aws-sdk-fms 1.63.0 → 1.64.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-fms/client.rb +52 -22
- data/lib/aws-sdk-fms/endpoint_provider.rb +1 -1
- data/lib/aws-sdk-fms/types.rb +144 -51
- data/lib/aws-sdk-fms.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 39eb8bae4d7a1f5972c29f806406cc909eeec6aeea13793da7efc6c497c7e1ef
|
|
4
|
+
data.tar.gz: 1e06cb0918b3e945992322cfd9802dfb449b77ecc723bad67cc13026ae2e8072
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: eacb5200cb9f01938ec2e4bcad981b40071f54eeb1d259a35bf4ca92f93a7f2aa6ac32ddfd6777761f37888ad5be91dda24bd012a3429b2fc6e5e6a67706685a
|
|
7
|
+
data.tar.gz: c4a1fdb5b78b74c4366ceb304e2f0d13a6af3d92321efff3a73b7dfd8bb0a515a784a88a65db8fba43d719670690e517ad8f096e229e638c0b857afe44f5b41e
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,11 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.64.0 (2023-11-10)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Adds optimizeUnassociatedWebACL flag to ManagedServiceData, updates third-party firewall examples, and other minor documentation updates.
|
|
8
|
+
|
|
4
9
|
1.63.0 (2023-09-27)
