@aws-sdk/client-fms 3.565.0 → 3.567.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js
CHANGED
|
@@ -88,6 +88,7 @@ __export(src_exports, {
|
|
|
88
88
|
ResourceSetStatus: () => ResourceSetStatus,
|
|
89
89
|
RuleOrder: () => RuleOrder,
|
|
90
90
|
SecurityServiceType: () => SecurityServiceType,
|
|
91
|
+
StreamExceptionPolicy: () => StreamExceptionPolicy,
|
|
91
92
|
TagResourceCommand: () => TagResourceCommand,
|
|
92
93
|
TargetType: () => TargetType,
|
|
93
94
|
ThirdPartyFirewall: () => ThirdPartyFirewall,
|
|
@@ -528,6 +529,12 @@ var RuleOrder = {
|
|
|
528
529
|
DEFAULT_ACTION_ORDER: "DEFAULT_ACTION_ORDER",
|
|
529
530
|
STRICT_ORDER: "STRICT_ORDER"
|
|
530
531
|
};
|
|
532
|
+
var StreamExceptionPolicy = {
|
|
533
|
+
CONTINUE: "CONTINUE",
|
|
534
|
+
DROP: "DROP",
|
|
535
|
+
FMS_IGNORE: "FMS_IGNORE",
|
|
536
|
+
REJECT: "REJECT"
|
|
537
|
+
};
|
|
531
538
|
var NetworkFirewallOverrideAction = {
|
|
532
539
|
DROP_TO_ALERT: "DROP_TO_ALERT"
|
|
533
540
|
};
|
|
@@ -2551,6 +2558,7 @@ var paginateListThirdPartyFirewallFirewallPolicies = (0, import_core.createPagin
|
|
|
2551
2558
|
DestinationType,
|
|
2552
2559
|
TargetType,
|
|
2553
2560
|
RuleOrder,
|
|
2561
|
+
StreamExceptionPolicy,
|
|
2554
2562
|
NetworkFirewallOverrideAction,
|
|
2555
2563
|
PolicyComplianceStatusType
|
|
2556
2564
|
});
|
|
@@ -219,6 +219,12 @@ export const RuleOrder = {
|
|
|
219
219
|
DEFAULT_ACTION_ORDER: "DEFAULT_ACTION_ORDER",
|
|
220
220
|
STRICT_ORDER: "STRICT_ORDER",
|
|
221
221
|
};
|
|
222
|
+
export const StreamExceptionPolicy = {
|
|
223
|
+
CONTINUE: "CONTINUE",
|
|
224
|
+
DROP: "DROP",
|
|
225
|
+
FMS_IGNORE: "FMS_IGNORE",
|
|
226
|
+
REJECT: "REJECT",
|
|
227
|
+
};
|
|
222
228
|
export const NetworkFirewallOverrideAction = {
|
|
223
229
|
DROP_TO_ALERT: "DROP_TO_ALERT",
|
|
224
230
|
};
|
|
@@ -146,6 +146,7 @@ declare const GetViolationDetailsCommand_base: {
|
|
|
146
146
|
* // ],
|
|
147
147
|
* // StatefulEngineOptions: { // StatefulEngineOptions
|
|
148
148
|
* // RuleOrder: "STRICT_ORDER" || "DEFAULT_ACTION_ORDER",
|
|
149
|
+
* // StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT" || "FMS_IGNORE",
|
|
149
150
|
* // },
|
|
150
151
|
* // },
|
|
151
152
|
* // ExpectedPolicyDescription: {
|
|
@@ -174,6 +175,7 @@ declare const GetViolationDetailsCommand_base: {
|
|
|
174
175
|
* // StatefulDefaultActions: "<NetworkFirewallActionList>",
|
|
175
176
|
* // StatefulEngineOptions: {
|
|
176
177
|
* // RuleOrder: "STRICT_ORDER" || "DEFAULT_ACTION_ORDER",
|
|
178
|
+
* // StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT" || "FMS_IGNORE",
|
|
177
179
|
* // },
|
|
178
180
|
* // },
|
|
179
181
|
* // },
|
|
@@ -1061,10 +1061,10 @@ export type NetworkAclRuleAction = (typeof NetworkAclRuleAction)[keyof typeof Ne
|
|
|
1061
1061
|
* <p>Describes a rule in a network ACL.</p>
|
|
1062
1062
|
* <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
|
|
1063
1063
|
* whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
|
|
1064
|
-
*
|
|
1064
|
+
* entries in the network ACL according to the rule numbers, in ascending order. </p>
|
|
1065
1065
|
* <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
|
|
1066
|
-
*
|
|
1067
|
-
*
|
|
1066
|
+
* you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
|
|
1067
|
+
* that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
|
|
1068
1068
|
* @public
|
|
1069
1069
|
*/
|
