@aws-sdk/client-fms 3.670.0 → 3.676.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +4 -1
- package/dist-es/models/models_0.js +1 -0
- package/dist-es/protocols/Aws_json1_1.js +2 -0
- package/dist-types/commands/GetComplianceDetailCommand.d.ts +1 -1
- package/dist-types/commands/GetViolationDetailsCommand.d.ts +10 -0
- package/dist-types/models/models_0.d.ts +52 -9
- package/dist-types/runtimeConfig.browser.d.ts +1 -1
- package/dist-types/runtimeConfig.native.d.ts +1 -1
- package/dist-types/ts3.4/models/models_0.d.ts +11 -0
- package/dist-types/ts3.4/runtimeConfig.browser.d.ts +3 -1
- package/dist-types/ts3.4/runtimeConfig.native.d.ts +3 -1
- package/package.json +5 -5
package/dist-cjs/index.js
CHANGED
|
@@ -442,6 +442,7 @@ var ViolationReason = {
|
|
|
442
442
|
TrafficInspectionCrossesAZBoundary: "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY",
|
|
443
443
|
UnexpectedFirewallRoutes: "UNEXPECTED_FIREWALL_ROUTES",
|
|
444
444
|
UnexpectedTargetGatewayRoutes: "UNEXPECTED_TARGET_GATEWAY_ROUTES",
|
|
445
|
+
WebACLConfigurationOrScopeOfUse: "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE",
|
|
445
446
|
WebAclMissingRuleGroup: "WEB_ACL_MISSING_RULE_GROUP"
|
|
446
447
|
};
|
|
447
448
|
var CustomerPolicyScopeIdType = {
|
|
@@ -1622,7 +1623,9 @@ var de_ResourceViolation = /* @__PURE__ */ __name((output, context) => {
|
|
|
1622
1623
|
RouteHasOutOfScopeEndpointViolation: import_smithy_client._json,
|
|
1623
1624
|
ThirdPartyFirewallMissingExpectedRouteTableViolation: import_smithy_client._json,
|
|
1624
1625
|
ThirdPartyFirewallMissingFirewallViolation: import_smithy_client._json,
|
|
1625
|
-
ThirdPartyFirewallMissingSubnetViolation: import_smithy_client._json
|
|
1626
|
+
ThirdPartyFirewallMissingSubnetViolation: import_smithy_client._json,
|
|
1627
|
+
WebACLHasIncompatibleConfigurationViolation: import_smithy_client._json,
|
|
1628
|
+
WebACLHasOutOfScopeResourcesViolation: import_smithy_client._json
|
|
1626
1629
|
});
|
|
1627
1630
|
}, "de_ResourceViolation");
|
|
1628
1631
|
var de_ResourceViolations = /* @__PURE__ */ __name((output, context) => {
|
|
@@ -144,6 +144,7 @@ export const ViolationReason = {
|
|
|
144
144
|
TrafficInspectionCrossesAZBoundary: "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY",
|
|
145
145
|
UnexpectedFirewallRoutes: "UNEXPECTED_FIREWALL_ROUTES",
|
|
146
146
|
UnexpectedTargetGatewayRoutes: "UNEXPECTED_TARGET_GATEWAY_ROUTES",
|
|
147
|
+
WebACLConfigurationOrScopeOfUse: "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE",
|
|
147
148
|
WebAclMissingRuleGroup: "WEB_ACL_MISSING_RULE_GROUP",
|
|
148
149
|
};
|
|
149
150
|
export const CustomerPolicyScopeIdType = {
|
|
@@ -1093,6 +1093,8 @@ const de_ResourceViolation = (output, context) => {
|
|
|
1093
1093
|
ThirdPartyFirewallMissingExpectedRouteTableViolation: _json,
|
|
1094
1094
|
ThirdPartyFirewallMissingFirewallViolation: _json,
|
|
1095
1095
|
ThirdPartyFirewallMissingSubnetViolation: _json,
