aws-sdk-guardduty 1.149.0 → 1.150.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0ac446955c8bfa6196ce4a09c6e9e11bde1084253ad4eddad2256c14f1dfad68
4
- data.tar.gz: 764f8d3fc4a29c273cf7b9ce0c11f4684e647eec7d970759031231e12fb1fe7d
3
+ metadata.gz: 870f235f6604863ea3cbc6f99ebb8a9468d529940d424c72277b329f95d0df9f
4
+ data.tar.gz: dff9ea616a7c356736a144432e141d9b441c2f3b0148b5b21c47c816e179980d
5
5
  SHA512:
6
- metadata.gz: a95a36709b44702c03f90c4182ef93395d13dcf200ff767050334fdb6fcc23ed6160279269498798699a5aba32cecea41a644c3e6185c7ec5bcf2df6189a87a7
7
- data.tar.gz: 9460622f7c3a6ef003162c34ebe9b8e567d0259c8e14b1cc57f60c1f0f37dba0f5b4dbbf2f915b7188d90f157a8374a04da4a00a823b9d6aa367f52287678ecb
6
+ metadata.gz: f2c3af14aab64f95007c0142ef412f8ebfd9e805aaf78eaabbee3711dc717c1429d35896bbe2af27de63d4b25815aad83f9e1acddac890169ffccdafe62f3424
7
+ data.tar.gz: 6f5436762419b277cf105edb9372eebba7d0d8c32690c8f07fc6edb3a5d8966d81c093a37000104f0375968ec061ab29acfc90e5a18107454e7d97bf139cc2a6
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.150.0 (2026-05-19)
5
+ ------------------
6
+
7
+ * Feature - Adding support for exposure and vulnerability context from AWS Security Hub in GuardDuty Extended Threat Detection attack sequence findings.
8
+
4
9
  1.149.0 (2026-05-13)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.149.0
1
+ 1.150.0
@@ -2476,11 +2476,10 @@ module Aws::GuardDuty
2476
2476
  end
2477
2477
 
2478
2478
  # Creates a new threat entity set. In a threat entity set, you can
2479
- # provide known malicious IP addresses and domains for your Amazon Web
2480
- # Services environment. GuardDuty generates findings based on the
2481
- # entries in the threat entity sets. Only users of the administrator
2482
- # account can manage entity sets, which automatically apply to member
2483
- # accounts.
2479
+ # provide known malicious threat entities for your Amazon Web Services
2480
+ # environment. GuardDuty generates findings based on the entries in the
2481
+ # threat entity sets. Only users of the administrator account can manage
2482
+ # entity sets, which automatically apply to member accounts.
2484
2483
  #
2485
2484
  # @option params [required, String] :detector_id
2486
2485
  # The unique ID of the detector of the GuardDuty account for which you
@@ -4457,12 +4456,12 @@ module Aws::GuardDuty
4457
4456
  # resp.findings[0].service.detection.sequence.signals[0].endpoint_ids #=> Array
4458
4457
  # resp.findings[0].service.detection.sequence.signals[0].endpoint_ids[0] #=> String
4459
4458
  # resp.findings[0].service.detection.sequence.signals[0].signal_indicators #=> Array
4460
- # resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE"
4459
+ # resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE", "VULNERABILITY", "MALICIOUS_PACKAGE", "MISCONFIGURATION", "REACHABILITY", "SENSITIVE_DATA"
4461
4460
  # resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].values #=> Array
4462
4461
  # resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].values[0] #=> String
4463
4462
  # resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].title #=> String
4464
4463
  # resp.findings[0].service.detection.sequence.sequence_indicators #=> Array
4465
- # resp.findings[0].service.detection.sequence.sequence_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE"
4464
+ # resp.findings[0].service.detection.sequence.sequence_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE", "VULNERABILITY", "MALICIOUS_PACKAGE", "MISCONFIGURATION", "REACHABILITY", "SENSITIVE_DATA"
4466
4465
  # resp.findings[0].service.detection.sequence.sequence_indicators[0].values #=> Array
4467
