aws-sdk-fms 1.23.0 → 1.24.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -5
- data/lib/aws-sdk-fms.rb +1 -1
- data/lib/aws-sdk-fms/client.rb +9 -6
- data/lib/aws-sdk-fms/types.rb +60 -32
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
|
-
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 6a47c4df9d04dcfa42d1de0904be35241affb5d770dfef70b7df264feea3ec9f
|
4
|
+
data.tar.gz: 3aeb71574d41cc872b4ef185069c9ceaa0ffe5cd009880434ab4b408ad7a68d4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5aa567911545a03f3b2cdafdde81bbcf62c30cec41aec6cbcf2ffca268b4486a77f26726a8aa48961ef300837a329a5c657ec7d7b605be4926d6347b769781cc
|
7
|
+
data.tar.gz: 8ffcd42ac4d094d7ac3b52eec9d4a1f94cec2975e02e06d775ccc842625232c86e05545d6f6ec7d2510880760586cfdd3c53236233df5341a6941b2582a9604f
|
data/lib/aws-sdk-fms.rb
CHANGED
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -893,15 +893,18 @@ module Aws::FMS
|
|
893
893
|
# * A Shield Advanced policy, which applies Shield Advanced protection
|
894
894
|
# to specified accounts and resources
|
895
895
|
#
|
896
|
-
# * An AWS WAF policy, which
|
897
|
-
#
|
896
|
+
# * An AWS WAF policy (type WAFV2), which defines rule groups to run
|
897
|
+
# first in the corresponding AWS WAF web ACL and rule groups to run
|
898
|
+
# last in the web ACL.
|
899
|
+
#
|
900
|
+
# * An AWS WAF Classic policy (type WAF), which defines a rule group.
|
898
901
|
#
|
899
902
|
# * A security group policy, which manages VPC security groups across
|
900
903
|
# your AWS organization.
|
901
904
|
#
|
902
|
-
# Each policy is specific to one of the
|
903
|
-
#
|
904
|
-
#
|
905
|
+
# Each policy is specific to one of the types. If you want to enforce
|
906
|
+
# more than one policy type across accounts, create multiple policies.
|
907
|
+
# You can create multiple policies for each type.
|
905
908
|
#
|
906
909
|
# You must be subscribed to Shield Advanced to create a Shield Advanced
|
907
910
|
# policy. For more information about subscribing to Shield Advanced, see
|
@@ -1064,7 +1067,7 @@ module Aws::FMS
|
|
1064
1067
|
params: params,
|
1065
1068
|
config: config)
|
1066
1069
|
context[:gem_name] = 'aws-sdk-fms'
|
1067
|
-
context[:gem_version] = '1.
|
1070
|
+
context[:gem_version] = '1.24.0'
|
1068
1071
|
Seahorse::Client::Request.new(handlers, context)
|
1069
1072
|
end
|
1070
1073
|
|
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -762,24 +762,63 @@ module Aws::FMS
