aws-sdk 2.1362.0 → 2.1364.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +11 -1
- package/README.md +3 -1
- package/apis/connect-2017-08-08.min.json +239 -199
- package/apis/ec2-2016-11-15.min.json +1234 -1215
- package/apis/fms-2018-01-01.min.json +245 -95
- package/apis/fms-2018-01-01.paginators.json +12 -0
- package/apis/mediaconvert-2017-08-29.min.json +183 -155
- package/clients/codecatalyst.d.ts +11 -11
- package/clients/connect.d.ts +59 -1
- package/clients/ec2.d.ts +140 -115
- package/clients/ecs.d.ts +2 -2
- package/clients/fms.d.ts +225 -21
- package/clients/mediaconvert.d.ts +67 -33
- package/clients/rekognition.d.ts +4 -4
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +6 -6
- package/dist/aws-sdk.js +1476 -1417
- package/dist/aws-sdk.min.js +79 -79
- package/lib/core.js +1 -1
- package/package.json +1 -1
    
        package/clients/ecs.d.ts
    CHANGED
    
    | @@ -2204,11 +2204,11 @@ declare namespace ECS { | |
| 2204 2204 | 
             
                 */
         | 
| 2205 2205 | 
             
                tmpfs?: TmpfsList;
         | 
| 2206 2206 | 
             
                /**
         | 
| 2207 | 
            -
                 * The total amount of swap memory (in MiB) a container can use. This parameter will be translated to the --memory-swap option to docker run where the value would be the sum of the container memory plus the maxSwap value. If a maxSwap value of 0 is specified, the container will not use swap. Accepted values are 0 or any positive integer. If the maxSwap parameter is omitted, the container will use the swap configuration for the container instance it is running on. A maxSwap value must be set for the swappiness parameter to be used.  If you're using tasks that use the Fargate launch type, the maxSwap parameter isn't supported. 
         | 
| 2207 | 
            +
                 * The total amount of swap memory (in MiB) a container can use. This parameter will be translated to the --memory-swap option to docker run where the value would be the sum of the container memory plus the maxSwap value. If a maxSwap value of 0 is specified, the container will not use swap. Accepted values are 0 or any positive integer. If the maxSwap parameter is omitted, the container will use the swap configuration for the container instance it is running on. A maxSwap value must be set for the swappiness parameter to be used.  If you're using tasks that use the Fargate launch type, the maxSwap parameter isn't supported. If you're using tasks on Amazon Linux 2023 the swappiness parameter isn't supported. 
         | 
| 2208 2208 | 
             
                 */
         | 
| 2209 2209 | 
             
                maxSwap?: BoxedInteger;
         | 
| 2210 2210 | 
             
                /**
         | 
| 2211 | 
            -
                 * This allows you to tune a container's memory swappiness behavior. A swappiness value of 0 will cause swapping to not happen unless absolutely necessary. A swappiness value of 100 will cause pages to be swapped very aggressively. Accepted values are whole numbers between 0 and 100. If the swappiness parameter is not specified, a default value of 60 is used. If a value is not specified for maxSwap then this parameter is ignored. This parameter maps to the --memory-swappiness option to docker run.  If you're using tasks that use the Fargate launch type, the swappiness parameter isn't supported. 
         | 
| 2211 | 
            +
                 * This allows you to tune a container's memory swappiness behavior. A swappiness value of 0 will cause swapping to not happen unless absolutely necessary. A swappiness value of 100 will cause pages to be swapped very aggressively. Accepted values are whole numbers between 0 and 100. If the swappiness parameter is not specified, a default value of 60 is used. If a value is not specified for maxSwap then this parameter is ignored. This parameter maps to the --memory-swappiness option to docker run.  If you're using tasks that use the Fargate launch type, the swappiness parameter isn't supported. If you're using tasks on Amazon Linux 2023 the swappiness parameter isn't supported. 
         | 
| 2212 2212 | 
             
                 */
         | 
| 2213 2213 | 
             
                swappiness?: BoxedInteger;
         | 
| 2214 2214 | 
             
              }
         | 
    
        package/clients/fms.d.ts
    CHANGED
    
    | @@ -12,11 +12,11 @@ declare class FMS extends Service { | |
| 12 12 | 
             
              constructor(options?: FMS.Types.ClientConfiguration)
         | 
| 13 13 | 
             
              config: Config & FMS.Types.ClientConfiguration;
         | 
| 14 14 | 
             
              /**
         | 
| 15 | 
            -
               * Sets  | 
| 15 | 
            +
               * Sets a Firewall Manager default administrator account. The Firewall Manager default administrator account can manage third-party firewalls and has full administrative scope that allows administration of all policy types, accounts, organizational units, and Regions. This account must be a member account of the organization in Organizations whose resources you want to protect. For information about working with Firewall Manager administrator accounts, see Managing Firewall Manager administrators in the Firewall Manager Developer Guide.
         | 
| 16 16 | 
             
               */
         | 
| 17 17 | 
             
              associateAdminAccount(params: FMS.Types.AssociateAdminAccountRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 18 18 | 
             
              /**
         | 
| 19 | 
            -
               * Sets  | 
| 19 | 
            +
               * Sets a Firewall Manager default administrator account. The Firewall Manager default administrator account can manage third-party firewalls and has full administrative scope that allows administration of all policy types, accounts, organizational units, and Regions. This account must be a member account of the organization in Organizations whose resources you want to protect. For information about working with Firewall Manager administrator accounts, see Managing Firewall Manager administrators in the Firewall Manager Developer Guide.
         | 
| 20 20 | 
             
               */
         | 
| 21 21 | 
             
              associateAdminAccount(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 22 22 | 
             
              /**
         | 
| @@ -84,11 +84,11 @@ declare class FMS extends Service { | |
| 84 84 | 
             
               */
         | 
| 85 85 | 
             
              deleteResourceSet(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 86 86 | 
             
              /**
         | 
| 87 | 
            -
               * Disassociates  | 
| 87 | 
            +
               * Disassociates an Firewall Manager administrator account. To set a different account as an Firewall Manager administrator, submit a PutAdminAccount request. To set an account as a default administrator account, you must submit an AssociateAdminAccount request. Disassociation of the default administrator account follows the first in, last out principle. If you are the default administrator, all Firewall Manager administrators within the organization must first disassociate their accounts before you can disassociate your account.
         | 
| 88 88 | 
             
               */
         | 
| 89 89 | 
             
              disassociateAdminAccount(params: FMS.Types.DisassociateAdminAccountRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 90 90 | 
             
              /**
         | 
| 91 | 
            -
               * Disassociates  | 
| 91 | 
            +
               * Disassociates an Firewall Manager administrator account. To set a different account as an Firewall Manager administrator, submit a PutAdminAccount request. To set an account as a default administrator account, you must submit an AssociateAdminAccount request. Disassociation of the default administrator account follows the first in, last out principle. If you are the default administrator, all Firewall Manager administrators within the organization must first disassociate their accounts before you can disassociate your account.
         | 
| 92 92 | 
             
               */
         | 
| 93 93 | 
             
              disassociateAdminAccount(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 94 94 | 
             
              /**
         | 
| @@ -100,13 +100,21 @@ declare class FMS extends Service { | |
| 100 100 | 
             
               */
         | 
| 101 101 | 
             
              disassociateThirdPartyFirewall(callback?: (err: AWSError, data: FMS.Types.DisassociateThirdPartyFirewallResponse) => void): Request<FMS.Types.DisassociateThirdPartyFirewallResponse, AWSError>;
         | 
| 102 102 | 
             
              /**
         | 
| 103 | 
            -
               * Returns the Organizations account that is associated with Firewall Manager as the Firewall Manager administrator.
         | 
| 103 | 
            +
               * Returns the Organizations account that is associated with Firewall Manager as the Firewall Manager default administrator.
         | 
| 104 104 | 
             