|
|
5
10
|
------------------
|
|
6
11
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.64.0
|
data/lib/aws-sdk-fms/client.rb
CHANGED
|
@@ -616,6 +616,12 @@ module Aws::FMS
|
|
|
616
616
|
# Manager and if it's no longer associated with any resources through
|
|
617
617
|
# another policy
|
|
618
618
|
#
|
|
619
|
+
# <note markdown="1"> For security group common policies, even if set to `False`, Firewall
|
|
620
|
+
# Manager deletes all security groups created by Firewall Manager that
|
|
621
|
+
# aren't associated with any other resources through another policy.
|
|
622
|
+
#
|
|
623
|
+
# </note>
|
|
624
|
+
#
|
|
619
625
|
# After the cleanup, in-scope resources are no longer protected by web
|
|
620
626
|
# ACLs in this policy. Protection of out-of-scope resources remains
|
|
621
627
|
# unchanged. Scope is determined by tags that you create and accounts
|
|
@@ -1194,7 +1200,17 @@ module Aws::FMS
|
|
|
1194
1200
|
#
|
|
1195
1201
|
# @option params [required, String] :policy_id
|
|
1196
1202
|
# The ID of the Firewall Manager policy that you want the details for.
|
|
1197
|
-
#
|
|
1203
|
+
# You can get violation details for the following policy types:
|
|
1204
|
+
#
|
|
1205
|
+
# * DNS Firewall
|
|
1206
|
+
#
|
|
1207
|
+
# * Imported Network Firewall
|
|
1208
|
+
#
|
|
1209
|
+
# * Network Firewall
|
|
1210
|
+
#
|
|
1211
|
+
# * Security group content audit
|
|
1212
|
+
#
|
|
1213
|
+
# * Third-party firewall
|
|
1198
1214
|
#
|
|
1199
1215
|
# @option params [required, String] :member_account
|
|
1200
1216
|
# The Amazon Web Services account ID that you want the details for.
|
|
@@ -2366,37 +2382,51 @@ module Aws::FMS
|
|
|
2366
2382
|
|
|
2367
2383
|
# Creates an Firewall Manager policy.
|
|
2368
2384
|
#
|
|
2369
|
-
# Firewall Manager
|
|
2385
|
+
# A Firewall Manager policy is specific to the individual policy type.
|
|
2386
|
+
# If you want to enforce multiple policy types across accounts, you can
|
|
2387
|
+
# create multiple policies. You can create more than one policy for each
|
|
2388
|
+
# type.
|
|
2370
2389
|
#
|
|
2371
|
-
#
|
|
2372
|
-
#
|
|
2373
|
-
#
|
|
2390
|
+
# If you add a new account to an organization that you created with
|
|
2391
|
+
# Organizations, Firewall Manager automatically applies the policy to
|
|
2392
|
+
# the resources in that account that are within scope of the policy.
|
|
2393
|
+
#
|
|
2394
|
+
# Firewall Manager provides the following types of policies:
|
|
2374
2395
|
#
|
|
2375
|
-
# *
|
|
2396
|
+
# * **Shield Advanced policy** - This policy applies Shield Advanced
|
|
2397
|
+
# protection to specified accounts and resources.
|
|
2376
2398
|
#
|
|
2377
|
-
# *
|
|
2378
|
-
#
|
|
2399
|
+
# * **Security Groups policy** - This type of policy gives you control
|
|
2400
|
+
# over security groups that are in use throughout your organization in
|
|
2401
|
+
# Organizations and lets you enforce a baseline set of rules across
|
|
2402
|
+
# your organization.
|
|
2379
2403
|
#
|
|
2380
|
-
# *
|
|
2381
|
-
#
|
|
2404
|
+
# * **Network Firewall policy** - This policy applies Network Firewall
|
|
2405
|
+
# protection to your organization's VPCs.
|
|
2382
2406
|
#
|
|
2383
|
-
# *
|
|
2384
|
-
#
|
|
2407
|
+
# * **DNS Firewall policy** - This policy applies Amazon Route 53
|
|
2408
|
+
# Resolver DNS Firewall protections to your organization's VPCs.
|
|
2385
2409
|
#
|
|
2386
|
-
# *
|
|
2387
|
-
#
|
|
2410
|
+
# * **Third-party firewall policy** - This policy applies third-party
|
|
2411
|
+
# firewall protections. Third-party firewalls are available by
|
|
2412
|
+
# subscription through the Amazon Web Services Marketplace console at
|
|
2413
|
+
# [Amazon Web Services Marketplace][1].
|
|
2388
2414
|
#
|
|
2389
|
-
#
|
|
2390
|
-
#
|
|
2391
|
-
#
|
|
2415
|
+
# * **Palo Alto Networks Cloud NGFW policy** - This policy applies
|
|
2416
|
+
# Palo Alto Networks Cloud Next Generation Firewall (NGFW)
|
|
2417
|
+
# protections and Palo Alto Networks Cloud NGFW rulestacks to your
|
|
2418
|
+
# organization's VPCs.
|
|
2392
2419
|
#
|
|
2393
|
-
#
|
|
2394
|
-
#
|
|
2395
|
-
#
|
|
2420
|
+
# * **Fortigate CNF policy** - This policy applies Fortigate Cloud
|
|
2421
|
+
# Native Firewall (CNF) protections. Fortigate CNF is a
|
|
2422
|
+
# cloud-centered solution that blocks Zero-Day threats and secures
|
|
2423
|
+
# cloud infrastructures with industry-leading advanced threat
|
|
2424
|
+
# prevention, smart web application firewalls (WAF), and API
|
|
2425
|
+
# protection.
|
|
2396
2426
|
#
|
|
2397
2427
|
#
|
|
2398
2428
|
#
|
|
2399
|
-
# [1]: https://
|
|
2429
|
+
# [1]: https://aws.amazon.com/marketplace
|
|
2400
2430
|
#
|
|
2401
2431
|
# @option params [required, Types::Policy] :policy
|
|
2402
2432
|
# The details of the Firewall Manager policy to be created.
|
|
@@ -2690,7 +2720,7 @@ module Aws::FMS
|
|
|
2690
2720
|
params: params,
|
|
2691
2721
|
config: config)
|
|
2692
2722
|
context[:gem_name] = 'aws-sdk-fms'
|
|
2693
|
-
context[:gem_version] = '1.
|
|
2723
|
+
context[:gem_version] = '1.64.0'
|
|
2694
2724
|
Seahorse::Client::Request.new(handlers, context)
|
|
2695
2725
|
end
|
|
2696
2726
|
|
|
@@ -32,7 +32,7 @@ module Aws::FMS
|
|
|
32
32
|
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
|
33
33
|
end
|
|
34
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
|
35
|
-
if Aws::Endpoints::Matchers.boolean_equals?(
|
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
|
|
36
36
|
return Aws::Endpoints::Endpoint.new(url: "https://fms-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