4466
  # resp.findings[0].service.detection.sequence.sequence_indicators[0].values[0] #=> String
4468
4467
  # resp.findings[0].service.detection.sequence.sequence_indicators[0].title #=> String
@@ -8965,7 +8964,7 @@ module Aws::GuardDuty
8965
8964
  tracer: tracer
8966
8965
  )
8967
8966
  context[:gem_name] = 'aws-sdk-guardduty'
8968
- context[:gem_version] = '1.149.0'
8967
+ context[:gem_version] = '1.150.0'
8969
8968
  Seahorse::Client::Request.new(handlers, context)
8970
8969
  end
8971
8970
 
@@ -54,7 +54,7 @@ module Aws::GuardDuty
54
54
  autoload :EndpointProvider, 'aws-sdk-guardduty/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-guardduty/endpoints'
56
56
 
57
- GEM_VERSION = '1.149.0'
57
+ GEM_VERSION = '1.150.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -120,33 +120,10 @@ module Aws
120
120
  enable: bool,
121
121
  ?client_token: ::String,
122
122
  ?finding_publishing_frequency: ("FIFTEEN_MINUTES" | "ONE_HOUR" | "SIX_HOURS"),
123
- ?data_sources: {
124
- s3_logs: {
125
- enable: bool
126
- }?,
127
- kubernetes: {
128
- audit_logs: {
129
- enable: bool
130
- }
131
- }?,
132
- malware_protection: {
133
- scan_ec2_instance_with_findings: {
134
- ebs_volumes: bool?
135
- }?
136
- }?
137
- },
123
+ ?data_sources: Params::data_source_configurations,
138
124
  ?tags: Hash[::String, ::String],
139
125
  ?features: Array[
140
- {
141
- name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
142
- status: ("ENABLED" | "DISABLED")?,
143
- additional_configuration: Array[
144
- {
145
- name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
146
- status: ("ENABLED" | "DISABLED")?
147
- },
148
- ]?
149
- },
126
+ Params::detector_feature_configuration
150
127
  ]
151
128
  ) -> _CreateDetectorResponseSuccess
152
129
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateDetectorResponseSuccess
@@ -162,24 +139,7 @@ module Aws
162
139
  ?description: ::String,
163
140
  ?action: ("NOOP" | "ARCHIVE"),
164
141
  ?rank: ::Integer,
165
- finding_criteria: {
166
- criterion: Hash[::String, {
167
- eq: Array[::String]?,
168
- neq: Array[::String]?,
169
- gt: ::Integer?,
170
- gte: ::Integer?,
171
- lt: ::Integer?,
172
- lte: ::Integer?,
173
- equals: Array[::String]?,
174
- not_equals: Array[::String]?,
175
- greater_than: ::Integer?,
176
- greater_than_or_equal: ::Integer?,
177
- less_than: ::Integer?,
178
- less_than_or_equal: ::Integer?,
179
- matches: Array[::String]?,
180
- not_matches: Array[::String]?
181
- }]?
182
- },
142
+ finding_criteria: Params::finding_criteria,
183
143
  ?client_token: ::String,
184
144
  ?tags: Hash[::String, ::String]
185
145
  ) -> _CreateFilterResponseSuccess
@@ -236,7 +196,7 @@ module Aws
236
196
  {
237
197
  account_id: ::String,
238
198
  email: ::String
239
- },
199
+ }
240
200
  ]
241
201
  ) -> _CreateMembersResponseSuccess
242
202
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateMembersResponseSuccess
@@ -444,7 +404,7 @@ module Aws
444
404
  greater_than: ::Integer?,
445
405
  less_than: ::Integer?
446
406
  }?
447
- },
407
+ }
448
408
  ]?
449
409
  },
450
410
  ?sort_criteria: {
@@ -551,17 +511,7 @@ module Aws
551
511
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/GuardDuty/Client.html#get_coverage_statistics-instance_method
552
512
  def get_coverage_statistics: (
553
513
  detector_id: ::String,
554
- ?filter_criteria: {
555
- filter_criterion: Array[
556
- {
557
- criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
558
- filter_condition: {
559
- equals: Array[::String]?,
560
- not_equals: Array[::String]?
561
- }?
562
- },
563
- ]?
