@aws-sdk/client-fms 3.556.0 → 3.564.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +63 -1
- package/dist-es/models/models_0.js +16 -0
- package/dist-es/protocols/Aws_json1_1.js +43 -1
- package/dist-types/commands/GetAdminScopeCommand.d.ts +2 -2
- package/dist-types/commands/GetComplianceDetailCommand.d.ts +2 -23
- package/dist-types/commands/GetPolicyCommand.d.ts +41 -1
- package/dist-types/commands/GetProtectionStatusCommand.d.ts +1 -1
- package/dist-types/commands/GetViolationDetailsCommand.d.ts +147 -46
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -1
- package/dist-types/commands/PutAdminAccountCommand.d.ts +1 -1
- package/dist-types/commands/PutPolicyCommand.d.ts +93 -2
- package/dist-types/models/models_0.d.ts +426 -24
- package/dist-types/ts3.4/models/models_0.d.ts +97 -1
- package/package.json +2 -3
|
@@ -37,6 +37,11 @@ declare const PutPolicyCommand_base: {
|
|
|
37
37
|
* <ul>
|
|
38
38
|
* <li>
|
|
39
39
|
* <p>
|
|
40
|
+
* <b>WAF policy</b> - This policy applies WAF web ACL
|
|
41
|
+
* protections to specified accounts and resources. </p>
|
|
42
|
+
* </li>
|
|
43
|
+
* <li>
|
|
44
|
+
* <p>
|
|
40
45
|
* <b>Shield Advanced policy</b> - This policy applies Shield Advanced
|
|
41
46
|
* protection to specified accounts and resources. </p>
|
|
42
47
|
* </li>
|
|
@@ -48,6 +53,12 @@ declare const PutPolicyCommand_base: {
|
|
|
48
53
|
* </li>
|
|
49
54
|
* <li>
|
|
50
55
|
* <p>
|
|
56
|
+
* <b>Network ACL policy</b> - This type of policy gives you
|
|
57
|
+
* control over the network ACLs that are in use throughout your organization in
|
|
58
|
+
* Organizations and lets you enforce a baseline set of first and last network ACL rules across your organization. </p>
|
|
59
|
+
* </li>
|
|
60
|
+
* <li>
|
|
61
|
+
* <p>
|
|
51
62
|
* <b>Network Firewall policy</b> - This policy applies
|
|
52
63
|
* Network Firewall protection to your organization's VPCs. </p>
|
|
53
64
|
* </li>
|
|
@@ -84,7 +95,7 @@ declare const PutPolicyCommand_base: {
|
|
|
84
95
|
* PolicyName: "STRING_VALUE", // required
|
|
85
96
|
* PolicyUpdateToken: "STRING_VALUE",
|
|
86
97
|
* SecurityServicePolicyData: { // SecurityServicePolicyData
|
|
87
|
-
* Type: "WAF" || "WAFV2" || "SHIELD_ADVANCED" || "SECURITY_GROUPS_COMMON" || "SECURITY_GROUPS_CONTENT_AUDIT" || "SECURITY_GROUPS_USAGE_AUDIT" || "NETWORK_FIREWALL" || "DNS_FIREWALL" || "THIRD_PARTY_FIREWALL" || "IMPORT_NETWORK_FIREWALL", // required
|
|
98
|
+
* Type: "WAF" || "WAFV2" || "SHIELD_ADVANCED" || "SECURITY_GROUPS_COMMON" || "SECURITY_GROUPS_CONTENT_AUDIT" || "SECURITY_GROUPS_USAGE_AUDIT" || "NETWORK_FIREWALL" || "DNS_FIREWALL" || "THIRD_PARTY_FIREWALL" || "IMPORT_NETWORK_FIREWALL" || "NETWORK_ACL_COMMON", // required
|
|
88
99
|
* ManagedServiceData: "STRING_VALUE",
|
|
89
100
|
* PolicyOption: { // PolicyOption
|
|
90
101
|
* NetworkFirewallPolicy: { // NetworkFirewallPolicy
|
|
@@ -93,6 +104,46 @@ declare const PutPolicyCommand_base: {
|
|
|
93
104
|
* ThirdPartyFirewallPolicy: { // ThirdPartyFirewallPolicy
|
|
94
105
|
* FirewallDeploymentModel: "CENTRALIZED" || "DISTRIBUTED",
|
|
95
106
|
* },
|
|
107
|
+
* NetworkAclCommonPolicy: { // NetworkAclCommonPolicy
|
|
108
|
+
* NetworkAclEntrySet: { // NetworkAclEntrySet
|
|
109
|
+
* FirstEntries: [ // NetworkAclEntries
|
|
110
|
+
* { // NetworkAclEntry
|
|
111
|
+
* IcmpTypeCode: { // NetworkAclIcmpTypeCode
|
|
112
|
+
* Code: Number("int"),
|
|
113
|
+
* Type: Number("int"),
|
|
114
|
+
* },
|
|
115
|
+
* Protocol: "STRING_VALUE", // required
|
|
116
|
+
* PortRange: { // NetworkAclPortRange
|
|
117
|
+
* From: Number("int"),
|
|
118
|
+
* To: Number("int"),
|
|
119
|
+
* },
|
|
120
|
+
* CidrBlock: "STRING_VALUE",
|
|
121
|
+
* Ipv6CidrBlock: "STRING_VALUE",
|
|
122
|
+
* RuleAction: "allow" || "deny", // required
|
|
123
|
+