|
37
37
|
end
|
|
38
38
|
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
data/lib/aws-sdk-fms/types.rb
CHANGED
|
@@ -575,6 +575,12 @@ module Aws::FMS
|
|
|
575
575
|
# Manager and if it's no longer associated with any resources
|
|
576
576
|
# through another policy
|
|
577
577
|
#
|
|
578
|
+
# <note markdown="1"> For security group common policies, even if set to `False`, Firewall
|
|
579
|
+
# Manager deletes all security groups created by Firewall Manager that
|
|
580
|
+
# aren't associated with any other resources through another policy.
|
|
581
|
+
#
|
|
582
|
+
# </note>
|
|
583
|
+
#
|
|
578
584
|
# After the cleanup, in-scope resources are no longer protected by web
|
|
579
585
|
# ACLs in this policy. Protection of out-of-scope resources remains
|
|
580
586
|
# unchanged. Scope is determined by tags that you create and accounts
|
|
@@ -1621,7 +1627,17 @@ module Aws::FMS
|
|
|
1621
1627
|
|
|
1622
1628
|
# @!attribute [rw] policy_id
|
|
1623
1629
|
# The ID of the Firewall Manager policy that you want the details for.
|
|
1624
|
-
#
|
|
1630
|
+
# You can get violation details for the following policy types:
|
|
1631
|
+
#
|
|
1632
|
+
# * DNS Firewall
|
|
1633
|
+
#
|
|
1634
|
+
# * Imported Network Firewall
|
|
1635
|
+
#
|
|
1636
|
+
# * Network Firewall
|
|
1637
|
+
#
|
|
1638
|
+
# * Security group content audit
|
|
1639
|
+
#
|
|
1640
|
+
# * Third-party firewall
|
|
1625
1641
|
# @return [String]
|
|
1626
1642
|
#
|
|
1627
1643
|
# @!attribute [rw] member_account
|
|
@@ -2970,17 +2986,28 @@ module Aws::FMS
|
|
|
2970
2986
|
# specify a resource type of `ResourceTypeList` and then specify the
|
|
2971
2987
|
# resource types in a `ResourceTypeList`.
|
|
2972
2988
|
#
|
|
2973
|
-
#
|
|
2974
|
-
#
|
|
2975
|
-
#
|
|
2976
|
-
#
|
|
2977
|
-
#
|
|
2978
|
-
#
|
|
2979
|
-
#
|
|
2980
|
-
#
|
|
2981
|
-
#
|
|
2982
|
-
#
|
|
2983
|
-
#
|
|
2989
|
+
# The following are valid resource types for each Firewall Manager
|
|
2990
|
+
# policy type:
|
|
2991
|
+
#
|
|
2992
|
+
# * Amazon Web Services WAF Classic - `AWS::ApiGateway::Stage`,
|
|
2993
|
+
# `AWS::CloudFront::Distribution`, and
|
|
2994
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer`.
|
|
2995
|
+
#
|
|
2996
|
+
# * WAF - `AWS::ApiGateway::Stage`,
|
|
2997
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
|
|
2998
|
+
# `AWS::CloudFront::Distribution`.
|
|
2999
|
+
#
|
|
3000
|
+
# * DNS Firewall, Network Firewall, and third-party firewall -
|
|
3001
|
+
# `AWS::EC2::VPC`.
|
|
3002
|
+
#
|
|
3003
|
+
# * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
|
|
3004
|
+
# `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
|
|
3005
|
+
# `AWS::CloudFront::Distribution`.
|
|
3006
|
+
#
|
|
3007
|
+
# * Security group content audit - `AWS::EC2::SecurityGroup`,
|
|
3008
|
+
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
|
|
3009
|
+
#
|
|
3010
|
+
# * Security group usage audit - `AWS::EC2::SecurityGroup`.
|
|
2984
3011
|
#
|
|
2985
3012
|
#
|
|
2986
3013
|
#
|
|
@@ -4307,6 +4334,7 @@ module Aws::FMS
|
|
|
4307
4334
|
# </note>
|
|
4308
4335
|
#
|
|
4309
4336
|
# * Example: `IMPORT_NETWORK_FIREWALL`
|
|
4337
|
+
#
|
|
4310
4338
|
# `"\{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8\}],"networkFirewallStatefulEngineOptions":\{"ruleOrder":"STRICT_ORDER"\},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]\}\}"`