|
1070
1070
|
export interface NetworkAclEntry {
|
|
@@ -1116,16 +1116,17 @@ export interface NetworkAclEntrySet {
|
|
|
1116
1116
|
* <p>Provide these in the order in which you want them to run. Firewall Manager will assign
|
|
1117
1117
|
* the specific rule numbers for you, in the network ACLs that it creates. </p>
|
|
1118
1118
|
* </note>
|
|
1119
|
+
* <p>You must specify at least one first entry or one last entry in any network ACL policy. </p>
|
|
1119
1120
|
* @public
|
|
1120
1121
|
*/
|
|
1121
1122
|
FirstEntries?: NetworkAclEntry[];
|
|
1122
1123
|
/**
|
|
1123
1124
|
* <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
|
|
1124
|
-
*
|
|
1125
|
+
* violations that involve conflicts between the custom entries and the policy entries. </p>
|
|
1125
1126
|
* <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
|
|
1126
|
-
*
|
|
1127
|
-
*
|
|
1128
|
-
*
|
|
1127
|
+
* remediate. For more information about the remediation behavior, see
|
|
1128
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
|
|
1129
|
+
* in the <i>Firewall Manager Developer Guide</i>.</p>
|
|
1129
1130
|
* @public
|
|
1130
1131
|
*/
|
|
1131
1132
|
ForceRemediateForFirstEntries: boolean | undefined;
|
|
@@ -1135,16 +1136,17 @@ export interface NetworkAclEntrySet {
|
|
|
1135
1136
|
* <p>Provide these in the order in which you want them to run. Firewall Manager will assign
|
|
1136
1137
|
* the specific rule numbers for you, in the network ACLs that it creates. </p>
|
|
1137
1138
|
* </note>
|
|
1139
|
+
* <p>You must specify at least one first entry or one last entry in any network ACL policy. </p>
|
|
1138
1140
|
* @public
|
|
1139
1141
|
*/
|
|
1140
1142
|
LastEntries?: NetworkAclEntry[];
|
|
1141
1143
|
/**
|
|
1142
1144
|
* <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
|
|
1143
|
-
*
|
|
1145
|
+
* violations that involve conflicts between the custom entries and the policy entries. </p>
|
|
1144
1146
|
* <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
|
|
1145
|
-
*
|
|
1146
|
-
*
|
|
1147
|
-
*
|
|
1147
|
+
* remediate. For more information about the remediation behavior, see
|
|
1148
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
|
|
1149
|
+
* in the <i>Firewall Manager Developer Guide</i>.</p>
|
|
1148
1150
|
* @public
|
|
1149
1151
|
*/
|
|
1150
1152
|
ForceRemediateForLastEntries: boolean | undefined;
|
|
@@ -1597,8 +1599,8 @@ export interface Policy {
|
|
|
1597
1599
|
RemediationEnabled: boolean | undefined;
|
|
1598
1600
|
/**
|
|
1599
1601
|
* <p>Indicates whether Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources
|
|
1600
|
-
*
|
|
1601
|
-
*
|
|
1602
|
+
* that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL
|
|
1603
|
+
* from a protected customer resource when the customer resource leaves policy scope. </p>
|
|
1602
1604
|
* <p>By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. </p>
|
|
1603
1605
|
* <p>This option is not available for Shield Advanced or WAF Classic policies.</p>
|
|
1604
1606
|
* @public
|
|
@@ -2379,10 +2381,10 @@ export interface EntryDescription {
|
|
|
2379
2381
|
* <p>Describes a rule in a network ACL.</p>
|
|
2380
2382
|
* <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
|
|
2381
2383
|
* whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
|
|
2382
|
-
*
|
|
2384
|
+
* entries in the network ACL according to the rule numbers, in ascending order. </p>