|
|
1096
|
+
WebACLHasIncompatibleConfigurationViolation: _json,
|
|
1097
|
+
WebACLHasOutOfScopeResourcesViolation: _json,
|
|
1096
1098
|
});
|
|
1097
1099
|
};
|
|
1098
1100
|
const de_ResourceViolations = (output, context) => {
|
|
@@ -50,7 +50,7 @@ declare const GetComplianceDetailCommand_base: {
|
|
|
50
50
|
* // Violators: [ // ComplianceViolators
|
|
51
51
|
* // { // ComplianceViolator
|
|
52
52
|
* // ResourceId: "STRING_VALUE",
|
|
53
|
-
* // ViolationReason: "WEB_ACL_MISSING_RULE_GROUP" || "RESOURCE_MISSING_WEB_ACL" || "RESOURCE_INCORRECT_WEB_ACL" || "RESOURCE_MISSING_SHIELD_PROTECTION" || "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION" || "RESOURCE_MISSING_SECURITY_GROUP" || "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP" || "SECURITY_GROUP_UNUSED" || "SECURITY_GROUP_REDUNDANT" || "FMS_CREATED_SECURITY_GROUP_EDITED" || "MISSING_FIREWALL" || "MISSING_FIREWALL_SUBNET_IN_AZ" || "MISSING_EXPECTED_ROUTE_TABLE" || "NETWORK_FIREWALL_POLICY_MODIFIED" || "FIREWALL_SUBNET_IS_OUT_OF_SCOPE" || "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE" || "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE" || "UNEXPECTED_FIREWALL_ROUTES" || "UNEXPECTED_TARGET_GATEWAY_ROUTES" || "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY" || "INVALID_ROUTE_CONFIGURATION" || "MISSING_TARGET_GATEWAY" || "INTERNET_TRAFFIC_NOT_INSPECTED" || "BLACK_HOLE_ROUTE_DETECTED" || "BLACK_HOLE_ROUTE_DETECTED_IN_FIREWALL_SUBNET" || "RESOURCE_MISSING_DNS_FIREWALL" || "ROUTE_HAS_OUT_OF_SCOPE_ENDPOINT" || "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT" || "INVALID_NETWORK_ACL_ENTRY",
|
|
53
|
+
* // ViolationReason: "WEB_ACL_MISSING_RULE_GROUP" || "RESOURCE_MISSING_WEB_ACL" || "RESOURCE_INCORRECT_WEB_ACL" || "RESOURCE_MISSING_SHIELD_PROTECTION" || "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION" || "RESOURCE_MISSING_SECURITY_GROUP" || "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP" || "SECURITY_GROUP_UNUSED" || "SECURITY_GROUP_REDUNDANT" || "FMS_CREATED_SECURITY_GROUP_EDITED" || "MISSING_FIREWALL" || "MISSING_FIREWALL_SUBNET_IN_AZ" || "MISSING_EXPECTED_ROUTE_TABLE" || "NETWORK_FIREWALL_POLICY_MODIFIED" || "FIREWALL_SUBNET_IS_OUT_OF_SCOPE" || "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE" || "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE" || "UNEXPECTED_FIREWALL_ROUTES" || "UNEXPECTED_TARGET_GATEWAY_ROUTES" || "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY" || "INVALID_ROUTE_CONFIGURATION" || "MISSING_TARGET_GATEWAY" || "INTERNET_TRAFFIC_NOT_INSPECTED" || "BLACK_HOLE_ROUTE_DETECTED" || "BLACK_HOLE_ROUTE_DETECTED_IN_FIREWALL_SUBNET" || "RESOURCE_MISSING_DNS_FIREWALL" || "ROUTE_HAS_OUT_OF_SCOPE_ENDPOINT" || "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT" || "INVALID_NETWORK_ACL_ENTRY" || "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE",
|
|
54
54
|
* // ResourceType: "STRING_VALUE",
|
|
55
55
|
* // Metadata: { // ComplianceViolatorMetadata