|
|
4311
4339
|
#
|
|
4312
4340
|
# `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
|
|
@@ -4376,20 +4404,6 @@ module Aws::FMS
|
|
|
4376
4404
|
# To use the distributed deployment model, you must set
|
|
4377
4405
|
# [PolicyOption][1] to `NULL`.
|
|
4378
4406
|
#
|
|
4379
|
-
# * Example: `THIRD_PARTY_FIREWALL`
|
|
4380
|
-
#
|
|
4381
|
-
# `"\{ "type":"THIRD_PARTY_FIREWALL",
|
|
4382
|
-
# "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW",
|
|
4383
|
-
# "thirdPartyFirewallConfig":\{
|
|
4384
|
-
# "thirdPartyFirewallPolicyList":["global-1"] \},
|
|
4385
|
-
# "firewallDeploymentModel":\{
|
|
4386
|
-
# "distributedFirewallDeploymentModel":\{
|
|
4387
|
-
# "distributedFirewallOrchestrationConfig":\{
|
|
4388
|
-
# "firewallCreationConfig":\{ "endpointLocation":\{
|
|
4389
|
-
# "availabilityZoneConfigList":[ \{
|
|
4390
|
-
# "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
|
|
4391
|
-
# "allowedIPV4CidrList":[ ] \} \} \} \}"`
|
|
4392
|
-
#
|
|
4393
4407
|
# * Example: `SECURITY_GROUPS_COMMON`
|
|
4394
4408
|
#
|
|
4395
4409
|
# `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
|
|
@@ -4436,13 +4450,40 @@ module Aws::FMS
|
|
|
4436
4450
|
#
|
|
4437
4451
|
# `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"`
|
|
4438
4452
|
#
|
|
4453
|
+
# * Example: `SHIELD_ADVANCED` with web ACL management
|
|
4454
|
+
#
|
|
4455
|
+
# `"\{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true\}"`
|
|
4456
|
+
#
|
|
4457
|
+
# If you set `optimizeUnassociatedWebACL` to `true`, Firewall
|
|
4458
|
+
# Manager creates web ACLs in accounts within the policy scope if
|
|
4459
|
+
# the web ACLs will be used by at least one resource. Firewall
|
|
4460
|
+
# Manager creates web ACLs in the accounts within policy scope only
|
|
4461
|
+
# if the web ACLs will be used by at least one resource. If at any
|
|
4462
|
+
# time an account comes into policy scope, Firewall Manager
|
|
4463
|
+
# automatically creates a web ACL in the account if at least one
|
|
4464
|
+
# resource will use the web ACL.
|
|
4465
|
+
#
|
|
4466
|
+
# Upon enablement, Firewall Manager performs a one-time cleanup of
|
|
4467
|
+
# unused web ACLs in your account. The cleanup process can take
|
|
4468
|
+
# several hours. If a resource leaves policy scope after Firewall
|
|
4469
|
+
# Manager creates a web ACL, Firewall Manager doesn't disassociate
|
|
4470
|
+
# the resource from the web ACL. If you want Firewall Manager to
|
|
4471
|
+
# clean up the web ACL, you must first manually disassociate the
|
|
4472
|
+
# resources from the web ACL, and then enable the manage unused web
|
|
4473
|
+
# ACLs option in your policy.
|
|
4474
|
+
#
|
|
4475
|
+
# If you set `optimizeUnassociatedWebACL` to `false`, and Firewall
|
|
4476
|
+
# Manager automatically creates an empty web ACL in each account
|
|
4477
|
+
# that's within policy scope.
|
|
4478
|
+
#
|
|
4439
4479
|
# * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
|
|
4440
4480
|
# distributions
|
|
4441
4481
|
#
|
|
4442
4482
|
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
|
4443
4483
|
# \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
|
|
4444
4484
|
# "automaticResponseAction":"BLOCK|COUNT"\},
|
|
4445
|
-
# "overrideCustomerWebaclClassic":true|false
|
|
4485
|
+
# "overrideCustomerWebaclClassic":true|false,
|
|
4486
|
+
# "optimizeUnassociatedWebACL":true|false\}"`
|
|
4446
4487
|
#
|
|
4447
4488
|
# For example:
|
|
4448
4489
|
# `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
|
|
@@ -4458,21 +4499,62 @@ module Aws::FMS
|
|
|
4458
4499
|
# Advanced policy, this `ManagedServiceData` configuration is an
|
|
4459
4500
|
# empty string.
|
|
4460
4501
|
#
|
|
4461
|
-
# * Example: `
|
|
4462
|
-
# managed rule groups, and rule action override
|
|
4502
|
+
# * Example: `THIRD_PARTY_FIREWALL`
|
|
4463
4503
|
#
|
|
4464
|
-
# `
|
|
4504
|
+
# Replace `THIRD_PARTY_FIREWALL_NAME` with the name of the
|