|
|
2383
2385
|
* <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
|
|
2384
|
-
*
|
|
2385
|
-
*
|
|
2386
|
+
* you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
|
|
2387
|
+
* that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
|
|
2386
2388
|
* @public
|
|
2387
2389
|
*/
|
|
2388
2390
|
EntryDetail?: NetworkAclEntry;
|
|
@@ -2888,6 +2890,20 @@ export declare const RuleOrder: {
|
|
|
2888
2890
|
* @public
|
|
2889
2891
|
*/
|
|
2890
2892
|
export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
|
|
2893
|
+
/**
|
|
2894
|
+
* @public
|
|
2895
|
+
* @enum
|
|
2896
|
+
*/
|
|
2897
|
+
export declare const StreamExceptionPolicy: {
|
|
2898
|
+
readonly CONTINUE: "CONTINUE";
|
|
2899
|
+
readonly DROP: "DROP";
|
|
2900
|
+
readonly FMS_IGNORE: "FMS_IGNORE";
|
|
2901
|
+
readonly REJECT: "REJECT";
|
|
2902
|
+
};
|
|
2903
|
+
/**
|
|
2904
|
+
* @public
|
|
2905
|
+
*/
|
|
2906
|
+
export type StreamExceptionPolicy = (typeof StreamExceptionPolicy)[keyof typeof StreamExceptionPolicy];
|
|
2891
2907
|
/**
|
|
2892
2908
|
* <p>Configuration settings for the handling of the stateful rule groups in a Network Firewall firewall policy.</p>
|
|
2893
2909
|
* @public
|
|
@@ -2895,12 +2911,43 @@ export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
|
|
|
2895
2911
|
export interface StatefulEngineOptions {
|
|
2896
2912
|
/**
|
|
2897
2913
|
* <p>Indicates how to manage the order of stateful rule evaluation for the policy.
|
|
2898
|
-
*
|
|
2914
|
+
* Stateful rules are provided to the rule engine
|
|
2899
2915
|
* as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more
|
|
2900
2916
|
* information, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2917
|
+
* <p>Default: <code>DEFAULT_ACTION_ORDER</code>
|
|
2918
|
+
* </p>
|
|
2901
2919
|
* @public
|
|
2902
2920
|
*/
|
|
2903
2921
|
RuleOrder?: RuleOrder;
|
|
2922
|
+
/**
|
|
2923
|
+
* <p>Indicates how Network Firewall should handle traffic when a network connection breaks midstream.</p>
|
|
2924
|
+
* <ul>
|
|
2925
|
+
* <li>
|
|
2926
|
+
* <p>
|
|
2927
|
+
* <code>DROP</code> - Fail closed and drop all subsequent traffic going to the firewall.</p>
|
|
2928
|
+
* </li>
|
|
2929
|
+
* <li>
|
|
2930
|
+
* <p>
|
|
2931
|
+
* <code>CONTINUE</code> - Continue to apply rules to subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on context. For example, with a stateful rule that drops HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the context from session initialization, which defines the application layer protocol as HTTP. However, a TCP-layer rule using a <code>flow:stateless</code> rule would still match, and so would the <code>aws:drop_strict</code> default action. </p>
|
|
2932
|
+
* </li>
|
|
2933
|
+
* <li>
|
|
2934
|
+
* <p>
|
|
2935
|
+
* <code>REJECT</code> - Fail closed and drop all subsequent traffic going to the firewall. With this option, Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish a new session. With the new session, Network Firewall will have context and will apply rules appropriately.</p>
|
|
2936
|
+
* <p>For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting. </p>
|
|
2937
|
+
* </li>
|
|
2938
|
+
* <li>
|
|
2939
|
+
* <p>
|
|
2940
|
+
* <code>FMS_IGNORE</code> - Firewall Manager doesn't monitor or modify the Network Firewall stream exception policy settings. </p>
|
|
2941
|
+
* </li>
|
|
2942
|
+
* </ul>
|
|
2943