|
|
56
56
|
* // "<keys>": "STRING_VALUE",
|
|
@@ -580,6 +580,16 @@ declare const GetViolationDetailsCommand_base: {
|
|
|
580
580
|
* // },
|
|
581
581
|
* // ],
|
|
582
582
|
* // },
|
|
583
|
+
* // WebACLHasIncompatibleConfigurationViolation: { // WebACLHasIncompatibleConfigurationViolation
|
|
584
|
+
* // WebACLArn: "STRING_VALUE",
|
|
585
|
+
* // Description: "STRING_VALUE",
|
|
586
|
+
* // },
|
|
587
|
+
* // WebACLHasOutOfScopeResourcesViolation: { // WebACLHasOutOfScopeResourcesViolation
|
|
588
|
+
* // WebACLArn: "STRING_VALUE",
|
|
589
|
+
* // OutOfScopeResourceList: [ // ResourceArnList
|
|
590
|
+
* // "STRING_VALUE",
|
|
591
|
+
* // ],
|
|
592
|
+
* // },
|
|
583
593
|
* // },
|
|
584
594
|
* // ],
|
|
585
595
|
* // ResourceTags: [ // TagList
|
|
@@ -844,6 +844,7 @@ export declare const ViolationReason: {
|
|
|
844
844
|
readonly TrafficInspectionCrossesAZBoundary: "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY";
|
|
845
845
|
readonly UnexpectedFirewallRoutes: "UNEXPECTED_FIREWALL_ROUTES";
|
|
846
846
|
readonly UnexpectedTargetGatewayRoutes: "UNEXPECTED_TARGET_GATEWAY_ROUTES";
|
|
847
|
+
readonly WebACLConfigurationOrScopeOfUse: "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE";
|
|
847
848
|
readonly WebAclMissingRuleGroup: "WEB_ACL_MISSING_RULE_GROUP";
|
|
848
849
|
};
|
|
849
850
|
/**
|
|
@@ -1331,9 +1332,7 @@ export interface SecurityServicePolicyData {
|
|
|
1331
1332
|
* <p>Example: <code>SECURITY_GROUPS_COMMON</code>
|
|
1332
1333
|
* </p>
|
|
1333
1334
|
* <p>
|
|
1334
|
-
* <code>"\{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":
|
|
1335
|
-
* \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[\{\"id\":\"
|
|
1336
|
-
* sg-000e55995d61a06bd\"\}]\}"</code>
|
|
1335
|
+
* <code>"\{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[\{\"id\":\"sg-03b1f67d69ed00197\"\}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":true,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"enableSecurityGroupReferencesDistribution\":true\}"</code>
|
|
1337
1336
|
* </p>
|
|
1338
1337
|
* </li>
|
|
1339
1338
|
* <li>
|
|
@@ -1362,7 +1361,7 @@ export interface SecurityServicePolicyData {
|
|
|
1362
1361
|
* <p>Example: <code>SECURITY_GROUPS_CONTENT_AUDIT</code>
|
|
1363
1362
|
* </p>
|
|
1364
1363
|
* <p>
|
|
1365
|
-
* <code>"\{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[\{\"id\":\"sg-
|
|
1364
|
+
* <code>"\{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"preManagedOptions\":[\{\"denyProtocolAllValue\":true\},\{\"auditSgDirection\":\{\"type\":\"ALL\"\}\}],\"securityGroups\":[\{\"id\":\"sg-049b2393a25468971\"\}],\"securityGroupAction\":\{\"type\":\"ALLOW\"\}\}"</code>
|
|
1366
1365
|
* </p>
|
|
1367
1366
|
* <p>The security group action for content audit can be <code>ALLOW</code> or
|
|
1368
1367
|
* <code>DENY</code>. For <code>ALLOW</code>, all in-scope security group rules must
|
|