|
4505
|
+
# third-party firewall.
|
|
4465
4506
|
#
|
|
4466
|
-
#
|
|
4467
|
-
#
|
|
4468
|
-
#
|
|
4469
|
-
#
|
|
4507
|
+
# `"\{ "type":"THIRD_PARTY_FIREWALL",
|
|
4508
|
+
# "thirdPartyFirewall":"THIRD_PARTY_FIREWALL_NAME",
|
|
4509
|
+
# "thirdPartyFirewallConfig":\{
|
|
4510
|
+
# "thirdPartyFirewallPolicyList":["global-1"] \},
|
|
4511
|
+
# "firewallDeploymentModel":\{
|
|
4512
|
+
# "distributedFirewallDeploymentModel":\{
|
|
4513
|
+
# "distributedFirewallOrchestrationConfig":\{
|
|
4514
|
+
# "firewallCreationConfig":\{ "endpointLocation":\{
|
|
4515
|
+
# "availabilityZoneConfigList":[ \{
|
|
4516
|
+
# "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
|
|
4517
|
+
# "allowedIPV4CidrList":[ ] \} \} \} \}"`
|
|
4518
|
+
#
|
|
4519
|
+
# * Example: `WAFV2` - Account takeover prevention, Bot Control
|
|
4520
|
+
# managed rule groups, optimize unassociated web ACL, and rule
|
|
4521
|
+
# action override
|
|
4522
|
+
#
|
|
4523
|
+
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true\}"`
|
|
4470
4524
|
#
|
|
4471
4525
|
# * Bot Control - For information about
|
|
4472
4526
|
# `AWSManagedRulesBotControlRuleSet` managed rule groups, see
|
|
4473
|
-
# [AWSManagedRulesBotControlRuleSet][
|
|
4527
|
+
# [AWSManagedRulesBotControlRuleSet][2] in the *WAF API
|
|
4474
4528
|
# Reference*.
|
|
4475
4529
|
#
|
|
4530
|
+
# * Fraud Control account takeover prevention (ATP) - For
|
|
4531
|
+
# information about the properties available for
|
|
4532
|
+
# `AWSManagedRulesATPRuleSet` managed rule groups, see
|
|
4533
|
+
# [AWSManagedRulesATPRuleSet][3] in the *WAF API Reference*.
|
|
4534
|
+
#
|
|
4535
|
+
# * Optimize unassociated web ACL - If you set
|
|
4536
|
+
# `optimizeUnassociatedWebACL` to `true`, Firewall Manager creates
|
|
4537
|
+
# web ACLs in accounts within the policy scope if the web ACLs
|
|
4538
|
+
# will be used by at least one resource. Firewall Manager creates
|
|
4539
|
+
# web ACLs in the accounts within policy scope only if the web
|
|
4540
|
+
# ACLs will be used by at least one resource. If at any time an
|
|
4541
|
+
# account comes into policy scope, Firewall Manager automatically
|
|
4542
|
+
# creates a web ACL in the account if at least one resource will
|
|
4543
|
+
# use the web ACL.
|
|
4544
|
+
#
|
|
4545
|
+
# Upon enablement, Firewall Manager performs a one-time cleanup of
|
|
4546
|
+
# unused web ACLs in your account. The cleanup process can take
|
|
4547
|
+
# several hours. If a resource leaves policy scope after Firewall
|
|
4548
|
+
# Manager creates a web ACL, Firewall Manager disassociates the
|
|
4549
|
+
# resource from the web ACL, but won't clean up the unused web
|
|
4550
|
+
# ACL. Firewall Manager only cleans up unused web ACLs when you
|
|
4551
|
+
# first enable management of unused web ACLs in a policy.
|
|
4552
|
+
#
|
|
4553
|
+
# If you set `optimizeUnassociatedWebACL` to `false` Firewall
|
|
4554
|
+
# Manager doesn't manage unused web ACLs, and Firewall Manager
|
|
4555
|
+
# automatically creates an empty web ACL in each account that's
|
|
4556
|
+
# within policy scope.
|
|
4557
|
+
#
|
|
4476
4558
|
# * Rule action overrides - Firewall Manager supports rule action
|
|
4477
4559
|
# overrides only for managed rule groups. To configure a
|
|
4478
4560
|
# `RuleActionOverrides` add the `Name` of the rule to override,
|
|
@@ -4482,16 +4564,25 @@ module Aws::FMS
|
|
|
4482
4564
|
#
|
|
4483
4565
|
# * Example: `WAFV2` - `CAPTCHA` and `Challenge` configs
|
|
4484
4566
|
#
|
|
4485
|
-
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"]\}"`
|
|
4486
|
-
#
|
|
4487
|
-
# If you update the policy's
|
|
4488
|
-
#
|
|
4489
|
-
#
|
|
4490
|
-
#
|
|
4491
|
-
#
|
|
4492
|
-
#
|
|
4493
|
-
#
|
|
4494
|
-
#
|
|
4567
|
+
# `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"],"associationConfig":\{"requestBody":\{"CLOUDFRONT":\{"defaultSizeInspectionLimit":"KB_16"\}\}\}\}"`
