aws-sdk-networkfirewall 1.22.0 → 1.24.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 33bff6d59d08b1ff2709ea6ed6c84b9cb741396124c4ec779f7a05206b1865e0
4
- data.tar.gz: 64feff96312cecb749cfe6c05de7f34cd2a8aee98af3b9db697df69e401c77ef
3
+ metadata.gz: 6fce82612a358691970d88bb092d9de077faada06826631942df9ae670af688f
4
+ data.tar.gz: 13bcd7100b48ead038833d3071212a757519fe7b307e0ad3387bffc78ab12c7f
5
5
  SHA512:
6
- metadata.gz: bd934630272b32a572bf1ba211c8172e422a3bfe5b1351b6d2467a34502db2faa9d46d8e7958a0f7586d7b39f01aef23a5f125d47cbfedf669146e42f336c584
7
- data.tar.gz: d37afe8ee582b7bdb17924f9f814d5fe5fa3e0bfd0bf5931cea9bf457982711559d3a8908f6cc5cc6b7d6350fd95c413d04c9450d18a3a8121669ce99b5218c6
6
+ metadata.gz: fd474df2be5bdc89d796f5491d2e4ba3b2694e9400bd8c091a4ef4ca8637984710ecc20ed00830384a9dcdc650853af2b986e961cc1d58ca23d79c7d444660e7
7
+ data.tar.gz: c45dffac50e57dacc9428905933b8f98b3e4352e1a671ac0c3bd8f831cd8abaefd5cb70166a224529866e071e7752e3946a17953d244088a415a9ae864693023
data/CHANGELOG.md CHANGED
@@ -1,6 +1,18 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.24.0 (2023-01-18)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ * Issue - Replace runtime endpoint resolution approach with generated ruby code.
10
+
11
+ 1.23.0 (2023-01-17)
12
+ ------------------
13
+
14
+ * Feature - Network Firewall now allows creation of dual stack endpoints, enabling inspection of IPv6 traffic.
15
+
4
16
  1.22.0 (2023-01-09)
5
17
  ------------------
6
18
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.22.0
1
+ 1.24.0
@@ -509,6 +509,7 @@ module Aws::NetworkFirewall
509
509
  # subnet_mappings: [ # required
510
510
  # {
511
511
  # subnet_id: "CollectionMember_String", # required
512
+ # ip_address_type: "DUALSTACK", # accepts DUALSTACK, IPV4
512
513
  # },
513
514
  # ],
514
515
  # })
@@ -519,6 +520,7 @@ module Aws::NetworkFirewall
519
520
  # resp.firewall_name #=> String
520
521
  # resp.subnet_mappings #=> Array
521
522
  # resp.subnet_mappings[0].subnet_id #=> String
523
+ # resp.subnet_mappings[0].ip_address_type #=> String, one of "DUALSTACK", "IPV4"
522
524
  # resp.update_token #=> String
523
525
  #
524
526
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/AssociateSubnets AWS API Documentation
@@ -618,6 +620,7 @@ module Aws::NetworkFirewall
618
620
  # subnet_mappings: [ # required
619
621
  # {
620
622
  # subnet_id: "CollectionMember_String", # required
623
+ # ip_address_type: "DUALSTACK", # accepts DUALSTACK, IPV4
621
624
  # },
622
625
  # ],
623
626
  # delete_protection: false,
@@ -644,6 +647,7 @@ module Aws::NetworkFirewall
644
647
  # resp.firewall.vpc_id #=> String
645
648
  # resp.firewall.subnet_mappings #=> Array
646
649
