aws-sdk-fms 1.51.0 → 1.52.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 15a6d7ada1e55a1d0ea73b309309e144bb6dc3a814dcf27d693cf138d3bd88f6
4
- data.tar.gz: 96e4cbc9600103a1a57685e49d7d816701ebb3c7eae0894265e3fb0df53607c8
3
+ metadata.gz: 0e69a7fdad74ae2aa7b7fc8b67f42295b0211a835ec7e800da355e86a3d011c7
4
+ data.tar.gz: 04ba6b611b3310683fad7b90456232a7bb5d44c1d3a559b936a2d7b82deaf366
5
5
  SHA512:
6
- metadata.gz: 77575e4b4f0ccca1416e93864f1611f298057cd08e25904da7e4e002a1fc4eb1358874edf556a5980a135df129f7be3249f8e21e713675f8f5512747573da0f5
7
- data.tar.gz: 357df7019f712ebeca4b50dd3fcfde731f6180a3dea298b81d92706187dda3f5c314a8601cacd0df50a6c4f1cbb7b5b782b33909bba0ce050c2c48048dbaee1e
6
+ metadata.gz: 9b8903dbaf3fdf2350bba0acca527b28a8aac856010cd206326588cfadb1349e2f066858c45c1b1026428bf394dbc487dce0f7e12d4efc27aa2d416c63e42813
7
+ data.tar.gz: f3a904693e82da234e54186ecf244138372467b6eb72e3cf7e479355a55ccce00a4901a5d47ad8c032b832ad5bfe816c7820beef084de2ef479c99f0408e6d93
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.52.0 (2022-10-27)
5
+ ------------------
6
+
7
+ * Feature - Add support NetworkFirewall Managed Rule Group Override flag in GetViolationDetails API
8
+
4
9
  1.51.0 (2022-10-25)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.51.0
1
+ 1.52.0
@@ -1063,6 +1063,7 @@ module Aws::FMS
1063
1063
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].rule_group_name #=> String
1064
1064
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].resource_id #=> String
1065
1065
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].priority #=> Integer
1066
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].override.action #=> String, one of "DROP_TO_ALERT"
1066
1067
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_default_actions #=> Array
1067
1068
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_default_actions[0] #=> String
1068
1069
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_engine_options.rule_order #=> String, one of "STRICT_ORDER", "DEFAULT_ACTION_ORDER"
@@ -1080,6 +1081,7 @@ module Aws::FMS
1080
1081
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].rule_group_name #=> String
1081
1082
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].resource_id #=> String
1082
1083
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].priority #=> Integer
1084
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].override.action #=> String, one of "DROP_TO_ALERT"
1083
1085
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_default_actions #=> Array
1084
1086
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_default_actions[0] #=> String
1085
1087
  # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_engine_options.rule_order #=> String, one of "STRICT_ORDER", "DEFAULT_ACTION_ORDER"
@@ -2072,7 +2074,7 @@ module Aws::FMS
2072
2074
  params: params,
2073
2075
  config: config)
2074
2076
  context[:gem_name] = 'aws-sdk-fms'
2075
- context[:gem_version] = '1.51.0'
2077
+ context[:gem_version] = '1.52.0'
2076
2078
  Seahorse::Client::Request.new(handlers, context)
2077
2079
  end
2078
2080
 
@@ -125,10 +125,12 @@ module Aws::FMS
125
125
  NetworkFirewallMissingExpectedRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingExpectedRoutesViolation')
126
126
  NetworkFirewallMissingFirewallViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingFirewallViolation')
127
127
  NetworkFirewallMissingSubnetViolation = Shapes::StructureShape.new(name: 'NetworkFirewallMissingSubnetViolation')
128
+ NetworkFirewallOverrideAction = Shapes::StringShape.new(name: 'NetworkFirewallOverrideAction')
128
129
  NetworkFirewallPolicy = Shapes::StructureShape.new(name: 'NetworkFirewallPolicy')
129
130
  NetworkFirewallPolicyDescription = Shapes::StructureShape.new(name: 'NetworkFirewallPolicyDescription')
130
131
  NetworkFirewallPolicyModifiedViolation = Shapes::StructureShape.new(name: 'NetworkFirewallPolicyModifiedViolation')
131
132
  NetworkFirewallResourceName = Shapes::StringShape.new(name: 'NetworkFirewallResourceName')
133
+ NetworkFirewallStatefulRuleGroupOverride = Shapes::StructureShape.new(name: 'NetworkFirewallStatefulRuleGroupOverride')
132
134
  NetworkFirewallUnexpectedFirewallRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallUnexpectedFirewallRoutesViolation')
133
135
  NetworkFirewallUnexpectedGatewayRoutesViolation = Shapes::StructureShape.new(name: 'NetworkFirewallUnexpectedGatewayRoutesViolation')
134
136
  OrderedRemediationActions = Shapes::ListShape.new(name: 'OrderedRemediationActions')
@@ -647,6 +649,9 @@ module Aws::FMS
647
649
  NetworkFirewallPolicyModifiedViolation.add_member(:expected_policy_description, Shapes::ShapeRef.new(shape: NetworkFirewallPolicyDescription, location_name: "ExpectedPolicyDescription"))
648
650
  NetworkFirewallPolicyModifiedViolation.struct_class = Types::NetworkFirewallPolicyModifiedViolation
649
651
 