               */
         | 
| 105 105 | 
             
              getAdminAccount(params: FMS.Types.GetAdminAccountRequest, callback?: (err: AWSError, data: FMS.Types.GetAdminAccountResponse) => void): Request<FMS.Types.GetAdminAccountResponse, AWSError>;
         | 
| 106 106 | 
             
              /**
         | 
| 107 | 
            -
               * Returns the Organizations account that is associated with Firewall Manager as the Firewall Manager administrator.
         | 
| 107 | 
            +
               * Returns the Organizations account that is associated with Firewall Manager as the Firewall Manager default administrator.
         | 
| 108 108 | 
             
               */
         | 
| 109 109 | 
             
              getAdminAccount(callback?: (err: AWSError, data: FMS.Types.GetAdminAccountResponse) => void): Request<FMS.Types.GetAdminAccountResponse, AWSError>;
         | 
| 110 | 
            +
              /**
         | 
| 111 | 
            +
               * Returns information about the specified account's administrative scope. The admistrative scope defines the resources that an Firewall Manager administrator can manage.
         | 
| 112 | 
            +
               */
         | 
| 113 | 
            +
              getAdminScope(params: FMS.Types.GetAdminScopeRequest, callback?: (err: AWSError, data: FMS.Types.GetAdminScopeResponse) => void): Request<FMS.Types.GetAdminScopeResponse, AWSError>;
         | 
| 114 | 
            +
              /**
         | 
| 115 | 
            +
               * Returns information about the specified account's administrative scope. The admistrative scope defines the resources that an Firewall Manager administrator can manage.
         | 
| 116 | 
            +
               */
         | 
| 117 | 
            +
              getAdminScope(callback?: (err: AWSError, data: FMS.Types.GetAdminScopeResponse) => void): Request<FMS.Types.GetAdminScopeResponse, AWSError>;
         | 
| 110 118 | 
             
              /**
         | 
| 111 119 | 
             
               * Returns information about the specified Firewall Manager applications list.
         | 
| 112 120 | 
             
               */
         | 
| @@ -179,6 +187,22 @@ declare class FMS extends Service { | |
| 179 187 | 
             
               * Retrieves violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.
         | 
| 180 188 | 
             
               */
         | 
| 181 189 | 
             
              getViolationDetails(callback?: (err: AWSError, data: FMS.Types.GetViolationDetailsResponse) => void): Request<FMS.Types.GetViolationDetailsResponse, AWSError>;
         | 
| 190 | 
            +
              /**
         | 
| 191 | 
            +
               * Returns a AdminAccounts object that lists the Firewall Manager administrators within the organization that are onboarded to Firewall Manager by AssociateAdminAccount. This operation can be called only from the organization's management account.
         | 
| 192 | 
            +
               */
         | 
| 193 | 
            +
              listAdminAccountsForOrganization(params: FMS.Types.ListAdminAccountsForOrganizationRequest, callback?: (err: AWSError, data: FMS.Types.ListAdminAccountsForOrganizationResponse) => void): Request<FMS.Types.ListAdminAccountsForOrganizationResponse, AWSError>;
         | 
| 194 | 
            +
              /**
         | 
| 195 | 
            +
               * Returns a AdminAccounts object that lists the Firewall Manager administrators within the organization that are onboarded to Firewall Manager by AssociateAdminAccount. This operation can be called only from the organization's management account.
         | 
| 196 | 
            +
               */
         | 
| 197 | 
            +
              listAdminAccountsForOrganization(callback?: (err: AWSError, data: FMS.Types.ListAdminAccountsForOrganizationResponse) => void): Request<FMS.Types.ListAdminAccountsForOrganizationResponse, AWSError>;
         | 
| 198 | 
            +
              /**
         | 
| 199 | 
            +
               * Lists the accounts that are managing the specified Organizations member account. This is useful for any member account so that they can view the accounts who are managing their account. This operation only returns the managing administrators that have the requested account within their AdminScope.
         | 
| 200 | 
            +
               */
         | 
| 201 | 
            +
              listAdminsManagingAccount(params: FMS.Types.ListAdminsManagingAccountRequest, callback?: (err: AWSError, data: FMS.Types.ListAdminsManagingAccountResponse) => void): Request<FMS.Types.ListAdminsManagingAccountResponse, AWSError>;
         | 
| 202 | 
            +
              /**
         | 
| 203 | 
            +
               * Lists the accounts that are managing the specified Organizations member account. This is useful for any member account so that they can view the accounts who are managing their account. This operation only returns the managing administrators that have the requested account within their AdminScope.
         | 
| 204 | 
            +
               */
         | 
| 205 | 
            +
              listAdminsManagingAccount(callback?: (err: AWSError, data: FMS.Types.ListAdminsManagingAccountResponse) => void): Request<FMS.Types.ListAdminsManagingAccountResponse, AWSError>;
         | 
| 182 206 | 
             
              /**
         | 
| 183 207 | 
             
               * Returns an array of AppsListDataSummary objects.
         | 
| 184 208 | 
             
               */
         | 
| @@ -204,11 +228,11 @@ declare class FMS extends Service { | |
| 204 228 | 
             
               */
         | 
| 205 229 | 
             
              listDiscoveredResources(callback?: (err: AWSError, data: FMS.Types.ListDiscoveredResourcesResponse) => void): Request<FMS.Types.ListDiscoveredResourcesResponse, AWSError>;
         | 
| 206 230 | 
             
              /**
         | 
| 207 | 
            -
               * Returns a MemberAccounts object that lists the member accounts in the administrator's Amazon Web Services organization.  | 
| 231 | 
            +
               * Returns a MemberAccounts object that lists the member accounts in the administrator's Amazon Web Services organization. Either an Firewall Manager administrator or the organization's management account can make this request.
         | 
| 208 232 | 
             
               */
         | 
| 209 233 | 
             
              listMemberAccounts(params: FMS.Types.ListMemberAccountsRequest, callback?: (err: AWSError, data: FMS.Types.ListMemberAccountsResponse) => void): Request<FMS.Types.ListMemberAccountsResponse, AWSError>;
         | 
| 210 234 | 
             
              /**
         | 
| 211 | 
            -
               * Returns a MemberAccounts object that lists the member accounts in the administrator's Amazon Web Services organization.  | 
| 235 | 
            +
               * Returns a MemberAccounts object that lists the member accounts in the administrator's Amazon Web Services organization. Either an Firewall Manager administrator or the organization's management account can make this request.
         | 
| 212 236 | 
             
               */
         | 
| 213 237 | 
             
              listMemberAccounts(callback?: (err: AWSError, data: FMS.Types.ListMemberAccountsResponse) => void): Request<FMS.Types.ListMemberAccountsResponse, AWSError>;
         | 
| 214 238 | 
             
              /**
         | 
| @@ -259,6 +283,14 @@ declare class FMS extends Service { | |
| 259 283 | 
             
               * Retrieves a list of all of the third-party firewall policies that are associated with the third-party firewall administrator's account.
         | 
| 260 284 | 
             
               */
         | 
| 261 285 | 
             
              listThirdPartyFirewallFirewallPolicies(callback?: (err: AWSError, data: FMS.Types.ListThirdPartyFirewallFirewallPoliciesResponse) => void): Request<FMS.Types.ListThirdPartyFirewallFirewallPoliciesResponse, AWSError>;
         | 
| 286 | 
            +
              /**
         | 
| 287 | 
            +
               * Creates or updates an Firewall Manager administrator account. The account must be a member of the organization that was onboarded to Firewall Manager by AssociateAdminAccount. Only the organization's management account can create an Firewall Manager administrator account. When you create an Firewall Manager administrator account, the service checks to see if the account is already a delegated administrator within Organizations. If the account isn't a delegated administrator, Firewall Manager calls Organizations to delegate the account within Organizations. For more information about administrator accounts within Organizations, see Managing the Amazon Web Services Accounts in Your Organization.
         | 
| 288 | 
            +
               */
         | 
| 289 | 
            +
              putAdminAccount(params: FMS.Types.PutAdminAccountRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 290 | 
            +
              /**
         | 
| 291 | 
            +
               * Creates or updates an Firewall Manager administrator account. The account must be a member of the organization that was onboarded to Firewall Manager by AssociateAdminAccount. Only the organization's management account can create an Firewall Manager administrator account. When you create an Firewall Manager administrator account, the service checks to see if the account is already a delegated administrator within Organizations. If the account isn't a delegated administrator, Firewall Manager calls Organizations to delegate the account within Organizations. For more information about administrator accounts within Organizations, see Managing the Amazon Web Services Accounts in Your Organization.
         | 
| 292 | 
            +
               */
         | 
| 293 | 
            +
              putAdminAccount(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 262 294 | 
             
