aws-sdk-networkfirewall 1.27.0 → 1.28.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 848dc5acca2271ff27fe731050b218de6eb5bd90c5cf3f9238d2e7876bd779f1
4
- data.tar.gz: 5020c9ed7a2fdde8c547c9e45989ae6c57531ebef798c35c69b18ca031845bf1
3
+ metadata.gz: 0777bee33353956140748399c259f21e1da2819f69f84f0353b438725e003c62
4
+ data.tar.gz: b3e1cf9cde792809cc2963d6b3293aca1915965a1be408eeb21ee22b4ba2db7f
5
5
  SHA512:
6
- metadata.gz: 198569d2c17cdc7db5247a1e39838ec54582a80bafb30946911c02ef36e3482a09a2288407e9bdc86dd9cc8e63914f4dcf4f2b2eb156e220db172cafb8d9d393
7
- data.tar.gz: 56255332e20a9726aba325f3e512b28dad5dfcbd4cc7317df5be254aac4a2c5bddaa6f3ec11fb7d0539938866568997a93cf4c9615e1c83de9b4620f5101cbae
6
+ metadata.gz: b50dc676821f92c9b96e1e41536c72c770c294240907afb2508d9c8001621dd797921395222c3e8d632dddd0415b68a883b6784a2d93f0142ac53089c72cb9ea
7
+ data.tar.gz: d8ce58d223868c23b80041a606de67df91f313f6adbf17066cb11d5b3d4a814a3ac1d294b413371ae371be9faf215d98bb85fa169d4cb13e0ddc9266da6002fb
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.28.0 (2023-05-04)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for the Suricata REJECT option in midstream exception configurations.
8
+
4
9
  1.27.0 (2023-05-03)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.27.0
1
+ 1.28.0
@@ -663,7 +663,7 @@ module Aws::NetworkFirewall
663
663
  # resp.firewall_status.sync_states #=> Hash
664
664
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
665
665
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
666
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
666
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
667
667
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
668
668
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
669
669
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -766,7 +766,7 @@ module Aws::NetworkFirewall
766
766
  # stateful_default_actions: ["CollectionMember_String"],
767
767
  # stateful_engine_options: {
768
768
  # rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
769
- # stream_exception_policy: "DROP", # accepts DROP, CONTINUE
769
+ # stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
770
770
  # },
771
771
  # tls_inspection_configuration_arn: "ResourceArn",
772
772
  # policy_variables: {
@@ -1331,7 +1331,7 @@ module Aws::NetworkFirewall
1331
1331
  # resp.firewall_status.sync_states #=> Hash
1332
1332
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
1333
1333
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
1334
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
1334
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
1335
1335
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
1336
1336
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
1337
1337
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -1593,7 +1593,7 @@ module Aws::NetworkFirewall
1593
1593
  # resp.firewall_status.sync_states #=> Hash
1594
1594
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
1595
1595
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
1596
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
1596
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
1597
1597
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
1598
1598
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
1599
1599
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -1673,7 +1673,7 @@ module Aws::NetworkFirewall
1673
1673
  # resp.firewall_policy.stateful_default_actions #=> Array
1674
1674
  # resp.firewall_policy.stateful_default_actions[0] #=> String
1675
1675
  # resp.firewall_policy.stateful_engine_options.rule_order #=> String, one of "DEFAULT_ACTION_ORDER", "STRICT_ORDER"
1676
- # resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE"
1676
+ # resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE", "REJECT"
1677
1677
  # resp.firewall_policy.tls_inspection_configuration_arn #=> String
1678
1678
  # resp.firewall_policy.policy_variables.rule_variables #=> Hash
1679
1679
  # resp.firewall_policy.policy_variables.rule_variables["RuleVariableName"].definition #=> Array
@@ -2831,7 +2831,7 @@ module Aws::NetworkFirewall
2831
2831
  # stateful_default_actions: ["CollectionMember_String"],
2832
2832
  # stateful_engine_options: {
2833
2833
  # rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
2834
- # stream_exception_policy: "DROP", # accepts DROP, CONTINUE
2834
+ # stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
2835
2835
  # },
2836
2836
  # tls_inspection_configuration_arn: "ResourceArn",
2837
2837
  # policy_variables: {
@@ -3520,7 +3520,7 @@ module Aws::NetworkFirewall
3520
3520
  params: params,
3521
3521
  config: config)
3522
3522
  context[:gem_name] = 'aws-sdk-networkfirewall'
3523
- context[:gem_version] = '1.27.0'
3523
+ context[:gem_version] = '1.28.0'
3524
3524
  Seahorse::Client::Request.new(handlers, context)
3525
3525
  end
3526
3526
 
@@ -3197,7 +3197,7 @@ module Aws::NetworkFirewall
3197
3197
  #
3198
3198
  #
3199
3199
  #
3200
- # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3200
+ # [1]: https://suricata.readthedocs.iorules/intro.html#
3201
3201
  # @return [Array<Types::StatefulRule>]
3202
3202
  #
3203
3203
  # @!attribute [rw] stateless_rules_and_custom_actions
@@ -3449,6 +3449,13 @@ module Aws::NetworkFirewall
3449
3449
  # behavior is rule dependent—a TCP-layer rule using a
3450
3450
  # `flow:stateless` rule would still match, as would the
3451
3451
  # `aws:drop_strict` default action.
3452
+ #
3453
+ # * `REJECT` - Network Firewall fails closed and drops all subsequent
3454
+ # traffic going to the firewall. Network Firewall also sends a TCP
3455
+ # reject packet back to your client so that the client can
3456
+ # immediately establish a new session. Network Firewall will have
3457
+ # context about the new session and will apply rules to the
3458
+ # subsequent traffic.
3452
3459
  # @return [String]
3453
3460
  #
3454
3461
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/StatefulEngineOptions AWS API Documentation
@@ -3468,7 +3475,7 @@ module Aws::NetworkFirewall
3468
3475
  #
3469
3476
  #
3470
3477
  #
3471
- # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3478
+ # [1]: https://suricata.readthedocs.iorules/intro.html#
3472
3479
  #
3473
3480
  # @!attribute [rw] action
3474
3481
  # Defines what Network Firewall should do with the packets in a
@@ -3492,6 +3499,16 @@ module Aws::NetworkFirewall
3492
3499
  # drop traffic. You can enable the rule with `ALERT` action, verify
3493
3500
  # in the logs that the rule is filtering as you want, then change
3494
3501
  # the action to `DROP`.
3502
+ #
3503
+ # * **REJECT** - Drops TCP traffic that matches the conditions of the
3504
+ # stateful rule, and sends a TCP reset packet back to sender of the
3505
+ # packet. A TCP reset packet is a packet with no payload and a `RST`
3506
+ # bit contained in the TCP header flags. Also sends an alert log
3507
+ # mesage if alert logging is configured in the Firewall
3508
+ # LoggingConfiguration.
3509
+ #
3510
+ # `REJECT` isn't currently available for use with IMAP and FTP
3511
+ # protocols.
3495
3512
  # @return [String]
3496
3513
  #
3497
3514
  # @!attribute [rw] header
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.27.0'
55
+ GEM_VERSION = '1.28.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.27.0
4
+ version: 1.28.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-05-03 00:00:00.000000000 Z
11
+ date: 2023-05-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core