@@ -1374,7 +1373,7 @@ export interface SecurityServicePolicyData {
|
|
|
1374
1373
|
* <p>Example: <code>SECURITY_GROUPS_USAGE_AUDIT</code>
|
|
1375
1374
|
* </p>
|
|
1376
1375
|
* <p>
|
|
1377
|
-
* <code>"\{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true\}"</code>
|
|
1376
|
+
* <code>"\{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true,\"optionalDelayForUnusedInMinutes\":60\}"</code>
|
|
1378
1377
|
* </p>
|
|
1379
1378
|
* </li>
|
|
1380
1379
|
* <li>
|
|
@@ -1479,7 +1478,7 @@ export interface SecurityServicePolicyData {
|
|
|
1479
1478
|
* <p>Example: <code>WAFV2</code> - Firewall Manager support for WAF managed rule group versioning
|
|
1480
1479
|
* </p>
|
|
1481
1480
|
* <p>
|
|
1482
|
-
* <code>"\{\"
|
|
1481
|
+
* <code>"\{\"preProcessRuleGroups\":[\{\"ruleGroupType\":\"ManagedRuleGroup\",\"overrideAction\":\{\"type\":\"NONE\"\},\"sampledRequestsEnabled\":true,\"managedRuleGroupIdentifier\":\{\"managedRuleGroupName\":\"AWSManagedRulesAdminProtectionRuleSet\",\"vendorName\":\"AWS\",\"managedRuleGroupConfigs\":null\}\}],\"postProcessRuleGroups\":[],\"defaultAction\":\{\"type\":\"ALLOW\"\},\"customRequestHandling\":null,\"tokenDomains\":null,\"customResponse\":null,\"type\":\"WAFV2\",\"overrideCustomerWebACLAssociation\":false,\"sampledRequestsEnabledForDefaultActions\":true,\"optimizeUnassociatedWebACL\":true,\"webACLSource\":\"RETROFIT_EXISTING\"\}"</code>
|
|
1483
1482
|
* </p>
|
|
1484
1483
|
* <p>
|
|
1485
1484
|
* To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set <code>versionEnabled</code> to <code>true</code>, and set <code>version</code> to the version you'd like to use. If you don't set <code>versionEnabled</code> to <code>true</code>, or if you omit <code>versionEnabled</code>, then Firewall Manager uses the default version of the WAF managed rule group.
|
|
@@ -1503,9 +1502,7 @@ export interface SecurityServicePolicyData {
|
|
|
1503
1502
|
* <p>Example: <code>WAF Classic</code>
|
|
1504
1503
|
* </p>
|
|
1505
1504
|
* <p>
|
|
1506
|
-
* <code>"\{\"type\":
|
|
1507
|
-
* [\{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : \{\"type\":
|
|
1508
|
-
* \"COUNT\"\}\}], \"defaultAction\": \{\"type\": \"BLOCK\"\}\}"</code>
|
|
1505
|
+
* <code>"\{\"ruleGroups\":[\{\"id\":\"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659\",\"overrideAction\":\{\"type\":\"NONE\"\}\}],\"overrideCustomerWebACLAssociation\":true,\"defaultAction\":\{\"type\":\"ALLOW\"\},\"type\":\"WAF\"\}"</code>
|
|
1509
1506
|
* </p>
|
|
1510
1507
|
* </li>
|
|
1511
1508
|
* </ul>
|
|
@@ -2058,6 +2055,9 @@ export interface GetViolationDetailsRequest {
|
|
|
2058
2055
|
* <p>The ID of the Firewall Manager policy that you want the details for. You can get violation details for the following policy types:</p>
|
|
2059
2056
|
* <ul>
|
|
2060
2057
|
* <li>
|
|
2058
|
+
* <p>WAF</p>
|
|
2059
|
+
* </li>
|
|
2060
|
+
* <li>
|
|
2061
2061
|
* <p>DNS Firewall</p>
|
|
2062
2062
|
* </li>
|
|
2063
2063
|
* <li>
|
|