  # resp.firewall.subnet_mappings[0].subnet_id #=> String
650
+ # resp.firewall.subnet_mappings[0].ip_address_type #=> String, one of "DUALSTACK", "IPV4"
647
651
  # resp.firewall.delete_protection #=> Boolean
648
652
  # resp.firewall.subnet_change_protection #=> Boolean
649
653
  # resp.firewall.firewall_policy_change_protection #=> Boolean
@@ -1137,6 +1141,7 @@ module Aws::NetworkFirewall
1137
1141
  # resp.firewall.vpc_id #=> String
1138
1142
  # resp.firewall.subnet_mappings #=> Array
1139
1143
  # resp.firewall.subnet_mappings[0].subnet_id #=> String
1144
+ # resp.firewall.subnet_mappings[0].ip_address_type #=> String, one of "DUALSTACK", "IPV4"
1140
1145
  # resp.firewall.delete_protection #=> Boolean
1141
1146
  # resp.firewall.subnet_change_protection #=> Boolean
1142
1147
  # resp.firewall.firewall_policy_change_protection #=> Boolean
@@ -1345,6 +1350,7 @@ module Aws::NetworkFirewall
1345
1350
  # resp.firewall.vpc_id #=> String
1346
1351
  # resp.firewall.subnet_mappings #=> Array
1347
1352
  # resp.firewall.subnet_mappings[0].subnet_id #=> String
1353
+ # resp.firewall.subnet_mappings[0].ip_address_type #=> String, one of "DUALSTACK", "IPV4"
1348
1354
  # resp.firewall.delete_protection #=> Boolean
1349
1355
  # resp.firewall.subnet_change_protection #=> Boolean
1350
1356
  # resp.firewall.firewall_policy_change_protection #=> Boolean
@@ -1767,6 +1773,7 @@ module Aws::NetworkFirewall
1767
1773
  # resp.firewall_name #=> String
1768
1774
  # resp.subnet_mappings #=> Array
1769
1775
  # resp.subnet_mappings[0].subnet_id #=> String
1776
+ # resp.subnet_mappings[0].ip_address_type #=> String, one of "DUALSTACK", "IPV4"
1770
1777
  # resp.update_token #=> String
1771
1778
  #
1772
1779
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DisassociateSubnets AWS API Documentation
@@ -3007,7 +3014,7 @@ module Aws::NetworkFirewall
3007
3014
  params: params,
3008
3015
  config: config)
3009
3016
  context[:gem_name] = 'aws-sdk-networkfirewall'
3010
- context[:gem_version] = '1.22.0'
3017
+ context[:gem_version] = '1.24.0'
3011
3018
  Seahorse::Client::Request.new(handlers, context)
3012
3019
  end
3013
3020
 
@@ -86,6 +86,7 @@ module Aws::NetworkFirewall
86
86
  HashMapKey = Shapes::StringShape.new(name: 'HashMapKey')
87
87
  HashMapValue = Shapes::StringShape.new(name: 'HashMapValue')
88
88
  Header = Shapes::StructureShape.new(name: 'Header')
89
+ IPAddressType = Shapes::StringShape.new(name: 'IPAddressType')
89
90
  IPSet = Shapes::StructureShape.new(name: 'IPSet')
90
91
  IPSetArn = Shapes::StringShape.new(name: 'IPSetArn')
91
92
  IPSetMetadata = Shapes::StructureShape.new(name: 'IPSetMetadata')
@@ -740,6 +741,7 @@ module Aws::NetworkFirewall
740
741