              /**
         | 
| 263 295 | 
             
               * Creates an Firewall Manager applications list.
         | 
| 264 296 | 
             
               */
         | 
| @@ -268,11 +300,11 @@ declare class FMS extends Service { | |
| 268 300 | 
             
               */
         | 
| 269 301 | 
             
              putAppsList(callback?: (err: AWSError, data: FMS.Types.PutAppsListResponse) => void): Request<FMS.Types.PutAppsListResponse, AWSError>;
         | 
| 270 302 | 
             
              /**
         | 
| 271 | 
            -
               * Designates the IAM role and Amazon Simple Notification Service (SNS) topic that Firewall Manager uses to record SNS logs. To perform this action outside of the console, you must configure the SNS topic to allow the  | 
| 303 | 
            +
               * Designates the IAM role and Amazon Simple Notification Service (SNS) topic that Firewall Manager uses to record SNS logs. To perform this action outside of the console, you must first configure the SNS topic's access policy to allow the SnsRoleName to publish SNS logs. If the SnsRoleName provided is a role other than the AWSServiceRoleForFMS service-linked role, this role must have a trust relationship configured to allow the Firewall Manager service principal fms.amazonaws.com to assume this role. For information about configuring an SNS access policy, see Service roles for Firewall Manager in the Firewall Manager Developer Guide.
         | 
| 272 304 | 
             
               */
         | 
| 273 305 | 
             
              putNotificationChannel(params: FMS.Types.PutNotificationChannelRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 274 306 | 
             
              /**
         | 
| 275 | 
            -
               * Designates the IAM role and Amazon Simple Notification Service (SNS) topic that Firewall Manager uses to record SNS logs. To perform this action outside of the console, you must configure the SNS topic to allow the  | 
| 307 | 
            +
               * Designates the IAM role and Amazon Simple Notification Service (SNS) topic that Firewall Manager uses to record SNS logs. To perform this action outside of the console, you must first configure the SNS topic's access policy to allow the SnsRoleName to publish SNS logs. If the SnsRoleName provided is a role other than the AWSServiceRoleForFMS service-linked role, this role must have a trust relationship configured to allow the Firewall Manager service principal fms.amazonaws.com to assume this role. For information about configuring an SNS access policy, see Service roles for Firewall Manager in the Firewall Manager Developer Guide.
         | 
| 276 308 | 
             
               */
         | 
| 277 309 | 
             
              putNotificationChannel(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
         | 
| 278 310 | 
             
              /**
         | 
| @@ -319,7 +351,24 @@ declare class FMS extends Service { | |
| 319 351 | 
             
            declare namespace FMS {
         | 
| 320 352 | 
             
              export type AWSAccountId = string;
         | 
| 321 353 | 
             
              export type AWSAccountIdList = AWSAccountId[];
         | 
| 354 | 
            +
              export type AWSRegion = string;
         | 
| 355 | 
            +
              export type AWSRegionList = AWSRegion[];
         | 
| 356 | 
            +
              export type AccountIdList = AWSAccountId[];
         | 
| 322 357 | 
             
              export type AccountRoleStatus = "READY"|"CREATING"|"PENDING_DELETION"|"DELETING"|"DELETED"|string;
         | 
| 358 | 
            +
              export interface AccountScope {
         | 
| 359 | 
            +
                /**
         | 
| 360 | 
            +
                 * The list of accounts within the organization that the specified Firewall Manager administrator either can or cannot apply policies to, based on the value of ExcludeSpecifiedAccounts. If ExcludeSpecifiedAccounts is set to true, then the Firewall Manager administrator can apply policies to all members of the organization except for the accounts in this list. If ExcludeSpecifiedAccounts is set to false, then the Firewall Manager administrator can only apply policies to the accounts in this list.
         | 
| 361 | 
            +
                 */
         | 
| 362 | 
            +
                Accounts?: AccountIdList;
         | 
| 363 | 
            +
                /**
         | 
| 364 | 
            +
                 * A boolean value that indicates if the administrator can apply policies to all accounts within an organization. If true, the administrator can apply policies to all accounts within the organization. You can either enable management of all accounts through this operation, or you can specify a list of accounts to manage in AccountScope$Accounts. You cannot specify both.
         | 
| 365 | 
            +
                 */
         | 
| 366 | 
            +
                AllAccountsEnabled?: Boolean;
         | 
| 367 | 
            +
                /**
         | 
| 368 | 
            +
                 * A boolean value that excludes the accounts in AccountScope$Accounts from the administrator's scope. If true, the Firewall Manager administrator can apply policies to all members of the organization except for the accounts listed in AccountScope$Accounts. You can either specify a list of accounts to exclude by AccountScope$Accounts, or you can enable management of all accounts by AccountScope$AllAccountsEnabled. You cannot specify both.
         | 
| 369 | 
            +
                 */
         | 
| 370 | 
            +
                ExcludeSpecifiedAccounts?: Boolean;
         | 
| 371 | 
            +
              }
         | 
| 323 372 | 
             
              export interface ActionTarget {
         | 
| 324 373 | 
             
                /**
         | 
| 325 374 | 
             
                 * The ID of the remediation target.
         | 
| @@ -330,6 +379,39 @@ declare namespace FMS { | |
| 330 379 | 
             
                 */
         | 
| 331 380 | 
             
                Description?: LengthBoundedString;
         | 
| 332 381 | 
             
              }
         | 
| 382 | 
            +
              export interface AdminAccountSummary {
         | 
| 383 | 
            +
                /**
         | 
| 384 | 
            +
                 * The Amazon Web Services account ID of the Firewall Manager administrator's account.
         | 
| 385 | 
            +
                 */
         | 
| 386 | 
            +
                AdminAccount?: AWSAccountId;
         | 
| 387 | 
            +
                /**
         | 
| 388 | 
            +
                 * A boolean value that indicates if the administrator is the default administrator. If true, then this is the default administrator account. The default administrator can manage third-party firewalls and has full administrative scope. There is only one default administrator account per organization. For information about Firewall Manager default administrator accounts, see Managing Firewall Manager administrators in the Firewall Manager Developer Guide.
         | 
| 389 | 
            +
                 */
         | 
| 390 | 
            +
                DefaultAdmin?: Boolean;
         | 
| 391 | 
            +
                /**
         | 
| 392 | 
            +
                 * The current status of the request to onboard a member account as an Firewall Manager administator.    ONBOARDING - The account is onboarding to Firewall Manager as an administrator.    ONBOARDING_COMPLETE - Firewall Manager The account is onboarded to Firewall Manager as an administrator, and can perform actions on the resources defined in their AdminScope.    OFFBOARDING - The account is being removed as an Firewall Manager administrator.    OFFBOARDING_COMPLETE - The account has been removed as an Firewall Manager administrator.  
         | 
| 393 | 
            +
                 */
         | 
| 394 | 
            +
                Status?: OrganizationStatus;
         | 
| 395 | 
            +
              }
         | 
| 396 | 
            +
              export type AdminAccountSummaryList = AdminAccountSummary[];
         | 
| 397 | 
            +
              export interface AdminScope {
         | 
| 398 | 
            +
                /**
         | 
| 399 | 
            +
                 * Defines the accounts that the specified Firewall Manager administrator can apply policies to.
         | 
| 400 | 
            +
                 */
         | 
| 401 | 
            +
                AccountScope?: AccountScope;
         | 
| 402 | 
            +
                /**
         | 
| 403 | 
            +
                 * Defines the Organizations organizational units that the specified Firewall Manager administrator can apply policies to. For more information about OUs in Organizations, see Managing organizational units (OUs)  in the Organizations User Guide.
         | 
| 404 | 
            +
                 */
         | 
| 405 | 
            +
                OrganizationalUnitScope?: OrganizationalUnitScope;
         | 
| 406 | 
            +
                /**
         | 
| 407 | 
            +
                 * Defines the Amazon Web Services Regions that the specified Firewall Manager administrator can perform actions in.
         | 
| 408 | 
            +
                 */
         | 
| 409 | 
            +
                RegionScope?: RegionScope;
         | 
| 410 | 
            +
                /**
         | 
| 411 | 
            +
                 * Defines the Firewall Manager policy types that the specified Firewall Manager administrator can create and manage.
         | 
| 412 | 
            +
                 */
         | 
| 413 | 
            +
                PolicyTypeScope?: PolicyTypeScope;
         | 
| 414 | 
            +
              }
         | 
| 333 415 | 
             