564
- },
514
+ ?filter_criteria: Params::coverage_filter_criteria,
565
515
  statistics_type: Array[("COUNT_BY_RESOURCE_TYPE" | "COUNT_BY_COVERAGE_STATUS")]
566
516
  ) -> _GetCoverageStatisticsResponseSuccess
567
517
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _GetCoverageStatisticsResponseSuccess
@@ -623,24 +573,7 @@ module Aws
623
573
  def get_findings_statistics: (
624
574
  detector_id: ::String,
625
575
  ?finding_statistic_types: Array[("COUNT_BY_SEVERITY")],
626
- ?finding_criteria: {
627
- criterion: Hash[::String, {
628
- eq: Array[::String]?,
629
- neq: Array[::String]?,
630
- gt: ::Integer?,
631
- gte: ::Integer?,
632
- lt: ::Integer?,
633
- lte: ::Integer?,
634
- equals: Array[::String]?,
635
- not_equals: Array[::String]?,
636
- greater_than: ::Integer?,
637
- greater_than_or_equal: ::Integer?,
638
- less_than: ::Integer?,
639
- less_than_or_equal: ::Integer?,
640
- matches: Array[::String]?,
641
- not_matches: Array[::String]?
642
- }]?
643
- },
576
+ ?finding_criteria: Params::finding_criteria,
644
577
  ?group_by: ("ACCOUNT" | "DATE" | "FINDING_TYPE" | "RESOURCE" | "SEVERITY"),
645
578
  ?order_by: ("ASC" | "DESC"),
646
579
  ?max_results: ::Integer
@@ -878,17 +811,7 @@ module Aws
878
811
  detector_id: ::String,
879
812
  ?next_token: ::String,
880
813
  ?max_results: ::Integer,
881
- ?filter_criteria: {
882
- filter_criterion: Array[
883
- {
884
- criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
885
- filter_condition: {
886
- equals: Array[::String]?,
887
- not_equals: Array[::String]?
888
- }?
889
- },
890
- ]?
891
- },
814
+ ?filter_criteria: Params::coverage_filter_criteria,
892
815
  ?sort_criteria: {
893
816
  attribute_name: ("ACCOUNT_ID" | "COVERAGE_STATUS" | "ISSUE" | "ADDON_VERSION" | "UPDATED_AT" | "CLUSTER_NAME" | "EKS_CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "INSTANCE_ID")?,
894
817
  order_by: ("ASC" | "DESC")?
@@ -929,24 +852,7 @@ module Aws
929
852
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/GuardDuty/Client.html#list_findings-instance_method
930
853
  def list_findings: (
931
854
  detector_id: ::String,
932
- ?finding_criteria: {
933
- criterion: Hash[::String, {
934
- eq: Array[::String]?,
935
- neq: Array[::String]?,
936
- gt: ::Integer?,
937
- gte: ::Integer?,
938
- lt: ::Integer?,
939
- lte: ::Integer?,
940
- equals: Array[::String]?,
941
- not_equals: Array[::String]?,
942
- greater_than: ::Integer?,
943
- greater_than_or_equal: ::Integer?,
944
- less_than: ::Integer?,
945
- less_than_or_equal: ::Integer?,
946
- matches: Array[::String]?,
947
- not_matches: Array[::String]?
948
- }]?
949
- },
855
+ ?finding_criteria: Params::finding_criteria,
950
856
  ?sort_criteria: {
951
857
  attribute_name: ::String?,
952
858
  order_by: ("ASC" | "DESC")?
@@ -1010,7 +916,7 @@ module Aws
1010
916
  greater_than: ::Integer?,
1011
917
  less_than: ::Integer?
1012
918
  }?
1013
- },
919
+ }
1014
920
  ]?
1015
921
  },
1016
922
  ?sort_criteria: {
@@ -1201,32 +1107,9 @@ module Aws
1201
1107
  detector_id: ::String,
1202
1108
  ?enable: bool,
1203
1109
  ?finding_publishing_frequency: ("FIFTEEN_MINUTES" | "ONE_HOUR" | "SIX_HOURS"),
1204
- ?data_sources: {
1205
- s3_logs: {
1206
- enable: bool
1207
- }?,
1208
- kubernetes: {
1209
- audit_logs: {
1210
- enable: bool
1211
- }
1212
- }?,
1213
- malware_protection: {
1214
- scan_ec2_instance_with_findings: {
1215
- ebs_volumes: bool?