  StatelessRulesAndCustomActions.struct_class = Types::StatelessRulesAndCustomActions
741
742
 
742
743
  SubnetMapping.add_member(:subnet_id, Shapes::ShapeRef.new(shape: CollectionMember_String, required: true, location_name: "SubnetId"))
744
+ SubnetMapping.add_member(:ip_address_type, Shapes::ShapeRef.new(shape: IPAddressType, location_name: "IPAddressType"))
743
745
  SubnetMapping.struct_class = Types::SubnetMapping
744
746
 
745
747
  SubnetMappings.member = Shapes::ShapeRef.new(shape: SubnetMapping)
@@ -9,103 +9,43 @@
9
9
 
10
10
  module Aws::NetworkFirewall
11
11
  class EndpointProvider
12
- def initialize(rule_set = nil)
13
- @@rule_set ||= begin
14
- endpoint_rules = Aws::Json.load(Base64.decode64(RULES))
15
- Aws::Endpoints::RuleSet.new(
16
- version: endpoint_rules['version'],
17
- service_id: endpoint_rules['serviceId'],
18
- parameters: endpoint_rules['parameters'],
19
- rules: endpoint_rules['rules']
20
- )
12
+ def resolve_endpoint(parameters)
13
+ region = parameters.region
14
+ use_dual_stack = parameters.use_dual_stack
15
+ use_fips = parameters.use_fips
16
+ endpoint = parameters.endpoint
17
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
+ if Aws::Endpoints::Matchers.set?(endpoint)
19
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
21
+ end
22
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
24
+ end
25
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
26
+ end
27
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
28
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
29
+ return Aws::Endpoints::Endpoint.new(url: "https://network-firewall-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
30
+ end
31
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
32
+ end
33
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
34
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ return Aws::Endpoints::Endpoint.new(url: "https://network-firewall-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
36
+ end
37
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
38
+ end
39
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
40
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
41
+ return Aws::Endpoints::Endpoint.new(url: "https://network-firewall.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
42
+ end
43
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
44
+ end
45
+ return Aws::Endpoints::Endpoint.new(url: "https://network-firewall.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
21
46
  end
22
- @provider = Aws::Endpoints::RulesProvider.new(rule_set || @@rule_set)
23
- end
47
+ raise ArgumentError, 'No endpoint could be resolved'
24
48
 
25
- def resolve_endpoint(parameters)
26
- @provider.resolve_endpoint(parameters)
27
49
  end
28