              export interface App {
         | 
| 334 416 | 
             
                /**
         | 
| 335 417 | 
             
                 * The application's name.
         | 
| @@ -396,7 +478,7 @@ declare namespace FMS { | |
| 396 478 | 
             
              export type AppsListsData = AppsListDataSummary[];
         | 
| 397 479 | 
             
              export interface AssociateAdminAccountRequest {
         | 
| 398 480 | 
             
                /**
         | 
| 399 | 
            -
                 * The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager administrator account. This must be  | 
| 481 | 
            +
                 * The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager default administrator account. This account must be a member account of the organization in Organizations whose resources you want to protect. For more information about Organizations, see Managing the Amazon Web Services Accounts in Your Organization. 
         | 
| 400 482 | 
             
                 */
         | 
| 401 483 | 
             
                AdminAccount: AWSAccountId;
         | 
| 402 484 | 
             
              }
         | 
| @@ -455,7 +537,7 @@ declare namespace FMS { | |
| 455 537 | 
             
              export type BasicInteger = number;
         | 
| 456 538 | 
             
              export interface BatchAssociateResourceRequest {
         | 
| 457 539 | 
             
                /**
         | 
| 458 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 540 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 459 541 | 
             
                 */
         | 
| 460 542 | 
             
                ResourceSetIdentifier: Identifier;
         | 
| 461 543 | 
             
                /**
         | 
| @@ -465,7 +547,7 @@ declare namespace FMS { | |
| 465 547 | 
             
              }
         | 
| 466 548 | 
             
              export interface BatchAssociateResourceResponse {
         | 
| 467 549 | 
             
                /**
         | 
| 468 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 550 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 469 551 | 
             
                 */
         | 
| 470 552 | 
             
                ResourceSetIdentifier: Identifier;
         | 
| 471 553 | 
             
                /**
         | 
| @@ -475,7 +557,7 @@ declare namespace FMS { | |
| 475 557 | 
             
              }
         | 
| 476 558 | 
             
              export interface BatchDisassociateResourceRequest {
         | 
| 477 559 | 
             
                /**
         | 
| 478 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 560 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 479 561 | 
             
                 */
         | 
| 480 562 | 
             
                ResourceSetIdentifier: Identifier;
         | 
| 481 563 | 
             
                /**
         | 
| @@ -485,7 +567,7 @@ declare namespace FMS { | |
| 485 567 | 
             
              }
         | 
| 486 568 | 
             
              export interface BatchDisassociateResourceResponse {
         | 
| 487 569 | 
             
                /**
         | 
| 488 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 570 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 489 571 | 
             
                 */
         | 
| 490 572 | 
             
                ResourceSetIdentifier: Identifier;
         | 
| 491 573 | 
             
                /**
         | 
| @@ -519,6 +601,7 @@ declare namespace FMS { | |
| 519 601 | 
             
              export type CustomerPolicyScopeIdList = CustomerPolicyScopeId[];
         | 
| 520 602 | 
             
              export type CustomerPolicyScopeIdType = "ACCOUNT"|"ORG_UNIT"|string;
         | 
| 521 603 | 
             
              export type CustomerPolicyScopeMap = {[key: string]: CustomerPolicyScopeIdList};
         | 
| 604 | 
            +
              export type CustomerPolicyStatus = "ACTIVE"|"OUT_OF_ADMIN_SCOPE"|string;
         | 
| 522 605 | 
             
              export interface DeleteAppsListRequest {
         | 
| 523 606 | 
             
                /**
         | 
| 524 607 | 
             
                 * The ID of the applications list that you want to delete. You can retrieve this ID from PutAppsList, ListAppsLists, and GetAppsList.
         | 
| @@ -545,7 +628,7 @@ declare namespace FMS { | |
| 545 628 | 
             
              }
         | 
| 546 629 | 
             
              export interface DeleteResourceSetRequest {
         | 
| 547 630 | 
             
                /**
         | 
| 548 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 631 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 549 632 | 
             
                 */
         | 
| 550 633 | 
             
                Identifier: Base62Id;
         | 
| 551 634 | 
             
              }
         | 
| @@ -879,14 +962,30 @@ declare namespace FMS { | |
| 879 962 | 
             
              }
         | 
| 880 963 | 
             
              export interface GetAdminAccountResponse {
         | 
| 881 964 | 
             
                /**
         | 
| 882 | 
            -
                 * The  | 
| 965 | 
            +
                 * The account that is set as the Firewall Manager default administrator.
         | 
| 883 966 | 
             
                 */
         | 
| 884 967 | 
             
                AdminAccount?: AWSAccountId;
         | 
| 885 968 | 
             
                /**
         | 
| 886 | 
            -
                 * The status of the  | 
| 969 | 
            +
                 * The status of the account that you set as the Firewall Manager default administrator.
         | 
| 887 970 | 
             
                 */
         | 
| 888 971 | 
             
                RoleStatus?: AccountRoleStatus;
         | 
| 889 972 | 
             
              }
         | 
| 973 | 
            +
              export interface GetAdminScopeRequest {
         | 
| 974 | 
            +
                /**
         | 
| 975 | 
            +
                 * The administator account that you want to get the details for.
         | 
| 976 | 
            +
                 */
         | 
| 977 | 
            +
                AdminAccount: AWSAccountId;
         | 
| 978 | 
            +
              }
         | 
| 979 | 
            +
              export interface GetAdminScopeResponse {
         | 
| 980 | 
            +
                /**
         | 
| 981 | 
            +
                 * Contains details about the administrative scope of the requested account.
         | 
| 982 | 
            +
                 */
         | 
| 983 | 
            +
                AdminScope?: AdminScope;
         | 
| 984 | 
            +
                /**
         | 
| 985 | 
            +
                 * The current status of the request to onboard a member account as an Firewall Manager administator.    ONBOARDING - The account is onboarding to Firewall Manager as an administrator.    ONBOARDING_COMPLETE - Firewall Manager The account is onboarded to Firewall Manager as an administrator, and can perform actions on the resources defined in their AdminScope.    OFFBOARDING - The account is being removed as an Firewall Manager administrator.    OFFBOARDING_COMPLETE - The account has been removed as an Firewall Manager administrator.  
         | 
| 986 | 
            +
                 */
         | 
| 987 | 
            +
                Status?: OrganizationStatus;
         | 
| 988 | 
            +
              }
         | 
| 890 989 | 
             
              export interface GetAppsListRequest {
         | 
| 891 990 | 
             
                /**
         | 
| 892 991 | 
             
                 * The ID of the Firewall Manager applications list that you want the details for.
         | 
| @@ -1017,7 +1116,7 @@ declare namespace FMS { | |
| 1017 1116 | 
             