|
|
762
762
|
# @return [Boolean]
|
763
763
|
#
|
764
764
|
# @!attribute [rw] include_map
|
765
|
-
# Specifies the AWS account IDs
|
766
|
-
#
|
767
|
-
#
|
768
|
-
#
|
769
|
-
#
|
770
|
-
#
|
771
|
-
#
|
765
|
+
# Specifies the AWS account IDs and AWS Organizations organizational
|
766
|
+
# units (OUs) to include in the policy. Specifying an OU is the
|
767
|
+
# equivalent of specifying all accounts in the OU and in any of its
|
768
|
+
# child OUs, including any child OUs and accounts that are added at a
|
769
|
+
# later time.
|
770
|
+
#
|
771
|
+
# You can specify inclusions or exclusions, but not both. If you
|
772
|
+
# specify an `IncludeMap`, AWS Firewall Manager applies the policy to
|
773
|
+
# all accounts specified by the `IncludeMap`, and does not evaluate
|
774
|
+
# any `ExcludeMap` specifications. If you do not specify an
|
775
|
+
# `IncludeMap`, then Firewall Manager applies the policy to all
|
776
|
+
# accounts except for those specified by the `ExcludeMap`.
|
777
|
+
#
|
778
|
+
# You can specify account IDs, OUs, or a combination:
|
779
|
+
#
|
780
|
+
# * Specify account IDs by setting the key to `ACCOUNT`. For example,
|
781
|
+
# the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
|
782
|
+
# “accountID2”]\}`.
|
783
|
+
#
|
784
|
+
# * Specify OUs by setting the key to `ORG_UNIT`. For example, the
|
785
|
+
# following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
|
786
|
+
# “ouid112”]\}`.
|
787
|
+
#
|
788
|
+
# * Specify accounts and OUs together in a single map, separated with
|
789
|
+
# a comma. For example, the following is a valid map: `\{“ACCOUNT” :
|
790
|
+
# [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
|
791
|
+
# “ouid112”]\}`.
|
772
792
|
# @return [Hash<String,Array<String>>]
|
773
793
|
#
|
774
794
|
# @!attribute [rw] exclude_map
|
775
|
-
# Specifies the AWS account IDs
|
776
|
-
#
|
777
|
-
#
|
778
|
-
#
|
779
|
-
#
|
780
|
-
#
|
781
|
-
#
|
782
|
-
#
|
795
|
+
# Specifies the AWS account IDs and AWS Organizations organizational
|
796
|
+
# units (OUs) to exclude from the policy. Specifying an OU is the
|
797
|
+
# equivalent of specifying all accounts in the OU and in any of its
|
798
|
+
# child OUs, including any child OUs and accounts that are added at a
|
799
|
+
# later time.
|
800
|
+
#
|
801
|
+
# You can specify inclusions or exclusions, but not both. If you
|
802
|
+
# specify an `IncludeMap`, AWS Firewall Manager applies the policy to
|
803
|
+
# all accounts specified by the `IncludeMap`, and does not evaluate
|
804
|
+
# any `ExcludeMap` specifications. If you do not specify an
|
805
|
+
# `IncludeMap`, then Firewall Manager applies the policy to all
|
806
|
+
# accounts except for those specified by the `ExcludeMap`.
|
807
|
+
#
|
808
|
+
# You can specify account IDs, OUs, or a combination:
|
809
|
+
#
|
810
|
+
# * Specify account IDs by setting the key to `ACCOUNT`. For example,
|
811
|
+
# the following is a valid map: `\{“ACCOUNT” : [“accountID1”,
|
812
|
+
# “accountID2”]\}`.
|
813
|
+
#
|
814
|
+
# * Specify OUs by setting the key to `ORG_UNIT`. For example, the
|
815
|
+
# following is a valid map: `\{“ORG_UNIT” : [“ouid111”,
|
816
|
+
# “ouid112”]\}`.
|
817
|
+
#
|
818
|
+
# * Specify accounts and OUs together in a single map, separated with
|
819
|
+
# a comma. For example, the following is a valid map: `\{“ACCOUNT” :
|
820
|
+
# [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”,
|
821
|
+
# “ouid112”]\}`.
|
783
822
|
# @return [Hash<String,Array<String>>]
|
784
823
|
#
|
785
824
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/Policy AWS API Documentation
|
@@ -1130,22 +1169,10 @@ module Aws::FMS
|
|
1130
1169
|
#
|
1131
1170
|
# * Example: `WAFV2`
|
1132
1171
|
#
|
1133
|
-
# `"
|
1134
|
-
# "postProcessRuleGroups":
|
1135
|
-
#
|
1136
|
-
#
|
1137
|
-
# "ruleGroupARN": "rule group arn", "overrideAction": \{
|
1138
|
-
# "type": "COUNT|" \}, "excludedRules": [ \{ "name" :
|
1139
|
-
# "EntityName" \} ], "type": "ManagedRuleGroup|RuleGroup" \}
|
1140
|
-
# ], "preProcessRuleGroups": [ \{ "managedRuleGroupIdentifier":
|
1141
|
-
# \{ "managedRuleGroupName":
|
1142
|
-
# "AWSManagedRulesAdminProtectionRuleSet", "vendor": "AWS" \}
|
1143
|
-
# "ruleGroupARN": "rule group arn", "overrideAction": \{
|
1144
|
-
# "type": "COUNT" \}, "excludedRules": [ \{ "name" :
|
1145
|
-
# "EntityName" \} ], "type": "ManagedRuleGroup|RuleGroup" \}
|
1146
|
-
# ], "defaultAction": \{ "type": "BLOCK" \}\}" `
|
1147
|
-
#
|
1148
|
-
# * Example: `WAF`
|
1172
|
+
# `"ManagedServiceData":
|
1173
|
+
# "\{"type":"WAFV2","defaultAction":\{"type":"ALLOW"\},"preProcessRuleGroups":[\{"managedRuleGroupIdentifier":null,"ruleGroupArn":"rulegrouparn","overrideAction":\{"type":"COUNT"\},"excludedRules":[\{"name":"EntityName"\}],"ruleGroupType":"RuleGroup"\}],"postProcessRuleGroups":[\{"managedRuleGroupIdentifier":\{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendor":"AWS"\},"ruleGroupArn":"rulegrouparn","overrideAction":\{"type":"NONE"\},"excludedRules":[],"ruleGroupType":"ManagedRuleGroup"\}],"overrideCustomerWebACLAssociation":false\}"`
|
1174
|
+
#
|
1175
|
+
# * Example: `WAF Classic`
|
1149
1176
|
#
|
1150
1177
|
# `"ManagedServiceData": "\{"type": "WAF", "ruleGroups":
|
1151
1178
|
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
@@ -1154,7 +1181,8 @@ module Aws::FMS
|
|
1154
1181
|
#
|
1155
1182
|
# * Example: `SECURITY_GROUPS_COMMON`
|
1156
1183
|
#
|
1157
|
-
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
1184
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
1185
|
+
# "applyToAllEC2InstanceENIs":false,"securityGroups":[\{"id":"
|
1158
1186
|
# sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1159
1187
|
#
|
1160
1188
|
# * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-fms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.24.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-04-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -81,7 +81,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
81
81
|
version: '0'
|
82
82
|
requirements: []
|
83
83
|
rubyforge_project:
|
84
|
-
rubygems_version: 2.
|
84
|
+
rubygems_version: 2.7.6.2
|
85
85
|
signing_key:
|
86
86
|
specification_version: 4
|
87
87
|
summary: AWS SDK for Ruby - FMS
|