-
29
- # @api private
30
- RULES = <<-JSON
31
- eyJ2ZXJzaW9uIjoiMS4wIiwicGFyYW1ldGVycyI6eyJSZWdpb24iOnsiYnVp
32
- bHRJbiI6IkFXUzo6UmVnaW9uIiwicmVxdWlyZWQiOnRydWUsImRvY3VtZW50
33
- YXRpb24iOiJUaGUgQVdTIHJlZ2lvbiB1c2VkIHRvIGRpc3BhdGNoIHRoZSBy
34
- ZXF1ZXN0LiIsInR5cGUiOiJTdHJpbmcifSwiVXNlRHVhbFN0YWNrIjp7ImJ1
35
- aWx0SW4iOiJBV1M6OlVzZUR1YWxTdGFjayIsInJlcXVpcmVkIjp0cnVlLCJk
36
- ZWZhdWx0IjpmYWxzZSwiZG9jdW1lbnRhdGlvbiI6IldoZW4gdHJ1ZSwgdXNl
37
- IHRoZSBkdWFsLXN0YWNrIGVuZHBvaW50LiBJZiB0aGUgY29uZmlndXJlZCBl
38
- bmRwb2ludCBkb2VzIG5vdCBzdXBwb3J0IGR1YWwtc3RhY2ssIGRpc3BhdGNo
39
- aW5nIHRoZSByZXF1ZXN0IE1BWSByZXR1cm4gYW4gZXJyb3IuIiwidHlwZSI6
40
- IkJvb2xlYW4ifSwiVXNlRklQUyI6eyJidWlsdEluIjoiQVdTOjpVc2VGSVBT
41
- IiwicmVxdWlyZWQiOnRydWUsImRlZmF1bHQiOmZhbHNlLCJkb2N1bWVudGF0
42
- aW9uIjoiV2hlbiB0cnVlLCBzZW5kIHRoaXMgcmVxdWVzdCB0byB0aGUgRklQ
43
- Uy1jb21wbGlhbnQgcmVnaW9uYWwgZW5kcG9pbnQuIElmIHRoZSBjb25maWd1
44
- cmVkIGVuZHBvaW50IGRvZXMgbm90IGhhdmUgYSBGSVBTIGNvbXBsaWFudCBl
45
- bmRwb2ludCwgZGlzcGF0Y2hpbmcgdGhlIHJlcXVlc3Qgd2lsbCByZXR1cm4g
46
- YW4gZXJyb3IuIiwidHlwZSI6IkJvb2xlYW4ifSwiRW5kcG9pbnQiOnsiYnVp
47
- bHRJbiI6IlNESzo6RW5kcG9pbnQiLCJyZXF1aXJlZCI6ZmFsc2UsImRvY3Vt
48
- ZW50YXRpb24iOiJPdmVycmlkZSB0aGUgZW5kcG9pbnQgdXNlZCB0byBzZW5k
49
- IHRoaXMgcmVxdWVzdCIsInR5cGUiOiJTdHJpbmcifX0sInJ1bGVzIjpbeyJj
50
- b25kaXRpb25zIjpbeyJmbiI6ImF3cy5wYXJ0aXRpb24iLCJhcmd2IjpbeyJy
51
- ZWYiOiJSZWdpb24ifV0sImFzc2lnbiI6IlBhcnRpdGlvblJlc3VsdCJ9XSwi
52
- dHlwZSI6InRyZWUiLCJydWxlcyI6W3siY29uZGl0aW9ucyI6W3siZm4iOiJp
53
- c1NldCIsImFyZ3YiOlt7InJlZiI6IkVuZHBvaW50In1dfV0sInR5cGUiOiJ0
54
- cmVlIiwicnVsZXMiOlt7ImNvbmRpdGlvbnMiOlt7ImZuIjoiYm9vbGVhbkVx
55
- dWFscyIsImFyZ3YiOlt7InJlZiI6IlVzZUZJUFMifSx0cnVlXX1dLCJlcnJv
56
- ciI6IkludmFsaWQgQ29uZmlndXJhdGlvbjogRklQUyBhbmQgY3VzdG9tIGVu
57
- ZHBvaW50IGFyZSBub3Qgc3VwcG9ydGVkIiwidHlwZSI6ImVycm9yIn0seyJj
58
- b25kaXRpb25zIjpbXSwidHlwZSI6InRyZWUiLCJydWxlcyI6W3siY29uZGl0
59
- aW9ucyI6W3siZm4iOiJib29sZWFuRXF1YWxzIiwiYXJndiI6W3sicmVmIjoi
60
- VXNlRHVhbFN0YWNrIn0sdHJ1ZV19XSwiZXJyb3IiOiJJbnZhbGlkIENvbmZp
61
- Z3VyYXRpb246IER1YWxzdGFjayBhbmQgY3VzdG9tIGVuZHBvaW50IGFyZSBu
62
- b3Qgc3VwcG9ydGVkIiwidHlwZSI6ImVycm9yIn0seyJjb25kaXRpb25zIjpb
63
- XSwiZW5kcG9pbnQiOnsidXJsIjp7InJlZiI6IkVuZHBvaW50In0sInByb3Bl
64
- cnRpZXMiOnt9LCJoZWFkZXJzIjp7fX0sInR5cGUiOiJlbmRwb2ludCJ9XX1d
65
- fSx7ImNvbmRpdGlvbnMiOlt7ImZuIjoiYm9vbGVhbkVxdWFscyIsImFyZ3Yi
66
- Olt7InJlZiI6IlVzZUZJUFMifSx0cnVlXX0seyJmbiI6ImJvb2xlYW5FcXVh
67
- bHMiLCJhcmd2IjpbeyJyZWYiOiJVc2VEdWFsU3RhY2sifSx0cnVlXX1dLCJ0
68
- eXBlIjoidHJlZSIsInJ1bGVzIjpbeyJjb25kaXRpb25zIjpbeyJmbiI6ImJv
69
- b2xlYW5FcXVhbHMiLCJhcmd2IjpbdHJ1ZSx7ImZuIjoiZ2V0QXR0ciIsImFy
70
- Z3YiOlt7InJlZiI6IlBhcnRpdGlvblJlc3VsdCJ9LCJzdXBwb3J0c0ZJUFMi
71
- XX1dfSx7ImZuIjoiYm9vbGVhbkVxdWFscyIsImFyZ3YiOlt0cnVlLHsiZm4i