              }
         | 
| 1018 1117 | 
             
              export interface GetResourceSetRequest {
         | 
| 1019 1118 | 
             
                /**
         | 
| 1020 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 1119 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 1021 1120 | 
             
                 */
         | 
| 1022 1121 | 
             
                Identifier: Base62Id;
         | 
| 1023 1122 | 
             
              }
         | 
| @@ -1077,6 +1176,46 @@ declare namespace FMS { | |
| 1077 1176 | 
             
              export type IssueInfoMap = {[key: string]: DetailedInfo};
         | 
| 1078 1177 | 
             
              export type LengthBoundedString = string;
         | 
| 1079 1178 | 
             
              export type LengthBoundedStringList = LengthBoundedString[];
         | 
| 1179 | 
            +
              export interface ListAdminAccountsForOrganizationRequest {
         | 
| 1180 | 
            +
                /**
         | 
| 1181 | 
            +
                 * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Firewall Manager returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
         | 
| 1182 | 
            +
                 */
         | 
| 1183 | 
            +
                NextToken?: PaginationToken;
         | 
| 1184 | 
            +
                /**
         | 
| 1185 | 
            +
                 * The maximum number of objects that you want Firewall Manager to return for this request. If more objects are available, in the response, Firewall Manager provides a NextToken value that you can use in a subsequent call to get the next batch of objects.
         | 
| 1186 | 
            +
                 */
         | 
| 1187 | 
            +
                MaxResults?: PaginationMaxResults;
         | 
| 1188 | 
            +
              }
         | 
| 1189 | 
            +
              export interface ListAdminAccountsForOrganizationResponse {
         | 
| 1190 | 
            +
                /**
         | 
| 1191 | 
            +
                 * A list of Firewall Manager administrator accounts within the organization that were onboarded as administrators by AssociateAdminAccount or PutAdminAccount.
         | 
| 1192 | 
            +
                 */
         | 
| 1193 | 
            +
                AdminAccounts?: AdminAccountSummaryList;
         | 
| 1194 | 
            +
                /**
         | 
| 1195 | 
            +
                 * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Firewall Manager returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
         | 
| 1196 | 
            +
                 */
         | 
| 1197 | 
            +
                NextToken?: PaginationToken;
         | 
| 1198 | 
            +
              }
         | 
| 1199 | 
            +
              export interface ListAdminsManagingAccountRequest {
         | 
| 1200 | 
            +
                /**
         | 
| 1201 | 
            +
                 * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Firewall Manager returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
         | 
| 1202 | 
            +
                 */
         | 
| 1203 | 
            +
                NextToken?: PaginationToken;
         | 
| 1204 | 
            +
                /**
         | 
| 1205 | 
            +
                 * The maximum number of objects that you want Firewall Manager to return for this request. If more objects are available, in the response, Firewall Manager provides a NextToken value that you can use in a subsequent call to get the next batch of objects.
         | 
| 1206 | 
            +
                 */
         | 
| 1207 | 
            +
                MaxResults?: PaginationMaxResults;
         | 
| 1208 | 
            +
              }
         | 
| 1209 | 
            +
              export interface ListAdminsManagingAccountResponse {
         | 
| 1210 | 
            +
                /**
         | 
| 1211 | 
            +
                 * The list of accounts who manage member accounts within their AdminScope.
         | 
| 1212 | 
            +
                 */
         | 
| 1213 | 
            +
                AdminAccounts?: AccountIdList;
         | 
| 1214 | 
            +
                /**
         | 
| 1215 | 
            +
                 * When you request a list of objects with a MaxResults setting, if the number of objects that are still available for retrieval exceeds the maximum you requested, Firewall Manager returns a NextToken value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.
         | 
| 1216 | 
            +
                 */
         | 
| 1217 | 
            +
                NextToken?: PaginationToken;
         | 
| 1218 | 
            +
              }
         | 
| 1080 1219 | 
             
              export interface ListAppsListsRequest {
         | 
| 1081 1220 | 
             
                /**
         | 
| 1082 1221 | 
             
                 * Specifies whether the lists to retrieve are default lists owned by Firewall Manager.
         | 
| @@ -1220,7 +1359,7 @@ declare namespace FMS { | |
| 1220 1359 | 
             
              }
         | 
| 1221 1360 | 
             
              export interface ListResourceSetResourcesRequest {
         | 
| 1222 1361 | 
             
                /**
         | 
| 1223 | 
            -
                 * A unique identifier for the resource set, used in a  | 
| 1362 | 
            +
                 * A unique identifier for the resource set, used in a request to refer to the resource set.
         | 
| 1224 1363 | 
             
                 */
         | 
| 1225 1364 | 
             
                Identifier: ResourceId;
         | 
| 1226 1365 | 
             
                /**
         | 
| @@ -1621,6 +1760,23 @@ declare namespace FMS { | |
| 1621 1760 | 
             
                VpcId?: ResourceId;
         | 
| 1622 1761 | 
             
              }
         | 
| 1623 1762 | 
             
              export type OrderedRemediationActions = RemediationActionWithOrder[];
         | 
| 1763 | 
            +
              export type OrganizationStatus = "ONBOARDING"|"ONBOARDING_COMPLETE"|"OFFBOARDING"|"OFFBOARDING_COMPLETE"|string;
         | 
| 1764 | 
            +
              export type OrganizationalUnitId = string;
         | 
| 1765 | 
            +
              export type OrganizationalUnitIdList = OrganizationalUnitId[];
         | 
| 1766 | 
            +
              export interface OrganizationalUnitScope {
         | 
| 1767 | 
            +
                /**
         | 
| 1768 | 
            +
                 * The list of OUs within the organization that the specified Firewall Manager administrator either can or cannot apply policies to, based on the value of OrganizationalUnitScope$ExcludeSpecifiedOrganizationalUnits. If OrganizationalUnitScope$ExcludeSpecifiedOrganizationalUnits is set to true, then the Firewall Manager administrator can apply policies to all OUs in the organization except for the OUs in this list. If OrganizationalUnitScope$ExcludeSpecifiedOrganizationalUnits is set to false, then the Firewall Manager administrator can only apply policies to the OUs in this list.
         | 
| 1769 | 
            +
                 */
         | 
| 1770 | 
            +
                OrganizationalUnits?: OrganizationalUnitIdList;
         | 
| 1771 | 
            +
                /**
         | 
| 1772 | 
            +
                 * A boolean value that indicates if the administrator can apply policies to all OUs within an organization. If true, the administrator can manage all OUs within the organization. You can either enable management of all OUs through this operation, or you can specify OUs to manage in OrganizationalUnitScope$OrganizationalUnits. You cannot specify both.
         | 
| 1773 | 
            +
                 */
         | 
| 1774 | 
            +
                AllOrganizationalUnitsEnabled?: Boolean;
         | 
| 1775 | 
            +
                /**
         | 
| 1776 | 
            +
                 * A boolean value that excludes the OUs in OrganizationalUnitScope$OrganizationalUnits from the administrator's scope. If true, the Firewall Manager administrator can apply policies to all OUs in the organization except for the OUs listed in OrganizationalUnitScope$OrganizationalUnits. You can either specify a list of OUs to exclude by OrganizationalUnitScope$OrganizationalUnits, or you can enable management of all OUs by OrganizationalUnitScope$AllOrganizationalUnitsEnabled. You cannot specify both.
         | 
| 1777 | 
            +
                 */
         | 
| 1778 | 
            +
                ExcludeSpecifiedOrganizationalUnits?: Boolean;
         | 
| 1779 | 
            +
              }
         | 
| 1624 1780 | 
             
              export type PaginationMaxResults = number;
         | 
| 1625 1781 | 
             
              export type PaginationToken = string;
         | 
| 1626 1782 | 
             
              export interface PartialMatch {
         | 
| @@ -1691,6 +1847,10 @@ declare namespace FMS { | |
| 1691 1847 | 
             