|
+
* <p>For more information, see
|
|
2944
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stream-exception-policy.html">Stream exception policy in your firewall policy</a>
|
|
2945
|
+
* in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2946
|
+
* <p>Default: <code>FMS_IGNORE</code>
|
|
2947
|
+
* </p>
|
|
2948
|
+
* @public
|
|
2949
|
+
*/
|
|
2950
|
+
StreamExceptionPolicy?: StreamExceptionPolicy;
|
|
2904
2951
|
}
|
|
2905
2952
|
/**
|
|
2906
2953
|
* @public
|
|
@@ -3896,15 +3943,15 @@ export interface GetViolationDetailsResponse {
|
|
|
3896
3943
|
export interface ListAdminAccountsForOrganizationRequest {
|
|
3897
3944
|
/**
|
|
3898
3945
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
3899
|
-
*
|
|
3900
|
-
*
|
|
3946
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
3947
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
3901
3948
|
* @public
|
|
3902
3949
|
*/
|
|
3903
3950
|
NextToken?: string;
|
|
3904
3951
|
/**
|
|
3905
3952
|
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
3906
|
-
*
|
|
3907
|
-
*
|
|
3953
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
3954
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
3908
3955
|
* @public
|
|
3909
3956
|
*/
|
|
3910
3957
|
MaxResults?: number;
|
|
@@ -3920,8 +3967,8 @@ export interface ListAdminAccountsForOrganizationResponse {
|
|
|
3920
3967
|
AdminAccounts?: AdminAccountSummary[];
|
|
3921
3968
|
/**
|
|
3922
3969
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
3923
|
-
*
|
|
3924
|
-
*
|
|
3970
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
3971
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
3925
3972
|
* @public
|
|
3926
3973
|
*/
|
|
3927
3974
|
NextToken?: string;
|
|
@@ -3932,15 +3979,15 @@ export interface ListAdminAccountsForOrganizationResponse {
|
|
|
3932
3979
|
export interface ListAdminsManagingAccountRequest {
|
|
3933
3980
|
/**
|
|
3934
3981
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
3935
|
-
*
|
|
3936
|
-
*
|
|
3982
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
3983
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
3937
3984
|
* @public
|
|
3938
3985
|
*/
|
|
3939
3986
|
NextToken?: string;
|
|
3940
3987
|
/**
|
|
3941
3988
|
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
3942
|
-
*
|
|
3943
|
-
*
|
|
3989
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
3990
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
3944
3991
|
* @public
|
|
3945
3992
|
*/
|
|
3946
3993
|
MaxResults?: number;
|
|
@@ -3956,8 +4003,8 @@ export interface ListAdminsManagingAccountResponse {
|
|
|
3956
4003
|
AdminAccounts?: string[];
|
|
3957
4004
|
/**
|
|
3958
4005
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
3959
|
-
*
|
|
3960
|
-
*
|
|
4006
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4007
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
3961
4008
|
* @public
|
|
3962
4009
|
*/
|
|
3963
4010
|
NextToken?: string;
|
|
@@ -4153,15 +4200,15 @@ export interface ListDiscoveredResourcesRequest {
|
|
|
4153
4200
|
ResourceType: string | undefined;
|
|
4154
4201
|
/**
|
|
4155
4202
|
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
4156
|
-
*
|
|
4157
|
-
*
|
|
4203
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
4204
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
4158
4205
|
* @public
|
|
4159
4206
|
*/
|
|
4160
4207
|
MaxResults?: number;
|
|
4161