652
+ NetworkFirewallStatefulRuleGroupOverride.add_member(:action, Shapes::ShapeRef.new(shape: NetworkFirewallOverrideAction, location_name: "Action"))
653
+ NetworkFirewallStatefulRuleGroupOverride.struct_class = Types::NetworkFirewallStatefulRuleGroupOverride
654
+
650
655
  NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:firewall_subnet_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallSubnetId"))
651
656
  NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:violating_routes, Shapes::ShapeRef.new(shape: Routes, location_name: "ViolatingRoutes"))
652
657
  NetworkFirewallUnexpectedFirewallRoutesViolation.add_member(:route_table_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "RouteTableId"))
@@ -885,6 +890,7 @@ module Aws::FMS
885
890
  StatefulRuleGroup.add_member(:rule_group_name, Shapes::ShapeRef.new(shape: NetworkFirewallResourceName, location_name: "RuleGroupName"))
886
891
  StatefulRuleGroup.add_member(:resource_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "ResourceId"))
887
892
  StatefulRuleGroup.add_member(:priority, Shapes::ShapeRef.new(shape: PriorityNumber, location_name: "Priority"))
893
+ StatefulRuleGroup.add_member(:override, Shapes::ShapeRef.new(shape: NetworkFirewallStatefulRuleGroupOverride, location_name: "Override"))
888
894
  StatefulRuleGroup.struct_class = Types::StatefulRuleGroup
889
895
 
890
896
  StatefulRuleGroupList.member = Shapes::ShapeRef.new(shape: StatefulRuleGroup)
@@ -2382,6 +2382,22 @@ module Aws::FMS
2382
2382
  include Aws::Structure
2383
2383
  end
2384
2384
 
