aws-sdk-fms 1.23.0 → 1.24.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/lib/aws-sdk-fms.rb +1 -1
- data/lib/aws-sdk-fms/client.rb +9 -6
- data/lib/aws-sdk-fms/types.rb +60 -32
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 6a47c4df9d04dcfa42d1de0904be35241affb5d770dfef70b7df264feea3ec9f
|
4
|
+
data.tar.gz: 3aeb71574d41cc872b4ef185069c9ceaa0ffe5cd009880434ab4b408ad7a68d4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5aa567911545a03f3b2cdafdde81bbcf62c30cec41aec6cbcf2ffca268b4486a77f26726a8aa48961ef300837a329a5c657ec7d7b605be4926d6347b769781cc
|
7
|
+
data.tar.gz: 8ffcd42ac4d094d7ac3b52eec9d4a1f94cec2975e02e06d775ccc842625232c86e05545d6f6ec7d2510880760586cfdd3c53236233df5341a6941b2582a9604f
|
data/lib/aws-sdk-fms.rb
CHANGED
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -893,15 +893,18 @@ module Aws::FMS
|
|
893
893
|
# * A Shield Advanced policy, which applies Shield Advanced protection
|
894
894
|
# to specified accounts and resources
|
895
895
|
#
|
896
|
-
# * An AWS WAF policy, which
|
897
|
-
#
|
896
|
+
# * An AWS WAF policy (type WAFV2), which defines rule groups to run
|
897
|
+
# first in the corresponding AWS WAF web ACL and rule groups to run
|
898
|
+
# last in the web ACL.
|
899
|
+
#
|
900
|
+
# * An AWS WAF Classic policy (type WAF), which defines a rule group.
|
898
901
|
#
|
899
902
|
# * A security group policy, which manages VPC security groups across
|
900
903
|
# your AWS organization.
|
901
904
|
#
|
902
|
-
# Each policy is specific to one of the
|
903
|
-
#
|
904
|
-
#
|
905
|
+
# Each policy is specific to one of the types. If you want to enforce
|
906
|
+
# more than one policy type across accounts, create multiple policies.
|
907
|
+
# You can create multiple policies for each type.
|
905
908
|
#
|
906
909
|
# You must be subscribed to Shield Advanced to create a Shield Advanced
|
907
910
|
# policy. For more information about subscribing to Shield Advanced, see
|
@@ -1064,7 +1067,7 @@ module Aws::FMS
|
|
1064
1067
|
params: params,
|
1065
1068
|
config: config)
|
1066
1069
|
context[:gem_name] = 'aws-sdk-fms'
|
1067
|
-
context[:gem_version] = '1.
|
1070
|
+
context[:gem_version] = '1.24.0'
|
1068
1071
|
Seahorse::Client::Request.new(handlers, context)
|
1069
1072
|
end
|
1070
1073
|
|
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -762,24 +762,63 @@ module Aws::FMS