4208
|
/**
|
|
4162
4209
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4163
|
-
*
|
|
4164
|
-
*
|
|
4210
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4211
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4165
4212
|
* @public
|
|
4166
4213
|
*/
|
|
4167
4214
|
NextToken?: string;
|
|
@@ -4203,8 +4250,8 @@ export interface ListDiscoveredResourcesResponse {
|
|
|
4203
4250
|
Items?: DiscoveredResource[];
|
|
4204
4251
|
/**
|
|
4205
4252
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4206
|
-
*
|
|
4207
|
-
*
|
|
4253
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4254
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4208
4255
|
* @public
|
|
4209
4256
|
*/
|
|
4210
4257
|
NextToken?: string;
|
|
@@ -4315,8 +4362,8 @@ export interface PolicySummary {
|
|
|
4315
4362
|
RemediationEnabled?: boolean;
|
|
4316
4363
|
/**
|
|
4317
4364
|
* <p>Indicates whether Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources
|
|
4318
|
-
*
|
|
4319
|
-
*
|
|
4365
|
+
* that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL
|
|
4366
|
+
* from a protected customer resource when the customer resource leaves policy scope. </p>
|
|
4320
4367
|
* <p>By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources. </p>
|
|
4321
4368
|
* <p>This option is not available for Shield Advanced or WAF Classic policies.</p>
|
|
4322
4369
|
* @public
|
|
@@ -4435,15 +4482,15 @@ export interface ListResourceSetResourcesRequest {
|
|
|
4435
4482
|
Identifier: string | undefined;
|
|
4436
4483
|
/**
|
|
4437
4484
|
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
4438
|
-
*
|
|
4439
|
-
*
|
|
4485
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
4486
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
4440
4487
|
* @public
|
|
4441
4488
|
*/
|
|
4442
4489
|
MaxResults?: number;
|
|
4443
4490
|
/**
|
|
4444
4491
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4445
|
-
*
|
|
4446
|
-
*
|
|
4492
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4493
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4447
4494
|
* @public
|
|
4448
4495
|
*/
|
|
4449
4496
|
NextToken?: string;
|
|
@@ -4475,8 +4522,8 @@ export interface ListResourceSetResourcesResponse {
|
|
|
4475
4522
|
Items: Resource[] | undefined;
|
|
4476
4523
|
/**
|
|
4477
4524
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4478
|
-
*
|
|
4479
|
-
*
|
|
4525
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4526
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4480
4527
|
* @public
|
|
4481
4528
|
*/
|
|
4482
4529
|
NextToken?: string;
|
|
@@ -4487,15 +4534,15 @@ export interface ListResourceSetResourcesResponse {
|
|
|
4487
4534
|
export interface ListResourceSetsRequest {
|
|
4488
4535
|
/**
|
|
4489
4536
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4490
|
-
*
|
|
4491
|
-
*
|
|
4537
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4538
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4492
4539
|
* @public
|
|
4493
4540
|
*/
|
|
4494
4541
|
NextToken?: string;
|
|
4495
4542
|
/**
|
|
4496
4543
|
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
4497
|
-
*
|
|
4498
|
-
*
|
|
4544
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
4545
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
4499
4546
|
* @public
|
|
4500
4547
|
*/
|
|
4501
4548
|
MaxResults?: number;
|
|
@@ -4552,8 +4599,8 @@ export interface ListResourceSetsResponse {