                 * The definition of the Network Firewall firewall policy.
         | 
| 1692 1848 | 
             
                 */
         | 
| 1693 1849 | 
             
                PolicyDescription?: ResourceDescription;
         | 
| 1850 | 
            +
                /**
         | 
| 1851 | 
            +
                 * Indicates whether the policy is in or out of an admin's policy or Region scope.    ACTIVE - The administrator can manage and delete the policy.    OUT_OF_ADMIN_SCOPE - The administrator can view the policy, but they can't edit or delete the policy. Existing policy protections stay in place. Any new resources that come into scope of the policy won't be protected.  
         | 
| 1852 | 
            +
                 */
         | 
| 1853 | 
            +
                PolicyStatus?: CustomerPolicyStatus;
         | 
| 1694 1854 | 
             
              }
         | 
| 1695 1855 | 
             
              export interface PolicyComplianceDetail {
         | 
| 1696 1856 | 
             
                /**
         | 
| @@ -1794,8 +1954,22 @@ declare namespace FMS { | |
| 1794 1954 | 
             
                 * Indicates whether Firewall Manager should automatically remove protections from resources that leave the policy scope and clean up resources that Firewall Manager is managing for accounts when those accounts leave policy scope. For example, Firewall Manager will disassociate a Firewall Manager managed web ACL from a protected customer resource when the customer resource leaves policy scope.  By default, Firewall Manager doesn't remove protections or delete Firewall Manager managed resources.  This option is not available for Shield Advanced or WAF Classic policies.
         | 
| 1795 1955 | 
             
                 */
         | 
| 1796 1956 | 
             
                DeleteUnusedFMManagedResources?: Boolean;
         | 
| 1957 | 
            +
                /**
         | 
| 1958 | 
            +
                 * Indicates whether the policy is in or out of an admin's policy or Region scope.    ACTIVE - The administrator can manage and delete the policy.    OUT_OF_ADMIN_SCOPE - The administrator can view the policy, but they can't edit or delete the policy. Existing policy protections stay in place. Any new resources that come into scope of the policy won't be protected.  
         | 
| 1959 | 
            +
                 */
         | 
| 1960 | 
            +
                PolicyStatus?: CustomerPolicyStatus;
         | 
| 1797 1961 | 
             
              }
         | 
| 1798 1962 | 
             
              export type PolicySummaryList = PolicySummary[];
         | 
| 1963 | 
            +
              export interface PolicyTypeScope {
         | 
| 1964 | 
            +
                /**
         | 
| 1965 | 
            +
                 * The list of policy types that the specified Firewall Manager administrator can manage.
         | 
| 1966 | 
            +
                 */
         | 
| 1967 | 
            +
                PolicyTypes?: SecurityServiceTypeList;
         | 
| 1968 | 
            +
                /**
         | 
| 1969 | 
            +
                 * Allows the specified Firewall Manager administrator to manage all Firewall Manager policy types, except for third-party policy types. Third-party policy types can only be managed by the Firewall Manager default administrator.
         | 
| 1970 | 
            +
                 */
         | 
| 1971 | 
            +
                AllPolicyTypesEnabled?: Boolean;
         | 
| 1972 | 
            +
              }
         | 
| 1799 1973 | 
             
              export type PolicyUpdateToken = string;
         | 
| 1800 1974 | 
             
              export interface PossibleRemediationAction {
         | 
| 1801 1975 | 
             
                /**
         | 
| @@ -1878,6 +2052,16 @@ declare namespace FMS { | |
| 1878 2052 | 
             
                ProtocolsList?: ProtocolsList;
         | 
| 1879 2053 | 
             
              }
         | 
| 1880 2054 | 
             
              export type ProtocolsListsData = ProtocolsListDataSummary[];
         | 
| 2055 | 
            +
              export interface PutAdminAccountRequest {
         | 
| 2056 | 
            +
                /**
         | 
| 2057 | 
            +
                 * The Amazon Web Services account ID to add as an Firewall Manager administrator account. The account must be a member of the organization that was onboarded to Firewall Manager by AssociateAdminAccount. For more information about Organizations, see Managing the Amazon Web Services Accounts in Your Organization.
         | 
| 2058 | 
            +
                 */
         | 
| 2059 | 
            +
                AdminAccount: AWSAccountId;
         | 
| 2060 | 
            +
                /**
         | 
| 2061 | 
            +
                 * Configures the resources that the specified Firewall Manager administrator can manage. As a best practice, set the administrative scope according to the principles of least privilege. Only grant the administrator the specific resources or permissions that they need to perform the duties of their role.
         | 
| 2062 | 
            +
                 */
         | 
| 2063 | 
            +
                AdminScope?: AdminScope;
         | 
| 2064 | 
            +
              }
         | 
| 1881 2065 | 
             
              export interface PutAppsListRequest {
         | 
| 1882 2066 | 
             
                /**
         | 
| 1883 2067 | 
             
                 * The details of the Firewall Manager applications list to be created.
         | 
| @@ -1969,6 +2153,16 @@ declare namespace FMS { | |
| 1969 2153 | 
             
                ResourceSetArn: ResourceArn;
         | 
| 1970 2154 | 
             
              }
         | 
| 1971 2155 | 
             
              export type ReferenceRule = string;
         | 
| 2156 | 
            +
              export interface RegionScope {
         | 
| 2157 | 
            +
                /**
         | 
| 2158 | 
            +
                 * The Amazon Web Services Regions that the specified Firewall Manager administrator can perform actions in.
         | 
| 2159 | 
            +
                 */
         | 
| 2160 | 
            +
                Regions?: AWSRegionList;
         | 
| 2161 | 
            +
                /**
         | 
| 2162 | 
            +
                 * Allows the specified Firewall Manager administrator to manage all Amazon Web Services Regions.
         | 
| 2163 | 
            +
                 */
         | 
| 2164 | 
            +
                AllRegionsEnabled?: Boolean;
         | 
| 2165 | 
            +
              }
         | 
| 1972 2166 | 
             
              export interface RemediationAction {
         | 
| 1973 2167 | 
             
                /**
         | 
| 1974 2168 | 
             
                 * A description of a remediation action.
         | 
| @@ -2061,8 +2255,13 @@ declare namespace FMS { | |
| 2061 2255 | 
             
                 * The last time that the resource set was changed.
         | 
| 2062 2256 | 
             
                 */
         | 
| 2063 2257 | 
             
                LastUpdateTime?: TimeStamp;
         | 
| 2258 | 
            +
                /**
         | 
| 2259 | 
            +
                 * Indicates whether the resource set is in or out of an admin's Region scope.    ACTIVE - The administrator can manage and delete the resource set.    OUT_OF_ADMIN_SCOPE - The administrator can view the resource set, but they can't edit or delete the resource set. Existing protections stay in place. Any new resource that come into scope of the resource set won't be protected.  
         | 
| 2260 | 
            +
                 */
         | 
| 2261 | 
            +
                ResourceSetStatus?: ResourceSetStatus;
         | 
| 2064 2262 | 
             
              }
         | 
| 2065 2263 | 
             
              export type ResourceSetIds = Base62Id[];
         | 
| 2264 | 
            +
              export type ResourceSetStatus = "ACTIVE"|"OUT_OF_ADMIN_SCOPE"|string;
         | 
| 2066 2265 | 
             
              export interface ResourceSetSummary {
         | 
| 2067 2266 | 
             
                /**
         | 
| 2068 2267 | 
             
                 * A unique identifier for the resource set. This ID is returned in the responses to create and list commands. You provide it to operations like update and delete.
         | 
| @@ -2080,6 +2279,10 @@ declare namespace FMS { | |
| 2080 2279 | 
             