72
- OiJnZXRBdHRyIiwiYXJndiI6W3sicmVmIjoiUGFydGl0aW9uUmVzdWx0In0s
73
- InN1cHBvcnRzRHVhbFN0YWNrIl19XX1dLCJ0eXBlIjoidHJlZSIsInJ1bGVz
74
- IjpbeyJjb25kaXRpb25zIjpbXSwiZW5kcG9pbnQiOnsidXJsIjoiaHR0cHM6
75
- Ly9uZXR3b3JrLWZpcmV3YWxsLWZpcHMue1JlZ2lvbn0ue1BhcnRpdGlvblJl
76
- c3VsdCNkdWFsU3RhY2tEbnNTdWZmaXh9IiwicHJvcGVydGllcyI6e30sImhl
77
- YWRlcnMiOnt9fSwidHlwZSI6ImVuZHBvaW50In1dfSx7ImNvbmRpdGlvbnMi
78
- OltdLCJlcnJvciI6IkZJUFMgYW5kIER1YWxTdGFjayBhcmUgZW5hYmxlZCwg
79
- YnV0IHRoaXMgcGFydGl0aW9uIGRvZXMgbm90IHN1cHBvcnQgb25lIG9yIGJv
80
- dGgiLCJ0eXBlIjoiZXJyb3IifV19LHsiY29uZGl0aW9ucyI6W3siZm4iOiJi
81
- b29sZWFuRXF1YWxzIiwiYXJndiI6W3sicmVmIjoiVXNlRklQUyJ9LHRydWVd
82
- fV0sInR5cGUiOiJ0cmVlIiwicnVsZXMiOlt7ImNvbmRpdGlvbnMiOlt7ImZu
83
- IjoiYm9vbGVhbkVxdWFscyIsImFyZ3YiOlt0cnVlLHsiZm4iOiJnZXRBdHRy
84
- IiwiYXJndiI6W3sicmVmIjoiUGFydGl0aW9uUmVzdWx0In0sInN1cHBvcnRz
85
- RklQUyJdfV19XSwidHlwZSI6InRyZWUiLCJydWxlcyI6W3siY29uZGl0aW9u
86
- cyI6W10sInR5cGUiOiJ0cmVlIiwicnVsZXMiOlt7ImNvbmRpdGlvbnMiOltd
87
- LCJlbmRwb2ludCI6eyJ1cmwiOiJodHRwczovL25ldHdvcmstZmlyZXdhbGwt
88
- Zmlwcy57UmVnaW9ufS57UGFydGl0aW9uUmVzdWx0I2Ruc1N1ZmZpeH0iLCJw
89
- cm9wZXJ0aWVzIjp7fSwiaGVhZGVycyI6e319LCJ0eXBlIjoiZW5kcG9pbnQi
90
- fV19XX0seyJjb25kaXRpb25zIjpbXSwiZXJyb3IiOiJGSVBTIGlzIGVuYWJs
91
- ZWQgYnV0IHRoaXMgcGFydGl0aW9uIGRvZXMgbm90IHN1cHBvcnQgRklQUyIs
92
- InR5cGUiOiJlcnJvciJ9XX0seyJjb25kaXRpb25zIjpbeyJmbiI6ImJvb2xl
93
- YW5FcXVhbHMiLCJhcmd2IjpbeyJyZWYiOiJVc2VEdWFsU3RhY2sifSx0cnVl
94
- XX1dLCJ0eXBlIjoidHJlZSIsInJ1bGVzIjpbeyJjb25kaXRpb25zIjpbeyJm
95
- biI6ImJvb2xlYW5FcXVhbHMiLCJhcmd2IjpbdHJ1ZSx7ImZuIjoiZ2V0QXR0
96
- ciIsImFyZ3YiOlt7InJlZiI6IlBhcnRpdGlvblJlc3VsdCJ9LCJzdXBwb3J0
97
- c0R1YWxTdGFjayJdfV19XSwidHlwZSI6InRyZWUiLCJydWxlcyI6W3siY29u
98
- ZGl0aW9ucyI6W10sImVuZHBvaW50Ijp7InVybCI6Imh0dHBzOi8vbmV0d29y
99
- ay1maXJld2FsbC57UmVnaW9ufS57UGFydGl0aW9uUmVzdWx0I2R1YWxTdGFj
100
- a0Ruc1N1ZmZpeH0iLCJwcm9wZXJ0aWVzIjp7fSwiaGVhZGVycyI6e319LCJ0
101
- eXBlIjoiZW5kcG9pbnQifV19LHsiY29uZGl0aW9ucyI6W10sImVycm9yIjoi
102
- RHVhbFN0YWNrIGlzIGVuYWJsZWQgYnV0IHRoaXMgcGFydGl0aW9uIGRvZXMg
103
- bm90IHN1cHBvcnQgRHVhbFN0YWNrIiwidHlwZSI6ImVycm9yIn1dfSx7ImNv
104
- bmRpdGlvbnMiOltdLCJlbmRwb2ludCI6eyJ1cmwiOiJodHRwczovL25ldHdv
105
- cmstZmlyZXdhbGwue1JlZ2lvbn0ue1BhcnRpdGlvblJlc3VsdCNkbnNTdWZm
106
- aXh9IiwicHJvcGVydGllcyI6e30sImhlYWRlcnMiOnt9fSwidHlwZSI6ImVu
107
- ZHBvaW50In1dfV19
108
-
109
- JSON
110
50
  end
111
51
  end
@@ -39,7 +39,7 @@ module Aws::NetworkFirewall
39
39
  # @!attribute [rw] address_definition
40
40
  # Specify an IP address or a block of IP addresses in Classless
41
41
  # Inter-Domain Routing (CIDR) notation. Network Firewall supports all
42
- # address ranges for IPv4.
42
+ # address ranges for IPv4 and IPv6.