|
|
|
4552
4599
|
ResourceSets?: ResourceSetSummary[];
|
|
4553
4600
|
/**
|
|
4554
4601
|
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4555
|
-
*
|
|
4556
|
-
*
|
|
4602
|
+
* for retrieval exceeds the maximum you requested, Firewall Manager returns a <code>NextToken</code>
|
|
4603
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4557
4604
|
* @public
|
|
4558
4605
|
*/
|
|
4559
4606
|
NextToken?: string;
|
|
@@ -671,8 +671,17 @@ export declare const RuleOrder: {
|
|
|
671
671
|
readonly STRICT_ORDER: "STRICT_ORDER";
|
|
672
672
|
};
|
|
673
673
|
export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
|
|
674
|
+
export declare const StreamExceptionPolicy: {
|
|
675
|
+
readonly CONTINUE: "CONTINUE";
|
|
676
|
+
readonly DROP: "DROP";
|
|
677
|
+
readonly FMS_IGNORE: "FMS_IGNORE";
|
|
678
|
+
readonly REJECT: "REJECT";
|
|
679
|
+
};
|
|
680
|
+
export type StreamExceptionPolicy =
|
|
681
|
+
(typeof StreamExceptionPolicy)[keyof typeof StreamExceptionPolicy];
|
|
674
682
|
export interface StatefulEngineOptions {
|
|
675
683
|
RuleOrder?: RuleOrder;
|
|
684
|
+
StreamExceptionPolicy?: StreamExceptionPolicy;
|
|
676
685
|
}
|
|
677
686
|
export declare const NetworkFirewallOverrideAction: {
|
|
678
687
|
readonly DROP_TO_ALERT: "DROP_TO_ALERT";
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-fms",
|
|
3
3
|
"description": "AWS SDK for JavaScript Fms Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.567.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-fms",
|
|
@@ -20,17 +20,17 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
23
|
-
"@aws-sdk/core": "3.
|
|
24
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
-
"@aws-sdk/middleware-host-header": "3.
|
|
26
|
-
"@aws-sdk/middleware-logger": "3.
|
|
27
|
-
"@aws-sdk/middleware-recursion-detection": "3.
|
|
28
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
29
|
-
"@aws-sdk/region-config-resolver": "3.
|
|
30
|
-
"@aws-sdk/types": "3.
|
|
31
|
-
"@aws-sdk/util-endpoints": "3.
|
|
32
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
33
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
23
|
+
"@aws-sdk/core": "3.567.0",
|
|
24
|
+
"@aws-sdk/credential-provider-node": "3.567.0",
|
|
25
|
+
"@aws-sdk/middleware-host-header": "3.567.0",
|
|
26
|
+
"@aws-sdk/middleware-logger": "3.567.0",
|
|
27
|
+
"@aws-sdk/middleware-recursion-detection": "3.567.0",
|
|
28
|
+
"@aws-sdk/middleware-user-agent": "3.567.0",
|
|
29
|
+
"@aws-sdk/region-config-resolver": "3.567.0",
|
|
30
|
+
"@aws-sdk/types": "3.567.0",
|
|
31
|
+
"@aws-sdk/util-endpoints": "3.567.0",
|
|
32
|
+
"@aws-sdk/util-user-agent-browser": "3.567.0",
|
|
33
|
+
"@aws-sdk/util-user-agent-node": "3.567.0",
|
|
34
34
|
"@smithy/config-resolver": "^2.2.0",
|
|
35
35
|
"@smithy/core": "^1.4.2",
|
|
36
36
|
"@smithy/fetch-http-handler": "^2.5.0",
|
|
@@ -59,8 +59,7 @@
|
|
|
59
59
|
"tslib": "^2.6.2"
|
|
60
60
|
},
|
|
61
61
|
"devDependencies": {
|
|
62
|
-
"@
|
|
63
|
-
"@tsconfig/node14": "1.0.3",
|
|
62
|
+
"@tsconfig/node16": "16.1.3",
|
|
64
63
|
"@types/node": "^14.14.31",
|
|
65
64
|
"concurrently": "7.0.0",
|
|
66
65
|
"downlevel-dts": "0.10.1",
|
|
@@ -68,7 +67,7 @@
|
|
|
68
67
|
"typescript": "~4.9.5"
|
|
69
68
|
},
|
|
70
69
|
"engines": {
|
|
71
|
-
"node": ">=
|
|
70
|
+
"node": ">=16.0.0"
|
|
72
71
|
},
|
|
73
72
|
"typesVersions": {
|
|
74
73
|
"<4.0": {
|