@@ -2092,6 +2092,7 @@ export interface GetViolationDetailsRequest {
|
|
|
2092
2092
|
/**
|
|
2093
2093
|
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
|
|
2094
2094
|
* Supported resource types are:
|
|
2095
|
+
* <code>AWS::WAFv2::WebACL</code>,
|
|
2095
2096
|
* <code>AWS::EC2::Instance</code>,
|
|
2096
2097
|
* <code>AWS::EC2::NetworkInterface</code>,
|
|
2097
2098
|
* <code>AWS::EC2::SecurityGroup</code>,
|
|
@@ -3756,6 +3757,38 @@ export interface ThirdPartyFirewallMissingSubnetViolation {
|
|
|
3756
3757
|
*/
|
|
3757
3758
|
TargetViolationReason?: string;
|
|
3758
3759
|
}
|
|
3760
|
+
/**
|
|
3761
|
+
* <p>The violation details for a web ACL whose configuration is incompatible with the Firewall Manager policy. </p>
|
|
3762
|
+
* @public
|
|
3763
|
+
*/
|
|
3764
|
+
export interface WebACLHasIncompatibleConfigurationViolation {
|
|
3765
|
+
/**
|
|
3766
|
+
* <p>The Amazon Resource Name (ARN) of the web ACL. </p>
|
|
3767
|
+
* @public
|
|
3768
|
+
*/
|
|
3769
|
+
WebACLArn?: string;
|
|
3770
|
+
/**
|
|
3771
|
+
* <p>Information about the problems that Firewall Manager encountered with the web ACL configuration. </p>
|
|
3772
|
+
* @public
|
|
3773
|
+
*/
|
|
3774
|
+
Description?: string;
|
|
3775
|
+
}
|
|
3776
|
+
/**
|
|
3777
|
+
* <p>The violation details for a web ACL that's associated with at least one resource that's out of scope of the Firewall Manager policy. </p>
|
|
3778
|
+
* @public
|
|
3779
|
+
*/
|
|
3780
|
+
export interface WebACLHasOutOfScopeResourcesViolation {
|
|
3781
|
+
/**
|
|
3782
|
+
* <p>The Amazon Resource Name (ARN) of the web ACL. </p>
|
|
3783
|
+
* @public
|
|
3784
|
+
*/
|
|
3785
|
+
WebACLArn?: string;
|
|
3786
|
+
/**
|
|
3787
|
+
* <p>An array of Amazon Resource Name (ARN) for the resources that are out of scope of the policy and are associated with the web ACL. </p>
|
|
3788
|
+
* @public
|
|
3789
|
+
*/
|
|
3790
|
+
OutOfScopeResourceList?: string[];
|
|
3791
|
+
}
|
|
3759
3792
|
/**
|
|
3760
3793
|
* <p>Violation detail based on resource type.</p>
|
|
3761
3794
|
* @public
|
|
@@ -3889,6 +3922,16 @@ export interface ResourceViolation {
|
|
|
3889
3922
|
* @public
|
|
3890
3923
|
*/
|
|
3891
3924
|
PossibleRemediationActions?: PossibleRemediationActions;
|
|
3925
|
+
/**
|
|
3926
|
+
* <p>The violation details for a web ACL whose configuration is incompatible with the Firewall Manager policy. </p>
|
|
3927
|
+
* @public
|
|
3928
|
+
*/
|
|
3929
|
+
WebACLHasIncompatibleConfigurationViolation?: WebACLHasIncompatibleConfigurationViolation;
|
|
3930
|
+
/**
|
|
3931
|
+
* <p>The violation details for a web ACL that's associated with at least one resource that's out of scope of the Firewall Manager policy. </p>
|
|
3932
|
+
* @public
|
|
3933
|
+
*/
|
|
3934
|
+
WebACLHasOutOfScopeResourcesViolation?: WebACLHasOutOfScopeResourcesViolation;
|
|
3892
3935
|
}
|
|
3893
3936
|
/**
|
|
3894
3937
|
* <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.</p>
|
|