|
|
762
762
|
# @return [Boolean]
|
763
763
|
#
|
764
764
|
# @!attribute [rw] include_map
|
765
|
-
# Specifies the AWS account IDs
|
766
|
-
#
|
767
|
-
#
|
768
|
-
#
|
769
|
-
#
|
770
|
-
#
|
771
|
-
#
|
765
|
+
# Specifies the AWS account IDs and AWS Organizations organizational
|
766
|
+
# units (OUs) to include in the policy. Specifying an OU is the
|
767
|
+
# equivalent of specifying all accounts in the OU and in any of its
|
768
|
+
# child OUs, including any child OUs and accounts that are added at a
|
769
|
+
# later time.
|
770
|
+
#
|
771
|
+
# You can specify inclusions or exclusions, but not both. If you
|
772
|
+
# specify an `IncludeMap`, AWS Firewall Manager applies the policy to
|
773
|
+
# all accounts specified by the `IncludeMap`, and does not evaluate
|
774
|
+
# any `ExcludeMap` specifications. If you do not specify an
|
775
|
+
# `IncludeMap`, then Firewall Manager applies the policy to all
|
776
|
+
# accounts except for those specified by the `ExcludeMap`.
|
777
|
+
#
|
778
|
+
# You can specify account IDs, OUs, or a combination:
|
779
|
+
#
|
780
|
+
# * Specify account IDs by setting the key to `ACCOUNT`. For example,
|
781
|
+
# the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
|
782
|
+
# “accountID2”]\}`.
|
783
|
+
#
|
784
|
+
# * Specify OUs by setting the key to `ORG_UNIT`. For example, the
|
785
|
+
# following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
|
786
|
+
# “ouid112”]\}`.
|
787
|
+
#
|
788
|
+
# * Specify accounts and OUs together in a single map, separated with
|
789
|
+
# a comma. For example, the following is a valid map: `\{“ACCOUNT” :
|
790
|
+
# [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
|
791
|
+
# “ouid112”]\}`.
|
772
792
|
# @return [Hash<String,Array<String>>]
|
773
793
|
#
|
774
794
|
# @!attribute [rw] exclude_map
|
775
|
-
# Specifies the AWS account IDs
|
776
|
-
#
|
777
|
-
#
|
778
|
-
#
|
779
|
-
#
|
780
|
-
#
|
781
|
-
#
|
782
|
-
#
|
795
|
+
# Specifies the AWS account IDs and AWS Organizations organizational
|
796
|
+
# units (OUs) to exclude from the policy. Specifying an OU is the
|
797
|
+
# equivalent of specifying all accounts in the OU and in any of its
|
798
|
+
# child OUs, including any child OUs and accounts that are added at a
|
799
|
+
# later time.
|
800
|
+
#
|
801
|
+
# You can specify inclusions or exclusions, but not both. If you
|
802
|
+
# specify an `IncludeMap`, AWS Firewall Manager applies the policy to
|
803
|
+
# all accounts specified by the `IncludeMap`, and does not evaluate
|
804
|
+
# any `ExcludeMap` specifications. If you do not specify an
|
805
|
+
# `IncludeMap`, then Firewall Manager applies the policy to all
|
806
|
+
# accounts except for those specified by the `ExcludeMap`.
|
807
|
+
#
|
808
|
+
# You can specify account IDs, OUs, or a combination:
|
809
|
+
#
|
810
|
+
# * Specify account IDs by setting the key to `ACCOUNT`. For example,
|
811
|
+
# the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
|
812
|
+
# “accountID2”]\}`.
|
813
|
+
#
|
814
|
+
# * Specify OUs by setting the key to `ORG_UNIT`. For example, the
|
815
|
+
# following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
|
816
|
+
# “ouid112”]\}`.
|
817
|
+
#
|
818
|
+
# * Specify accounts and OUs together in a single map, separated with
|
819
|
+
# a comma. For example, the following is a valid map: `\{“ACCOUNT” :
|
820
|
+
# [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
|
821
|
+
# “ouid112”]\}`.
|
783
822
|
# @return [Hash<String,Array<String>>]
|
784
823
|
#
|
785
824
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/Policy AWS API Documentation
|
@@ -1130,22 +1169,10 @@ module Aws::FMS
|
|
1130
1169
|
#
|
1131
1170
|
# * Example: `WAFV2`
|
1132
1171
|
#
|
1133
|
-
# `"
|
1134
|
-
# "postProcessRuleGroups":
|
1135
|
-
#
|
1136
|
-
#
|
1137
|
-
# "ruleGroupARN": "rule group arn", "overrideAction": \{
|
1138
|
-
# "type": "COUNT|" \}, "excludedRules": [ \{ "name" :
|
1139
|
-
# "EntityName" \} ], "type": "ManagedRuleGroup|RuleGroup" \}
|
1140
|
-
# ], "preProcessRuleGroups": [ \{ "managedRuleGroupIdentifier":
|
1141
|
-
# \{ "managedRuleGroupName":
|
1142
|
-
# "AWSManagedRulesAdminProtectionRuleSet", "vendor": "AWS" \}
|
1143
|
-
# "ruleGroupARN": "rule group arn", "overrideAction": \{
|
1144
|
-
# "type": "COUNT" \}, "excludedRules": [ \{ "name" :
|
1145
|
-
# "EntityName" \} ], "type": "ManagedRuleGroup|RuleGroup" \}
|
1146
|
-
# ], "defaultAction": \{ "type": "BLOCK" \}\}" `
|
1147
|
-
#
|
1148
|
-
# * Example: `WAF`
|
1172
|
+
# `"ManagedServiceData":
|
1173
|
+
# "\{"type":"WAFV2","defaultAction":\{"type":"ALLOW"\},"preProcessRuleGroups":[\{"managedRuleGroupIdentifier":null,"ruleGroupArn":"rulegrouparn","overrideAction":\{"type":"COUNT"\},"excludedRules":[\{"name":"EntityName"\}],"ruleGroupType":"RuleGroup"\}],"postProcessRuleGroups":[\{"managedRuleGroupIdentifier":\{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendor":"AWS"\},"ruleGroupArn":"rulegrouparn","overrideAction":\{"type":"NONE"\},"excludedRules":[],"ruleGroupType":"ManagedRuleGroup"\}],"overrideCustomerWebACLAssociation":false\}"`
|
1174
|
+
#
|
1175
|
+
# * Example: `WAF Classic`
|
1149
1176
|
#
|
1150
1177
|
# `"ManagedServiceData": "\{"type": "WAF", "ruleGroups":
|
1151
1178
|
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
@@ -1154,7 +1181,8 @@ module Aws::FMS
|
|
1154
1181
|
#
|
1155
1182
|
# * Example: `SECURITY_GROUPS_COMMON`
|
1156
1183
|
#
|
1157
|
-
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
1184
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
1185
|
+
# "applyToAllEC2InstanceENIs":false,"securityGroups":[\{"id":"
|
1158
1186
|
# sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1159
1187
|
#
|
1160
1188
|
# * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-fms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.24.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-04-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -81,7 +81,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
81
81
|
version: '0'
|
82
82
|
requirements: []
|
83
83
|
rubyforge_project:
|
84
|
-
rubygems_version: 2.
|
84
|
+
rubygems_version: 2.7.6.2
|
85
85
|
signing_key:
|
86
86
|
specification_version: 4
|
87
87
|
summary: AWS SDK for Ruby - FMS
|