2385
+ # The setting that allows the policy owner to change the behavior of the
2386
+ # rule group within a policy.
2387
+ #
2388
+ # @!attribute [rw] action
2389
+ # The action that changes the rule group from `DROP` to `ALERT`. This
2390
+ # only applies to managed rule groups.
2391
+ # @return [String]
2392
+ #
2393
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkFirewallStatefulRuleGroupOverride AWS API Documentation
2394
+ #
2395
+ class NetworkFirewallStatefulRuleGroupOverride < Struct.new(
2396
+ :action)
2397
+ SENSITIVE = []
2398
+ include Aws::Structure
2399
+ end
2400
+
2385
2401
  # Violation detail for an unexpected route that's present in a route
2386
2402
  # table.
2387
2403
  #
@@ -3815,56 +3831,6 @@ module Aws::FMS
3815
3831
  # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
3816
3832
  # "allowedIPV4CidrList":[ ] \} \} \} \}"`
3817
3833
  #
3818
- # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
3819
- # distributions
3820
- #
3821
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
3822
- # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
3823
- # "automaticResponseAction":"BLOCK|COUNT"\},
3824
- # "overrideCustomerWebaclClassic":true|false\}"`
3825
- #
3826
- # For example:
3827
- # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
3828
- # \{"automaticResponseStatus":"ENABLED",
3829
- # "automaticResponseAction":"COUNT"\}\}"`
3830
- #
3831
- # The default value for `automaticResponseStatus` is `IGNORED`. The
3832
- # value for `automaticResponseAction` is only required when
3833
- # `automaticResponseStatus` is set to `ENABLED`. The default value
3834
- # for `overrideCustomerWebaclClassic` is `false`.
3835
- #
3836
- # For other resource types that you can protect with a Shield
3837
- # Advanced policy, this `ManagedServiceData` configuration is an
3838
- # empty string.
3839
- #
3840
- # * Example: `WAFV2`
3841
- #
3842
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAmazonIpReputationList"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
3843
- #
3844
- # In the `loggingConfiguration`, you can specify one
3845
- # `logDestinationConfigs`, you can optionally provide up to 20
3846
- # `redactedFields`, and the `RedactedFieldType` must be one of
3847
- # `URI`, `QUERY_STRING`, `HEADER`, or `METHOD`.
3848
- #
3849
- # * Example: `WAF Classic`
3850
- #
3851
- # `"\{"type": "WAF", "ruleGroups":
3852
- # [\{"id":"12345678-1bcd-9012-efga-0987654321ab",
3853
- # "overrideAction" : \{"type": "COUNT"\}\}],
3854
- # "defaultAction": \{"type": "BLOCK"\}\}"`
3855
- #
3856
- # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
3857
- # group versioning
3858
- #
3859
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":true,"version":"Version_2.0","vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesCommonRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
3860
- #
3861
- # To use a specific version of a WAF managed rule group in your
3862
- # Firewall Manager policy, you must set `versionEnabled` to `true`,
3863
- # and set `version` to the version you'd like to use. If you don't
3864
- # set `versionEnabled` to `true`, or if you omit `versionEnabled`,
3865
- # then Firewall Manager uses the default version of the WAF managed
3866
- # rule group.
3867
- #
3868
3834
  # * Example: `SECURITY_GROUPS_COMMON`
3869
3835
  #
3870
3836
  # `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
@@ -3911,6 +3877,56 @@ module Aws::FMS
3911
3877
  #
3912
3878
  # `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"`
3913
3879
  #
3880
+ # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
3881
+ # distributions
3882
+ #
3883
+ # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
3884
+ # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
3885
+ # "automaticResponseAction":"BLOCK|COUNT"\},
3886
+ # "overrideCustomerWebaclClassic":true|false\}"`
3887
+ #
3888
+ # For example:
3889
+ # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
3890
+ # \{"automaticResponseStatus":"ENABLED",
3891
+ # "automaticResponseAction":"COUNT"\}\}"`
3892
+ #
3893
+ # The default value for `automaticResponseStatus` is `IGNORED`. The
3894
+ # value for `automaticResponseAction` is only required when
3895
+ # `automaticResponseStatus` is set to `ENABLED`. The default value
3896
+ # for `overrideCustomerWebaclClassic` is `false`.
3897
+ #
3898
+ # For other resource types that you can protect with a Shield
3899
+ # Advanced policy, this `ManagedServiceData` configuration is an
3900
+ # empty string.
3901
+ #
3902
+ # * Example: `WAFV2`
3903
+ #
3904
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAmazonIpReputationList"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
3905
+ #
3906
+ # In the `loggingConfiguration`, you can specify one
3907
+ # `logDestinationConfigs`, you can optionally provide up to 20
3908
+ # `redactedFields`, and the `RedactedFieldType` must be one of
3909
+ # `URI`, `QUERY_STRING`, `HEADER`, or `METHOD`.
3910
+ #
3911
+ # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
3912
+ # group versioning
3913
+ #
3914
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":true,"version":"Version_2.0","vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesCommonRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[\{"name":"NoUserAgent_HEADER"\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":\{"logDestinationConfigs":["arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination"],"redactedFields":[\{"redactedFieldType":"SingleHeader","redactedFieldValue":"Cookies"\},\{"redactedFieldType":"Method"\}]\}\}"`
3915
+ #
3916
+ # To use a specific version of a WAF managed rule group in your
3917
+ # Firewall Manager policy, you must set `versionEnabled` to `true`,
3918
+ # and set `version` to the version you'd like to use. If you don't
3919
+ # set `versionEnabled` to `true`, or if you omit `versionEnabled`,
3920
+ # then Firewall Manager uses the default version of the WAF managed
3921
+ # rule group.
3922
+ #
3923
+ # * Example: `WAF Classic`
3924
+ #
3925
+ # `"\{"type": "WAF", "ruleGroups":
3926
+ # [\{"id":"12345678-1bcd-9012-efga-0987654321ab",
3927
+ # "overrideAction" : \{"type": "COUNT"\}\}],
3928
+ # "defaultAction": \{"type": "BLOCK"\}\}"`
3929
+ #
3914
3930
  #
3915
3931
  #
3916
3932
  # [1]: https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html
@@ -3983,12 +3999,18 @@ module Aws::FMS
3983
3999
  # on.
3984
4000
  # @return [Integer]
3985
4001
  #
4002
+ # @!attribute [rw] override
4003
+ # The action that allows the policy owner to override the behavior of
4004
+ # the rule group within a policy.
4005
+ # @return [Types::NetworkFirewallStatefulRuleGroupOverride]
4006
+ #
3986
4007
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/StatefulRuleGroup AWS API Documentation
3987
4008
  #
3988
4009
  class StatefulRuleGroup < Struct.new(
3989
4010
  :rule_group_name,
3990
4011
  :resource_id,
3991
- :priority)
4012
+ :priority,
4013
+ :override)
3992
4014
  SENSITIVE = []
3993
4015
  include Aws::Structure
3994
4016
  end
data/lib/aws-sdk-fms.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-fms/customizations'
52
52
  # @!group service
53
53
  module Aws::FMS
54
54
 
55
- GEM_VERSION = '1.51.0'
55
+ GEM_VERSION = '1.52.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.51.0
4
+ version: 1.52.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-10-25 00:00:00.000000000 Z
11
+ date: 2022-10-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core