@@ -8,7 +8,7 @@ export declare const getRuntimeConfig: (config: FMSClientConfig) => {
|
|
|
8
8
|
defaultsMode: import("@smithy/types").Provider<import("@smithy/smithy-client").ResolvedDefaultsMode>;
|
|
9
9
|
bodyLengthChecker: import("@smithy/types").BodyLengthCalculator;
|
|
10
10
|
credentialDefaultProvider: (input: any) => import("@smithy/types").AwsCredentialIdentityProvider;
|
|
11
|
-
defaultUserAgentProvider: (config
|
|
11
|
+
defaultUserAgentProvider: (config?: import("@aws-sdk/util-user-agent-browser").PreviouslyResolved | undefined) => Promise<import("@smithy/types").UserAgent>;
|
|
12
12
|
maxAttempts: number | import("@smithy/types").Provider<number>;
|
|
13
13
|
region: string | import("@smithy/types").Provider<any>;
|
|
14
14
|
requestHandler: import("@smithy/protocol-http").HttpHandler<any> | RequestHandler;
|
|
@@ -20,7 +20,7 @@ export declare const getRuntimeConfig: (config: FMSClientConfig) => {
|
|
|
20
20
|
useDualstackEndpoint: boolean | import("@smithy/types").Provider<boolean>;
|
|
21
21
|
useFipsEndpoint: boolean | import("@smithy/types").Provider<boolean>;
|
|
22
22
|
region: string | import("@smithy/types").Provider<any>;
|
|
23
|
-
defaultUserAgentProvider: (config
|
|
23
|
+
defaultUserAgentProvider: (config?: import("@aws-sdk/util-user-agent-browser").PreviouslyResolved | undefined) => Promise<import("@smithy/types").UserAgent>;
|
|
24
24
|
credentialDefaultProvider: (input: any) => import("@smithy/types").AwsCredentialIdentityProvider;
|
|
25
25
|
maxAttempts: number | import("@smithy/types").Provider<number>;
|
|
26
26
|
retryMode: string | import("@smithy/types").Provider<string>;
|
|
@@ -269,6 +269,7 @@ export declare const ViolationReason: {
|
|
|
269
269
|
readonly TrafficInspectionCrossesAZBoundary: "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY";
|
|
270
270
|
readonly UnexpectedFirewallRoutes: "UNEXPECTED_FIREWALL_ROUTES";
|
|
271
271
|
readonly UnexpectedTargetGatewayRoutes: "UNEXPECTED_TARGET_GATEWAY_ROUTES";
|
|
272
|
+
readonly WebACLConfigurationOrScopeOfUse: "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE";
|
|
272
273
|
readonly WebAclMissingRuleGroup: "WEB_ACL_MISSING_RULE_GROUP";
|
|
273
274
|
};
|
|
274
275
|
export type ViolationReason =
|
|
@@ -861,6 +862,14 @@ export interface ThirdPartyFirewallMissingSubnetViolation {
|
|
|
861
862
|
AvailabilityZone?: string;
|
|
862
863
|
TargetViolationReason?: string;
|
|
863
864
|
}
|
|
865
|
+
export interface WebACLHasIncompatibleConfigurationViolation {
|
|
866
|
+
WebACLArn?: string;
|
|
867
|
+
Description?: string;
|
|
868
|
+
}
|
|
869
|
+
export interface WebACLHasOutOfScopeResourcesViolation {
|
|
870
|
+
WebACLArn?: string;
|
|
871
|
+
OutOfScopeResourceList?: string[];
|
|
872
|
+
}
|
|
864
873
|
export interface ResourceViolation {
|
|
865
874
|
AwsVPCSecurityGroupViolation?: AwsVPCSecurityGroupViolation;
|
|
866
875
|
AwsEc2NetworkInterfaceViolation?: AwsEc2NetworkInterfaceViolation;