1216
- }?
1217
- }?
1218
- },
1110
+ ?data_sources: Params::data_source_configurations,
1219
1111
  ?features: Array[
1220
- {
1221
- name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
1222
- status: ("ENABLED" | "DISABLED")?,
1223
- additional_configuration: Array[
1224
- {
1225
- name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
1226
- status: ("ENABLED" | "DISABLED")?
1227
- },
1228
- ]?
1229
- },
1112
+ Params::detector_feature_configuration
1230
1113
  ]
1231
1114
  ) -> _UpdateDetectorResponseSuccess
1232
1115
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateDetectorResponseSuccess
@@ -1242,24 +1125,7 @@ module Aws
1242
1125
  ?description: ::String,
1243
1126
  ?action: ("NOOP" | "ARCHIVE"),
1244
1127
  ?rank: ::Integer,
1245
- ?finding_criteria: {
1246
- criterion: Hash[::String, {
1247
- eq: Array[::String]?,
1248
- neq: Array[::String]?,
1249
- gt: ::Integer?,
1250
- gte: ::Integer?,
1251
- lt: ::Integer?,
1252
- lte: ::Integer?,
1253
- equals: Array[::String]?,
1254
- not_equals: Array[::String]?,
1255
- greater_than: ::Integer?,
1256
- greater_than_or_equal: ::Integer?,
1257
- less_than: ::Integer?,
1258
- less_than_or_equal: ::Integer?,
1259
- matches: Array[::String]?,
1260
- not_matches: Array[::String]?
1261
- }]?
1262
- }
1128
+ ?finding_criteria: Params::finding_criteria
1263
1129
  ) -> _UpdateFilterResponseSuccess
1264
1130
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFilterResponseSuccess
1265
1131
 
@@ -1318,7 +1184,7 @@ module Aws
1318
1184
  {
1319
1185
  key: ::String,
1320
1186
  value: ::String?
1321
- },
1187
+ }
1322
1188
  ]
1323
1189
  }]?,
1324
1190
  exclude: Hash[("EC2_INSTANCE_TAG"), {
@@ -1326,7 +1192,7 @@ module Aws
1326
1192
  {
1327
1193
  key: ::String,
1328
1194
  value: ::String?
1329
- },
1195
+ }
1330
1196
  ]
1331
1197
  }]?
1332
1198
  },
@@ -1342,21 +1208,7 @@ module Aws
1342
1208
  def update_member_detectors: (
1343
1209
  detector_id: ::String,
1344
1210
  account_ids: Array[::String],
1345
- ?data_sources: {
1346
- s3_logs: {
1347
- enable: bool
1348
- }?,
1349
- kubernetes: {
1350
- audit_logs: {
1351
- enable: bool
1352
- }
1353
- }?,
1354
- malware_protection: {
1355
- scan_ec2_instance_with_findings: {
1356
- ebs_volumes: bool?
1357
- }?
1358
- }?
1359
- },
1211
+ ?data_sources: Params::data_source_configurations,
1360
1212
  ?features: Array[
1361
1213
  {
1362
1214
  name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
@@ -1365,9 +1217,9 @@ module Aws
1365
1217
  {
1366
1218
  name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
1367
1219
  status: ("ENABLED" | "DISABLED")?
1368
- },
1220
+ }
1369
1221
  ]?
1370
- },
1222
+ }
1371
1223
  ]
1372
1224
  ) -> _UpdateMemberDetectorsResponseSuccess
1373
1225
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateMemberDetectorsResponseSuccess
@@ -1404,9 +1256,9 @@ module Aws
1404
1256
  {
1405
1257
  name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
1406
1258
  auto_enable: ("NEW" | "NONE" | "ALL")?
1407
- },
1259
+ }
1408
1260
  ]?