|
|
4568
|
+
#
|
|
4569
|
+
# * `CAPTCHA` and `Challenge` configs - If you update the policy's
|
|
4570
|
+
# values for `associationConfig`, `captchaConfig`,
|
|
4571
|
+
# `challengeConfig`, or `tokenDomains`, Firewall Manager will
|
|
4572
|
+
# overwrite your local web ACLs to contain the new value(s).
|
|
4573
|
+
# However, if you don't update the policy's `associationConfig`,
|
|
4574
|
+
# `captchaConfig`, `challengeConfig`, or `tokenDomains` values,
|
|
4575
|
+
# the values in your local web ACLs will remain unchanged. For
|
|
4576
|
+
# information about association configs, see
|
|
4577
|
+
# [AssociationConfig][5]. For information about CAPTCHA and
|
|
4578
|
+
# Challenge configs, see [CaptchaConfig][6] and
|
|
4579
|
+
# [ChallengeConfig][7] in the *WAF API Reference*.
|
|
4580
|
+
#
|
|
4581
|
+
# * `defaultSizeInspectionLimit` - Specifies the maximum size of the
|
|
4582
|
+
# web request body component that an associated Amazon CloudFront
|
|
4583
|
+
# distribution should send to WAF for inspection. For more
|
|
4584
|
+
# information, see [DefaultSizeInspectionLimit][8] in the *WAF API
|
|
4585
|
+
# Reference*.
|
|
4495
4586
|
#
|
|
4496
4587
|
# * Example: `WAFV2` - Firewall Manager support for WAF managed rule
|
|
4497
4588
|
# group versioning
|
|
@@ -4526,7 +4617,7 @@ module Aws::FMS
|
|
|
4526
4617
|
# Firewall Manager supports Amazon Kinesis Data Firehose and Amazon
|
|
4527
4618
|
# S3 as the `logDestinationConfigs` in your `loggingConfiguration`.
|
|
4528
4619
|
# For information about WAF logging configurations, see
|
|
4529
|
-
# [LoggingConfiguration][
|
|
4620
|
+
# [LoggingConfiguration][9] in the *WAF API Reference*
|
|
4530
4621
|
#
|
|
4531
4622
|
# In the `loggingConfiguration`, you can specify one
|
|
4532
4623
|
# `logDestinationConfigs`. Optionally provide as many as 20
|
|
@@ -4543,12 +4634,14 @@ module Aws::FMS
|
|
|
4543
4634
|
#
|
|
4544
4635
|
#
|
|
4545
4636
|
# [1]: https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html
|
|
4546
|
-
# [2]: https://docs.aws.amazon.com/waf/latest/APIReference/
|
|
4547
|
-
# [3]: https://docs.aws.amazon.com/waf/latest/APIReference/
|
|
4637
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesBotControlRuleSet.html
|
|
4638
|
+
# [3]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesATPRuleSet.html
|
|
4548
4639
|
# [4]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RuleActionOverride.html
|
|
4549
|
-
# [5]: https://docs.aws.amazon.com/waf/latest/APIReference/
|
|
4550
|
-
# [6]: https://docs.aws.amazon.com/waf/latest/APIReference/
|
|
4551
|
-
# [7]: https://docs.aws.amazon.com/waf/latest/APIReference/
|
|
4640
|
+
# [5]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AssociationConfig.html
|
|
4641
|
+
# [6]: https://docs.aws.amazon.com/waf/latest/APIReference/API_CaptchaConfig.html
|
|
4642
|
+
# [7]: https://docs.aws.amazon.com/waf/latest/APIReference/API_ChallengeConfig.html
|
|
4643
|
+
# [8]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RequestBodyAssociatedResourceTypeConfig.html#WAF-Type-RequestBodyAssociatedResourceTypeConfig-DefaultSizeInspectionLimit
|
|
4644
|
+
# [9]: https://docs.aws.amazon.com/waf/latest/APIReference/API_LoggingConfiguration.html
|
|
4552
4645
|
# @return [String]
|
|
4553
4646
|
#
|
|
4554
4647
|
# @!attribute [rw] policy_option
|
data/lib/aws-sdk-fms.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-fms
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.64.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-
|
|
11
|
+
date: 2023-11-10 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|