aws-sdk-networkfirewall 1.32.0 → 1.34.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7c57e1a278e5686178b178262a39919a0b4afb96cc350cf940914ded2f076191
4
- data.tar.gz: 4d8dd5bd39c2f0b13ed20f60ece1b755faef5266400df4a62d24ae98be959f7c
3
+ metadata.gz: fec980bb2effab94f68686a902121b505264c99ea051fb73ef785f4c5faa7bf7
4
+ data.tar.gz: 399fcdae1c112b420ed040b6f2a74df426d5252afb8fba4d107e4a2f5e08aed1
5
5
  SHA512:
6
- metadata.gz: f7e3c1ea84725892c180c5f2ad35016686ca8ce0c87d15093328f7babaa23362369edbc5c16166dbe6e8a455c18b39e89a3756e07c8e6728d879c0d556e99cdd
7
- data.tar.gz: a164f8dc31ef8987018b4bc21477c668c084a501c445c274b6e32b5f07d5532a685240e962ae96751ce7a18b0dcd1f84807ca5eae571493b190d2718ae8f8bf7
6
+ metadata.gz: 01b470715bb8026036f44f17cc34141fc02f8798d05c49b1af1dac8498c7958d98cbad5db0d6e2119e6e23ad81ae562d851aaf00fa87980246176dcf7bb89106
7
+ data.tar.gz: e45ad769bf991cf21766b32cd6534a399942c74d7dc8bba2c381900bce5b41a67ab47cdc435261b6c5eb8db8efd03fd5291acc89036fcff93eb1bcf0b81e2795
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.34.0 (2023-08-30)
5
+ ------------------
6
+
7
+ * Feature - Network Firewall increasing pagination token string length
8
+
9
+ 1.33.0 (2023-07-11)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.32.0 (2023-07-06)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.32.0
1
+ 1.34.0
@@ -216,6 +216,10 @@ module Aws::NetworkFirewall
216
216
  # @option options [Boolean] :endpoint_discovery (false)
217
217
  # When set to `true`, endpoint discovery will be enabled for operations when available.
218
218
  #
219
+ # @option options [Boolean] :ignore_configured_endpoint_urls
220
+ # Setting to true disables use of endpoint URLs provided via environment
221
+ # variables and the shared configuration file.
222
+ #
219
223
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
220
224
  # The log formatter.
221
225
  #
@@ -1124,7 +1128,7 @@ module Aws::NetworkFirewall
1124
1128
  # inbound traffic.
1125
1129
  #
1126
1130
  # After you create a TLS inspection configuration, you associate it with
1127
- # a firewall policy.
1131
+ # a new firewall policy.
1128
1132
  #
1129
1133
  # To update the settings for a TLS inspection configuration, use
1130
1134
  # UpdateTLSInspectionConfiguration.
@@ -1159,7 +1163,7 @@ module Aws::NetworkFirewall
1159
1163
  # traffic. Network Firewall re-encrypts the traffic before sending it to
1160
1164
  # its destination.
1161
1165
  #
1162
- # To use a TLS inspection configuration, you add it to a Network
1166
+ # To use a TLS inspection configuration, you add it to a new Network
1163
1167
  # Firewall firewall policy, then you apply the firewall policy to a
1164
1168
  # firewall. Network Firewall acts as a proxy service to decrypt and
1165
1169
  # inspect inbound traffic. You can reference a TLS inspection
@@ -2777,7 +2781,10 @@ module Aws::NetworkFirewall
2777
2781
  # You must specify the ARN or the name, and you can specify both.
2778
2782
  #
2779
2783
  # @option params [required, Types::FirewallPolicy] :firewall_policy
2780
- # The updated firewall policy to use for the firewall.
2784
+ # The updated firewall policy to use for the firewall. You can't add or
2785
+ # remove a TLSInspectionConfiguration after you create a firewall
2786
+ # policy. However, you can replace an existing TLS inspection
2787
+ # configuration with another `TLSInspectionConfiguration`.
2781
2788
  #
2782
2789
  # @option params [String] :description
2783
2790
  # A description of the firewall policy.
@@ -3401,7 +3408,7 @@ module Aws::NetworkFirewall
3401
3408
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3402
3409
  # its destination.
3403
3410
  #
3404
- # To use a TLS inspection configuration, you add it to a Network
3411
+ # To use a TLS inspection configuration, you add it to a new Network
3405
3412
  # Firewall firewall policy, then you apply the firewall policy to a
3406
3413
  # firewall. Network Firewall acts as a proxy service to decrypt and
3407
3414
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3536,7 +3543,7 @@ module Aws::NetworkFirewall
3536
3543
  params: params,
3537
3544
  config: config)
3538
3545
  context[:gem_name] = 'aws-sdk-networkfirewall'
3539
- context[:gem_version] = '1.32.0'
3546
+ context[:gem_version] = '1.34.0'
3540
3547
  Seahorse::Client::Request.new(handlers, context)
3541
3548
  end
3542
3549
 
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
1116
1116
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
1117
1117
  o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1118
1118
  o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
1119
+ o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
1120
+ o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
1119
1121
  end)
1120
1122
 