                 * The last time that the resource set was changed.
         | 
| 2081 2280 | 
             
                 */
         | 
| 2082 2281 | 
             
                LastUpdateTime?: TimeStamp;
         | 
| 2282 | 
            +
                /**
         | 
| 2283 | 
            +
                 * Indicates whether the resource set is in or out of an admin's Region scope.    ACTIVE - The administrator can manage and delete the resource set.    OUT_OF_ADMIN_SCOPE - The administrator can view the resource set, but they can't edit or delete the resource set. Existing protections stay in place. Any new resource that come into scope of the resource set won't be protected.  
         | 
| 2284 | 
            +
                 */
         | 
| 2285 | 
            +
                ResourceSetStatus?: ResourceSetStatus;
         | 
| 2083 2286 | 
             
              }
         | 
| 2084 2287 | 
             
              export type ResourceSetSummaryList = ResourceSetSummary[];
         | 
| 2085 2288 | 
             
              export interface ResourceTag {
         | 
| @@ -2310,7 +2513,7 @@ declare namespace FMS { | |
| 2310 2513 | 
             
                 */
         | 
| 2311 2514 | 
             
                Type: SecurityServiceType;
         | 
| 2312 2515 | 
             
                /**
         | 
| 2313 | 
            -
                 * Details about the service that are specific to the service type, in JSON format.    Example: DNS_FIREWALL   "{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}"   Valid values for preProcessRuleGroups are between 1 and 99. Valid values for postProcessRuleGroups are between 9901 and 10000.    Example: NETWORK_FIREWALL - Centralized deployment model  "{\"type\":\"NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}},\"firewallDeploymentModel\":{\"centralizedFirewallDeploymentModel\":{\"centralizedFirewallOrchestrationConfig\":{\"inspectionVpcIds\":[{\"resourceId\":\"vpc-1234\",\"accountId\":\"123456789011\"}],\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"allowedIPV4CidrList\":[]}}}}"   To use the centralized deployment model, you must set PolicyOption to CENTRALIZED.    Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration   "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"OFF\"},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}"    With automatic Availbility Zone configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration and route management   "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"]},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\": \"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}"   To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration  "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\", \"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{ \"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[ \"10.0.0.0/28\"]}]} },\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"OFF\",\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}"    With custom Availability Zone configuration, you define which specific Availability Zones to create endpoints in by configuring firewallCreationConfig. To configure the Availability Zones in firewallCreationConfig, specify either the availabilityZoneName or availabilityZoneId parameter, not both parameters.  To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration and route management  "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"],\"routeManagementConfig\":{\"allowCrossAZTrafficIfNoEndpoint\":true}},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}"   To use the distributed deployment model, you must set PolicyOption to NULL.    Example: THIRD_PARTY_FIREWALL   "{ "type":"THIRD_PARTY_FIREWALL", "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW", "thirdPartyFirewallConfig":{ "thirdPartyFirewallPolicyList":["global-1"] }, "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{ "distributedFirewallOrchestrationConfig":{ "firewallCreationConfig":{ "endpointLocation":{ "availabilityZoneConfigList":[ { "availabilityZoneName":"${AvailabilityZone}" } ] } }, "allowedIPV4CidrList":[ ] } } } }"    Example: SECURITY_GROUPS_COMMON   "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}"    Example: SECURITY_GROUPS_COMMON - Security group tag distribution   ""{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":false,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":false,\"enableTagDistribution\":true}""   Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set revertManualSecurityGroupChanges to true, otherwise Firewall Manager won't be able to create the policy. When you enable revertManualSecurityGroupChanges, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant.   Firewall Manager won't distrubute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the aws: prefix.    Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as well as to those in VPCs that the account owns   "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}"    Example: SECURITY_GROUPS_CONTENT_AUDIT   "{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}"  The security group action for content audit can be ALLOW or DENY. For ALLOW, all in-scope security group rules must be within the allowed range of the policy's security group rules. For DENY, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group.   Example: SECURITY_GROUPS_USAGE_AUDIT   "{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true}"    Specification for SHIELD_ADVANCED for Amazon CloudFront distributions   "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\", \"automaticResponseAction\":\"BLOCK|COUNT\"}, \"overrideCustomerWebaclClassic\":true|false}"  For example: "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED\", \"automaticResponseAction\":\"COUNT\"}}"  The default value for automaticResponseStatus is IGNORED. The value for automaticResponseAction is only required when automaticResponseStatus is set to ENABLED. The default value for overrideCustomerWebaclClassic is false. For other resource types that you can protect with a Shield Advanced policy, this ManagedServiceData configuration is an empty string.   Example: WAFV2   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"  In the loggingConfiguration, you can specify one logDestinationConfigs, you can optionally provide up to 20 redactedFields, and the RedactedFieldType must be one of URI, QUERY_STRING, HEADER, or METHOD.   Example: WAFV2 - Firewall Manager support for WAF managed rule group versioning   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"   To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set versionEnabled to true, and set version to the version you'd like to use. If you don't set versionEnabled to true, or if you omit versionEnabled, then Firewall Manager uses the default version of the WAF managed rule group.    Example: WAF Classic   "{\"type\": \"WAF\", \"ruleGroups\": [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"   
         | 
| 2516 | 
            +
                 * Details about the service that are specific to the service type, in JSON format.    Example: DNS_FIREWALL   "{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}"   Valid values for preProcessRuleGroups are between 1 and 99. Valid values for postProcessRuleGroups are between 9901 and 10000.    Example: IMPORT_NETWORK_FIREWALL "{\"type\":\"IMPORT_NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:drop\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:pass\"],\"networkFirewallStatelessCustomActions\":[],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder\",\"priority\":8}],\"networkFirewallStatefulEngineOptions\":{\"ruleOrder\":\"STRICT_ORDER\"},\"networkFirewallStatefulDefaultActions\":[\"aws:drop_strict\"]}}"   "{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}"   Valid values for preProcessRuleGroups are between 1 and 99. Valid values for postProcessRuleGroups are between 9901 and 10000.    Example: NETWORK_FIREWALL - Centralized deployment model  "{\"type\":\"NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}},\"firewallDeploymentModel\":{\"centralizedFirewallDeploymentModel\":{\"centralizedFirewallOrchestrationConfig\":{\"inspectionVpcIds\":[{\"resourceId\":\"vpc-1234\",\"accountId\":\"123456789011\"}],\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"allowedIPV4CidrList\":[]}}}}"   To use the centralized deployment model, you must set PolicyOption to CENTRALIZED.    Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration   "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"OFF\"},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}"    With automatic Availbility Zone configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with automatic Availability Zone configuration and route management   "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":[\"10.0.0.0/28\",\"192.168.0.0/28\"],\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"]},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\": \"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}}"   To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration  "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\", \"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{ \"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[ \"10.0.0.0/28\"]}]} },\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"OFF\",\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}"    With custom Availability Zone configuration, you define which specific Availability Zones to create endpoints in by configuring firewallCreationConfig. To configure the Availability Zones in firewallCreationConfig, specify either the availabilityZoneName or availabilityZoneId parameter, not both parameters.  To use the distributed deployment model, you must set PolicyOption to NULL.    