|
|
@@ -886,6 +895,8 @@ export interface ResourceViolation {
|
|
|
886
895
|
FirewallSubnetMissingVPCEndpointViolation?: FirewallSubnetMissingVPCEndpointViolation;
|
|
887
896
|
InvalidNetworkAclEntriesViolation?: InvalidNetworkAclEntriesViolation;
|
|
888
897
|
PossibleRemediationActions?: PossibleRemediationActions;
|
|
898
|
+
WebACLHasIncompatibleConfigurationViolation?: WebACLHasIncompatibleConfigurationViolation;
|
|
899
|
+
WebACLHasOutOfScopeResourcesViolation?: WebACLHasOutOfScopeResourcesViolation;
|
|
889
900
|
}
|
|
890
901
|
export interface ViolationDetail {
|
|
891
902
|
PolicyId: string | undefined;
|
|
@@ -10,7 +10,9 @@ export declare const getRuntimeConfig: (config: FMSClientConfig) => {
|
|
|
10
10
|
input: any
|
|
11
11
|
) => import("@smithy/types").AwsCredentialIdentityProvider;
|
|
12
12
|
defaultUserAgentProvider: (
|
|
13
|
-
config
|
|
13
|
+
config?:
|
|
14
|
+
| import("@aws-sdk/util-user-agent-browser").PreviouslyResolved
|
|
15
|
+
| undefined
|
|
14
16
|
) => Promise<import("@smithy/types").UserAgent>;
|
|
15
17
|
maxAttempts: number | import("@smithy/types").Provider<number>;
|
|
16
18
|
region: string | import("@smithy/types").Provider<any>;
|
|
@@ -23,7 +23,9 @@ export declare const getRuntimeConfig: (config: FMSClientConfig) => {
|
|
|
23
23
|
useFipsEndpoint: boolean | import("@smithy/types").Provider<boolean>;
|
|
24
24
|
region: string | import("@smithy/types").Provider<any>;
|
|
25
25
|
defaultUserAgentProvider: (
|
|
26
|
-
config
|
|
26
|
+
config?:
|
|
27
|
+
| import("@aws-sdk/util-user-agent-browser").PreviouslyResolved
|
|
28
|
+
| undefined
|
|
27
29
|
) => Promise<import("@smithy/types").UserAgent>;
|
|
28
30
|
credentialDefaultProvider: (
|
|
29
31
|
input: any
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-fms",
|
|
3
3
|
"description": "AWS SDK for JavaScript Fms Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.676.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-fms",
|
|
@@ -20,10 +20,10 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/client-sso-oidc": "3.
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sso-oidc": "3.675.0",
|
|
24
|
+
"@aws-sdk/client-sts": "3.675.0",
|
|
25
25
|
"@aws-sdk/core": "3.667.0",
|
|
26
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
26
|
+
"@aws-sdk/credential-provider-node": "3.675.0",
|
|
27
27
|
"@aws-sdk/middleware-host-header": "3.667.0",
|
|
28
28
|
"@aws-sdk/middleware-logger": "3.667.0",
|
|
29
29
|
"@aws-sdk/middleware-recursion-detection": "3.667.0",
|
|
@@ -31,7 +31,7 @@
|
|
|
31
31
|
"@aws-sdk/region-config-resolver": "3.667.0",
|
|
32
32
|
"@aws-sdk/types": "3.667.0",
|
|
33
33
|
"@aws-sdk/util-endpoints": "3.667.0",
|
|
34
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
34
|
+
"@aws-sdk/util-user-agent-browser": "3.675.0",
|
|
35
35
|
"@aws-sdk/util-user-agent-node": "3.669.0",
|
|
36
36
|
"@smithy/config-resolver": "^3.0.9",
|
|
37
37
|
"@smithy/core": "^2.4.8",
|