\}"`
5084
+ # `"{"preProcessRuleGroups":[{"ruleGroupType":"ManagedRuleGroup","overrideAction":{"type":"NONE"},"sampledRequestsEnabled":true,"managedRuleGroupIdentifier":{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendorName":"AWS","managedRuleGroupConfigs":null}}],"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"customRequestHandling":null,"tokenDomains":null,"customResponse":null,"type":"WAFV2","overrideCustomerWebACLAssociation":false,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true,"webACLSource":"RETROFIT_EXISTING"}"`
5088
5085
  #
5089
5086
  # To use a specific version of a WAF managed rule group in your
5090
5087
  # Firewall Manager policy, you must set `versionEnabled` to `true`,
@@ -5095,21 +5092,21 @@ module Aws::FMS
5095
5092
  #
5096
5093
  # * Example: `WAFV2` - Logging configurations
5097
5094
  #
5098
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,
5099
- # "overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":
5100
- # \{"versionEnabled":null,"version":null,"vendorName":"AWS",
5101
- # "managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\}
5095
+ # `"{"type":"WAFV2","preProcessRuleGroups":[{"ruleGroupArn":null,
5096
+ # "overrideAction":{"type":"NONE"},"managedRuleGroupIdentifier":
5097
+ # {"versionEnabled":null,"version":null,"vendorName":"AWS",
5098
+ # "managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"}
5102
5099
  # ,"ruleGroupType":"ManagedRuleGroup","excludeRules":[],
5103
- # "sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],
5104
- # "defaultAction":\{"type":"ALLOW"\},"customRequestHandling"
5100
+ # "sampledRequestsEnabled":true}],"postProcessRuleGroups":[],
5101
+ # "defaultAction":{"type":"ALLOW"},"customRequestHandling"
5105
5102
  # \:null,"customResponse":null,"overrideCustomerWebACLAssociation"
5106
- # \:false,"loggingConfiguration":\{"logDestinationConfigs":
5103
+ # \:false,"loggingConfiguration":{"logDestinationConfigs":
5107
5104
  # ["arn:aws:s3:::aws-waf-logs-example-bucket"]
5108
- # ,"redactedFields":[],"loggingFilterConfigs":\{"defaultBehavior":"KEEP",
5109
- # "filters":[\{"behavior":"KEEP","requirement":"MEETS_ALL",
5110
- # "conditions":[\{"actionCondition":"CAPTCHA"\},\{"actionCondition":
5111
- # "CHALLENGE"\},
5112
- # \{"actionCondition":"EXCLUDED_AS_COUNT"\}]\}]\}\},"sampledRequestsEnabledForDefaultActions":true\}"`
5105
+ # ,"redactedFields":[],"loggingFilterConfigs":{"defaultBehavior":"KEEP",
5106
+ # "filters":[{"behavior":"KEEP","requirement":"MEETS_ALL",
5107
+ # "conditions":[{"actionCondition":"CAPTCHA"},{"actionCondition":
5108
+ # "CHALLENGE"},
5109
+ # {"actionCondition":"EXCLUDED_AS_COUNT"}]}]}},"sampledRequestsEnabledForDefaultActions":true}"`
5113
5110
  #
5114
5111
  # Firewall Manager supports Amazon Kinesis Data Firehose and Amazon
5115
5112
  # S3 as the `logDestinationConfigs` in your `loggingConfiguration`.
@@ -5123,7 +5120,7 @@ module Aws::FMS
5123
5120
  #
5124
5121
  # * Example: `WAF Classic`
5125
5122
  #
5126
- # `"\{"ruleGroups":[\{"id":"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659","overrideAction":\{"type":"NONE"\}\}],"overrideCustomerWebACLAssociation":true,"defaultAction":\{"type":"ALLOW"\},"type":"WAF"\}"`
5123
+ # `"{"ruleGroups":[{"id":"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659","overrideAction":{"type":"NONE"}}],"overrideCustomerWebACLAssociation":true,"defaultAction":{"type":"ALLOW"},"type":"WAF"}"`
5127
5124
  #
5128
5125
  #
5129
5126
  #
data/lib/aws-sdk-fms.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::FMS
54
54
  autoload :EndpointProvider, 'aws-sdk-fms/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-fms/endpoints'
56
56
 
57
- GEM_VERSION = '1.84.0'
57
+ GEM_VERSION = '1.85.0'
58
58
 
59
59
  end
60
60
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.84.0
4
+ version: 1.85.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-21 00:00:00.000000000 Z
11
+ date: 2024-11-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core