1409
- },
1261
+ }
1410
1262
  ],
1411
1263
  ?auto_enable_organization_members: ("NEW" | "ALL" | "NONE")
1412
1264
  ) -> _UpdateOrganizationConfigurationResponseSuccess
data/sig/params.rbs ADDED
@@ -0,0 +1,73 @@
1
+ # WARNING ABOUT GENERATED CODE
2
+ #
3
+ # This file is generated. See the contributing guide for more information:
4
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
5
+ #
6
+ # WARNING ABOUT GENERATED CODE
7
+
8
+ module Aws
9
+ module GuardDuty
10
+ module Params
11
+ type data_source_configurations = {
12
+ s3_logs: {
13
+ enable: bool
14
+ }?,
15
+ kubernetes: {
16
+ audit_logs: {
17
+ enable: bool
18
+ }
19
+ }?,
20
+ malware_protection: {
21
+ scan_ec2_instance_with_findings: {
22
+ ebs_volumes: bool?
23
+ }?
24
+ }?
25
+ }
26
+
27
+ type detector_feature_configuration = {
28
+ name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
29
+ status: ("ENABLED" | "DISABLED")?,
30
+ additional_configuration: Array[
31
+ {
32
+ name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
33
+ status: ("ENABLED" | "DISABLED")?
34
+ }
35
+ ]?
36
+ }
37
+
38
+ type finding_criteria = {
39
+ criterion: Hash[::String, Params::condition]?
40
+ }
41
+
42
+ type condition = {
43
+ eq: Array[::String]?,
44
+ neq: Array[::String]?,
45
+ gt: ::Integer?,
46
+ gte: ::Integer?,
47
+ lt: ::Integer?,
48
+ lte: ::Integer?,
49
+ equals: Array[::String]?,
50
+ not_equals: Array[::String]?,
51
+ greater_than: ::Integer?,
52
+ greater_than_or_equal: ::Integer?,
53
+ less_than: ::Integer?,
54
+ less_than_or_equal: ::Integer?,
55
+ matches: Array[::String]?,
56
+ not_matches: Array[::String]?
57
+ }
58
+
59
+ type coverage_filter_criteria = {
60
+ filter_criterion: Array[
61
+ {
62
+ criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
63
+ filter_condition: {
64
+ equals: Array[::String]?,
65
+ not_equals: Array[::String]?
66
+ }?
67
+ }
68
+ ]?
69
+ }
70
+
71
+ end
72
+ end
73
+ end
data/sig/types.rbs CHANGED
@@ -1380,7 +1380,7 @@ module Aws::GuardDuty
1380
1380
  end
1381
1381
 
1382
1382
  class Indicator
1383
- attr_accessor key: ("SUSPICIOUS_USER_AGENT" | "SUSPICIOUS_NETWORK" | "MALICIOUS_IP" | "TOR_IP" | "ATTACK_TACTIC" | "HIGH_RISK_API" | "ATTACK_TECHNIQUE" | "UNUSUAL_API_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_USER" | "SUSPICIOUS_PROCESS" | "MALICIOUS_DOMAIN" | "MALICIOUS_PROCESS" | "CRYPTOMINING_IP" | "CRYPTOMINING_DOMAIN" | "CRYPTOMINING_PROCESS" | "MALICIOUS_FILE")
1383
+ attr_accessor key: ("SUSPICIOUS_USER_AGENT" | "SUSPICIOUS_NETWORK" | "MALICIOUS_IP" | "TOR_IP" | "ATTACK_TACTIC" | "HIGH_RISK_API" | "ATTACK_TECHNIQUE" | "UNUSUAL_API_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_USER" | "SUSPICIOUS_PROCESS" | "MALICIOUS_DOMAIN" | "MALICIOUS_PROCESS" | "CRYPTOMINING_IP" | "CRYPTOMINING_DOMAIN" | "CRYPTOMINING_PROCESS" | "MALICIOUS_FILE" | "VULNERABILITY" | "MALICIOUS_PACKAGE" | "MISCONFIGURATION" | "REACHABILITY" | "SENSITIVE_DATA")
1384
1384
  attr_accessor values: ::Array[::String]
1385
1385
  attr_accessor title: ::String
1386
1386
  SENSITIVE: []
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-guardduty
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.149.0
4
+ version: 1.150.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
@@ -67,6 +67,7 @@ files:
67
67
  - lib/aws-sdk-guardduty/types.rb
68
68
  - sig/client.rbs
69
69
  - sig/errors.rbs
70
+ - sig/params.rbs
70
71
  - sig/resource.rbs
71
72
  - sig/types.rbs
72
73
  - sig/waiters.rbs