43
43
  #
44
44
  # Examples:
45
45
  #
@@ -49,6 +49,15 @@ module Aws::NetworkFirewall
49
49
  # * To configure Network Firewall to inspect for IP addresses from
50
50
  # 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24`.
51
51
  #
52
+ # * To configure Network Firewall to inspect for the IP address
53
+ # 1111:0000:0000:0000:0000:0000:0000:0111, specify
54
+ # `1111:0000:0000:0000:0000:0000:0000:0111/128`.
55
+ #
56
+ # * To configure Network Firewall to inspect for IP addresses from
57
+ # 1111:0000:0000:0000:0000:0000:0000:0000 to
58
+ # 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify
59
+ # `1111:0000:0000:0000:0000:0000:0000:0000/64`.
60
+ #
52
61
  # For more information about CIDR notation, see the Wikipedia entry
53
62
  # [Classless Inter-Domain Routing][1].
54
63
  #
@@ -1797,7 +1806,7 @@ module Aws::NetworkFirewall
1797
1806
  #
1798
1807
  # Specify an IP address or a block of IP addresses in Classless
1799
1808
  # Inter-Domain Routing (CIDR) notation. Network Firewall supports all
1800
- # address ranges for IPv4.
1809
+ # address ranges for IPv4 and IPv6.
1801
1810
  #
1802
1811
  # Examples:
1803
1812
  #
@@ -1807,6 +1816,15 @@ module Aws::NetworkFirewall
1807
1816
  # * To configure Network Firewall to inspect for IP addresses from
1808
1817
  # 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24`.
1809
1818
  #
1819
+ # * To configure Network Firewall to inspect for the IP address
1820
+ # 1111:0000:0000:0000:0000:0000:0000:0111, specify
1821
+ # `1111:0000:0000:0000:0000:0000:0000:0111/128`.
1822
+ #
1823
+ # * To configure Network Firewall to inspect for IP addresses from
1824
+ # 1111:0000:0000:0000:0000:0000:0000:0000 to
1825
+ # 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify
1826
+ # `1111:0000:0000:0000:0000:0000:0000:0000/64`.
1827
+ #
1810
1828
  # For more information about CIDR notation, see the Wikipedia entry
1811
1829
  # [Classless Inter-Domain Routing][1].
1812
1830
  #
@@ -1835,7 +1853,7 @@ module Aws::NetworkFirewall
1835
1853
  #
1836
1854
  # Specify an IP address or a block of IP addresses in Classless
1837
1855
  # Inter-Domain Routing (CIDR) notation. Network Firewall supports all
1838
- # address ranges for IPv4.
1856
+ # address ranges for IPv4 and IPv6.
1839
1857
  #
1840
1858
  # Examples:
1841
1859
  #
@@ -1845,6 +1863,15 @@ module Aws::NetworkFirewall
1845
1863
  # * To configure Network Firewall to inspect for IP addresses from
1846
1864
  # 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24`.
1847
1865
  #
1866
+ # * To configure Network Firewall to inspect for the IP address
1867
+ # 1111:0000:0000:0000:0000:0000:0000:0111, specify
1868
+ # `1111:0000:0000:0000:0000:0000:0000:0111/128`.
1869
+ #
1870
+ # * To configure Network Firewall to inspect for IP addresses from
1871
+ # 1111:0000:0000:0000:0000:0000:0000:0000 to
1872
+ # 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify
1873
+ # `1111:0000:0000:0000:0000:0000:0000:0000/64`.
1874
+ #
1848
1875
  # For more information about CIDR notation, see the Wikipedia entry
1849
1876
  # [Classless Inter-Domain Routing][1].
1850
1877
  #
@@ -3259,10 +3286,16 @@ module Aws::NetworkFirewall
3259
3286
  # The unique identifier for the subnet.
3260
3287
  # @return [String]
3261
3288
  #
3289
+ # @!attribute [rw] ip_address_type
3290
+ # The subnet's IP address type. You can't change the IP address type
3291
+ # after you create the subnet.
3292
+ # @return [String]
3293
+ #
3262
3294
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/SubnetMapping AWS API Documentation
3263
3295
  #
3264
3296
  class SubnetMapping < Struct.new(
3265
- :subnet_id)
3297
+ :subnet_id,
3298
+ :ip_address_type)
3266
3299
  SENSITIVE = []
3267
3300
  include Aws::Structure
3268
3301
  end
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.22.0'
55
+ GEM_VERSION = '1.24.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.22.0
4
+ version: 1.24.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-09 00:00:00.000000000 Z
11
+ date: 2023-01-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core