Example: NETWORK_FIREWALL - Distributed deployment model with custom Availability Zone configuration and route management  "{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"fragmentcustomactionname\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}},{\"actionName\":\"fragmentcustomactionname\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"fragmentmetricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]},{\"availabilityZoneName\":\"us-east-1b\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"singleFirewallEndpointPerVPC\":false,\"allowedIPV4CidrList\":null,\"routeManagementAction\":\"MONITOR\",\"routeManagementTargetTypes\":[\"InternetGateway\"],\"routeManagementConfig\":{\"allowCrossAZTrafficIfNoEndpoint\":true}},\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":boolean}}"   To use the distributed deployment model, you must set PolicyOption to NULL.    Example: THIRD_PARTY_FIREWALL   "{ "type":"THIRD_PARTY_FIREWALL", "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW", "thirdPartyFirewallConfig":{ "thirdPartyFirewallPolicyList":["global-1"] }, "firewallDeploymentModel":{ "distributedFirewallDeploymentModel":{ "distributedFirewallOrchestrationConfig":{ "firewallCreationConfig":{ "endpointLocation":{ "availabilityZoneConfigList":[ { "availabilityZoneName":"${AvailabilityZone}" } ] } }, "allowedIPV4CidrList":[ ] } } } }"    Example: SECURITY_GROUPS_COMMON   "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}"    Example: SECURITY_GROUPS_COMMON - Security group tag distribution   ""{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":false,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":false,\"enableTagDistribution\":true}""   Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set revertManualSecurityGroupChanges to true, otherwise Firewall Manager won't be able to create the policy. When you enable revertManualSecurityGroupChanges, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant.   Firewall Manager won't distrubute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the aws: prefix.    Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as well as to those in VPCs that the account owns   "{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false, \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\" sg-000e55995d61a06bd\"}]}"    Example: SECURITY_GROUPS_CONTENT_AUDIT   "{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}"  The security group action for content audit can be ALLOW or DENY. For ALLOW, all in-scope security group rules must be within the allowed range of the policy's security group rules. For DENY, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group.   Example: SECURITY_GROUPS_USAGE_AUDIT   "{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true}"    Specification for SHIELD_ADVANCED for Amazon CloudFront distributions   "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\", \"automaticResponseAction\":\"BLOCK|COUNT\"}, \"overrideCustomerWebaclClassic\":true|false}"  For example: "{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\": {\"automaticResponseStatus\":\"ENABLED\", \"automaticResponseAction\":\"COUNT\"}}"  The default value for automaticResponseStatus is IGNORED. The value for automaticResponseAction is only required when automaticResponseStatus is set to ENABLED. The default value for overrideCustomerWebaclClassic is false. For other resource types that you can protect with a Shield Advanced policy, this ManagedServiceData configuration is an empty string.   Example: WAFV2 - Account takeover prevention and Bot Control managed rule groups, and rule action override   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":null,\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesATPRuleSet\",\"managedRuleGroupConfigs\":[{\"awsmanagedRulesATPRuleSet\":{\"loginPath\":\"/loginpath\",\"requestInspection\":{\"payloadType\":\"FORM_ENCODED|JSON\",\"usernameField\":{\"identifier\":\"/form/username\"},\"passwordField\":{\"identifier\":\"/form/password\"}}}}]},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[],\"sampledRequestsEnabled\":true},{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":null,\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesBotControlRuleSet\",\"managedRuleGroupConfigs\":[{\"awsmanagedRulesBotControlRuleSet\":{\"inspectionLevel\":\"TARGETED|COMMON\"}}]},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[],\"sampledRequestsEnabled\":true,\"ruleActionOverrides\":[{\"name\":\"Rule1\",\"actionToUse\":{\"allow|block|count|captcha|challenge\":{}}},{\"name\":\"Rule2\",\"actionToUse\":{\"allow|block|count|captcha|challenge\":{}}}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"customRequestHandling\":null,\"customResponse\":null,\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":null,\"sampledRequestsEnabledForDefaultActions\":true}"    Fraud Control account takeover prevention (ATP) - For information about the properties available for AWSManagedRulesATPRuleSet managed rule groups, see AWSManagedRulesATPRuleSet in the WAF API Reference.   Bot Control - For information about AWSManagedRulesBotControlRuleSet managed rule groups, see AWSManagedRulesBotControlRuleSet in the WAF API Reference.   Rule action overrides - Firewall Manager supports rule action overrides only for managed rule groups. To configure a RuleActionOverrides add the Name of the rule to override, and ActionToUse, which is the new action to use for the rule. For information about using rule action override, see RuleActionOverride in the WAF API Reference.     Example: WAFV2 - CAPTCHA and Challenge configs   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":null,\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAdminProtectionRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[],\"sampledRequestsEnabled\":true}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"customRequestHandling\":null,\"customResponse\":null,\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":null,\"sampledRequestsEnabledForDefaultActions\":true,\"captchaConfig\":{\"immunityTimeProperty\":{\"immunityTime\":500}},\"challengeConfig\":{\"immunityTimeProperty\":{\"immunityTime\":800}},\"tokenDomains\":[\"google.com\",\"amazon.com\"]}"  If you update the policy's values for captchaConfig, challengeConfig, or tokenDomains, Firewall Manager will overwrite your local web ACLs to contain the new value(s). However, if you don't update the policy's captchaConfig, challengeConfig, or tokenDomains values, the values in your local web ACLs will remain unchanged. For information about CAPTCHA and Challenge configs, see CaptchaConfig and ChallengeConfig in the WAF API Reference.   Example: WAFV2 - Firewall Manager support for WAF managed rule group versioning   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"   To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set versionEnabled to true, and set version to the version you'd like to use. If you don't set versionEnabled to true, or if you omit versionEnabled, then Firewall Manager uses the default version of the WAF managed rule group.    Example: WAFV2 - Logging configurations   "{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null, \"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\": {\"versionEnabled\":null,\"version\":null,\"vendorName\":\"AWS\", \"managedRuleGroupName\":\"AWSManagedRulesAdminProtectionRuleSet\"} ,\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[], \"sampledRequestsEnabled\":true}],\"postProcessRuleGroups\":[], \"defaultAction\":{\"type\":\"ALLOW\"},\"customRequestHandling\" :null,\"customResponse\":null,\"overrideCustomerWebACLAssociation\" :false,\"loggingConfiguration\":{\"logDestinationConfigs\": [\"arn:aws:s3:::aws-waf-logs-example-bucket\"] ,\"redactedFields\":[],\"loggingFilterConfigs\":{\"defaultBehavior\":\"KEEP\", \"filters\":[{\"behavior\":\"KEEP\",\"requirement\":\"MEETS_ALL\", \"conditions\":[{\"actionCondition\":\"CAPTCHA\"},{\"actionCondition\": \"CHALLENGE\"}, {\"actionCondition\":\"EXCLUDED_AS_COUNT\"}]}]}},\"sampledRequestsEnabledForDefaultActions\":true}"  Firewall Manager supports Amazon Kinesis Data Firehose and Amazon S3 as the logDestinationConfigs in your loggingConfiguration. For information about WAF logging configurations, see LoggingConfiguration in the WAF API Reference  In the loggingConfiguration, you can specify one logDestinationConfigs. Optionally provide as many as 20 redactedFields. The RedactedFieldType must be one of URI, QUERY_STRING, HEADER, or METHOD.   Example: WAF Classic   "{\"type\": \"WAF\", \"ruleGroups\": [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"   
         | 
| 2314 2517 | 
             
                 */
         | 
| 2315 2518 | 
             
                ManagedServiceData?: ManagedServiceData;
         | 
| 2316 2519 | 
             
                /**
         | 
| @@ -2319,6 +2522,7 @@ declare namespace FMS { | |
| 2319 2522 | 
             
                PolicyOption?: PolicyOption;
         | 
| 2320 2523 | 
             
              }
         | 
| 2321 2524 | 
             
              export type SecurityServiceType = "WAF"|"WAFV2"|"SHIELD_ADVANCED"|"SECURITY_GROUPS_COMMON"|"SECURITY_GROUPS_CONTENT_AUDIT"|"SECURITY_GROUPS_USAGE_AUDIT"|"NETWORK_FIREWALL"|"DNS_FIREWALL"|"THIRD_PARTY_FIREWALL"|"IMPORT_NETWORK_FIREWALL"|string;
         | 
| 2525 | 
            +
              export type SecurityServiceTypeList = SecurityServiceType[];
         | 
| 2322 2526 | 
             
              export interface StatefulEngineOptions {
         | 
| 2323 2527 | 
             
                /**
         | 
| 2324 2528 | 
             
                 * Indicates how to manage the order of stateful rule evaluation for the policy. DEFAULT_ACTION_ORDER is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
         |