* Egress: true || false, // required
|
|
124
|
+
* },
|
|
125
|
+
* ],
|
|
126
|
+
* ForceRemediateForFirstEntries: true || false, // required
|
|
127
|
+
* LastEntries: [
|
|
128
|
+
* {
|
|
129
|
+
* IcmpTypeCode: {
|
|
130
|
+
* Code: Number("int"),
|
|
131
|
+
* Type: Number("int"),
|
|
132
|
+
* },
|
|
133
|
+
* Protocol: "STRING_VALUE", // required
|
|
134
|
+
* PortRange: {
|
|
135
|
+
* From: Number("int"),
|
|
136
|
+
* To: Number("int"),
|
|
137
|
+
* },
|
|
138
|
+
* CidrBlock: "STRING_VALUE",
|
|
139
|
+
* Ipv6CidrBlock: "STRING_VALUE",
|
|
140
|
+
* RuleAction: "allow" || "deny", // required
|
|
141
|
+
* Egress: true || false, // required
|
|
142
|
+
* },
|
|
143
|
+
* ],
|
|
144
|
+
* ForceRemediateForLastEntries: true || false, // required
|
|
145
|
+
* },
|
|
146
|
+
* },
|
|
96
147
|
* },
|
|
97
148
|
* },
|
|
98
149
|
* ResourceType: "STRING_VALUE", // required
|
|
@@ -139,7 +190,7 @@ declare const PutPolicyCommand_base: {
|
|
|
139
190
|
* // PolicyName: "STRING_VALUE", // required
|
|
140
191
|
* // PolicyUpdateToken: "STRING_VALUE",
|
|
141
192
|
* // SecurityServicePolicyData: { // SecurityServicePolicyData
|
|
142
|
-
* // Type: "WAF" || "WAFV2" || "SHIELD_ADVANCED" || "SECURITY_GROUPS_COMMON" || "SECURITY_GROUPS_CONTENT_AUDIT" || "SECURITY_GROUPS_USAGE_AUDIT" || "NETWORK_FIREWALL" || "DNS_FIREWALL" || "THIRD_PARTY_FIREWALL" || "IMPORT_NETWORK_FIREWALL", // required
|
|
193
|
+
* // Type: "WAF" || "WAFV2" || "SHIELD_ADVANCED" || "SECURITY_GROUPS_COMMON" || "SECURITY_GROUPS_CONTENT_AUDIT" || "SECURITY_GROUPS_USAGE_AUDIT" || "NETWORK_FIREWALL" || "DNS_FIREWALL" || "THIRD_PARTY_FIREWALL" || "IMPORT_NETWORK_FIREWALL" || "NETWORK_ACL_COMMON", // required
|
|
143
194
|
* // ManagedServiceData: "STRING_VALUE",
|
|
144
195
|
* // PolicyOption: { // PolicyOption
|
|
145
196
|
* // NetworkFirewallPolicy: { // NetworkFirewallPolicy
|
|
@@ -148,6 +199,46 @@ declare const PutPolicyCommand_base: {
|
|
|
148
199
|
* // ThirdPartyFirewallPolicy: { // ThirdPartyFirewallPolicy
|
|
149
200
|
* // FirewallDeploymentModel: "CENTRALIZED" || "DISTRIBUTED",
|
|
150
201
|
* // },
|
|
202
|
+
* // NetworkAclCommonPolicy: { // NetworkAclCommonPolicy
|
|
203
|
+
* // NetworkAclEntrySet: { // NetworkAclEntrySet
|
|
204
|
+
* // FirstEntries: [ // NetworkAclEntries
|
|
205
|
+
* // { // NetworkAclEntry
|
|
206
|
+
* // IcmpTypeCode: { // NetworkAclIcmpTypeCode
|
|
207
|
+
* // Code: Number("int"),
|
|
208
|
+
* // Type: Number("int"),
|
|
209
|
+
* // },
|
|
210
|
+
* // Protocol: "STRING_VALUE", // required
|
|
211
|
+
* // PortRange: { // NetworkAclPortRange
|
|
212
|
+
* // From: Number("int"),
|
|
213
|
+
* // To: Number("int"),
|
|
214
|
+
* // },
|
|
215
|
+
* // CidrBlock: "STRING_VALUE",
|
|
216
|
+
* // Ipv6CidrBlock: "STRING_VALUE",
|
|
217
|
+
* // RuleAction: "allow" || "deny", // required
|
|
218
|
+
* // Egress: true || false, // required
|
|
219
|
+
* // },
|
|
220
|
+
* // ],
|
|
221
|
+
* // ForceRemediateForFirstEntries: true || false, // required
|
|
222
|
+
* // LastEntries: [
|
|
223
|
+
* // {
|
|
224
|
+
* // IcmpTypeCode: {
|
|
225
|
+
* // Code: Number("int"),
|
|
226
|
+
* // Type: Number("int"),
|
|
227
|
+
* // },
|
|
228
|
+
* // Protocol: "STRING_VALUE", // required
|
|
229
|
+
* // PortRange: {
|
|
230
|
+
* // From: Number("int"),
|
|
231
|
+
* // To: Number("int"),
|
|
232
|
+
* // },
|
|
233
|
+
* // CidrBlock: "STRING_VALUE",
|
|
234
|
+
* // Ipv6CidrBlock: "STRING_VALUE",
|
|
235
|
+
* // RuleAction: "allow" || "deny", // required
|
|
236
|
+
* // Egress: true || false, // required
|
|
237
|
+
* // },
|
|
238
|
+
* // ],
|
|
239
|
+
* // ForceRemediateForLastEntries: true || false, // required
|
|
240
|
+
* // },
|
|
241
|
+
* // },
|
|
151
242
|
* // },
|
|
152
243
|
* // },
|
|
153
244
|
* // ResourceType: "STRING_VALUE", // required
|