1121
1123
  api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
717
717
  # traffic. Network Firewall re-encrypts the traffic before sending it
718
718
  # to its destination.
719
719
  #
720
- # To use a TLS inspection configuration, you add it to a Network
720
+ # To use a TLS inspection configuration, you add it to a new Network
721
721
  # Firewall firewall policy, then you apply the firewall policy to a
722
722
  # firewall. Network Firewall acts as a proxy service to decrypt and
723
723
  # inspect inbound traffic. You can reference a TLS inspection
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
1438
1438
  # traffic. Network Firewall re-encrypts the traffic before sending it
1439
1439
  # to its destination.
1440
1440
  #
1441
- # To use a TLS inspection configuration, you add it to a Network
1441
+ # To use a TLS inspection configuration, you add it to a new Network
1442
1442
  # Firewall firewall policy, then you apply the firewall policy to a
1443
1443
  # firewall. Network Firewall acts as a proxy service to decrypt and
1444
1444
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
3135
3135
  # StatefulRule configuration.
3136
3136
  #
3137
3137
  # @!attribute [rw] keyword
3138
+ # The keyword for the Suricata compatible rule option. You must
3139
+ # include a `sid` (signature ID), and can optionally include other
3140
+ # keywords. For information about Suricata compatible keywords, see
3141
+ # [Rule options][1] in the Suricata documentation.
3142
+ #
3143
+ #
3144
+ #
3145
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3138
3146
  # @return [String]
3139
3147
  #
3140
3148
  # @!attribute [rw] settings
3149
+ # The settings of the Suricata compatible rule option. Rule options
3150
+ # have zero or more setting values, and the number of possible and
3151
+ # required settings depends on the `Keyword`. For more information
3152
+ # about the settings for specific options, see [Rule options][1].
3153
+ #
3154
+ #
3155
+ #
3156
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3141
3157
  # @return [Array<String>]
3142
3158
  #
3143
3159
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
3197
3213
  #
3198
3214
  #
3199
3215
  #
3200
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3216
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3201
3217
  # @return [Array<Types::StatefulRule>]
3202
3218
  #
3203
3219
  # @!attribute [rw] stateless_rules_and_custom_actions
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
3475
3491
  #
3476
3492
  #
3477
3493
  #
3478
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3494
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3479
3495
  #
3480
3496
  # @!attribute [rw] action
3481
3497
  # Defines what Network Firewall should do with the packets in a
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
3499
3515
  # drop traffic. You can enable the rule with `ALERT` action, verify
3500
3516
  # in the logs that the rule is filtering as you want, then change
3501
3517
  # the action to `DROP`.
3502
- #
3503
- # * **REJECT** - Drops TCP traffic that matches the conditions of the
3504
- # stateful rule, and sends a TCP reset packet back to sender of the
3505
- # packet. A TCP reset packet is a packet with no payload and a `RST`
3506
- # bit contained in the TCP header flags. Also sends an alert log
3507
- # mesage if alert logging is configured in the Firewall
3508
- # LoggingConfiguration.
3509
- #
3510
- # `REJECT` isn't currently available for use with IMAP and FTP
3511
- # protocols.
3512
3518
  # @return [String]
3513
3519
  #
3514
3520
  # @!attribute [rw] header
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
3803
3809
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3804
3810
  # its destination.
3805
3811
  #
3806
- # To use a TLS inspection configuration, you add it to a Network
3812
+ # To use a TLS inspection configuration, you add it to a new Network
3807
3813
  # Firewall firewall policy, then you apply the firewall policy to a
3808
3814
  # firewall. Network Firewall acts as a proxy service to decrypt and
3809
3815
  # inspect inbound traffic. You can reference a TLS inspection
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
4483
4489
  # @return [String]
4484
4490
  #
4485
4491
  # @!attribute [rw] firewall_policy
4486
- # The updated firewall policy to use for the firewall.
4492
+ # The updated firewall policy to use for the firewall. You can't add
4493
+ # or remove a TLSInspectionConfiguration after you create a firewall
4494
+ # policy. However, you can replace an existing TLS inspection
4495
+ # configuration with another `TLSInspectionConfiguration`.
4487
4496
  # @return [Types::FirewallPolicy]
4488
4497
  #
4489
4498
  # @!attribute [rw] description
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
4866
4875
  # traffic. Network Firewall re-encrypts the traffic before sending it
4867
4876
  # to its destination.
4868
4877
  #
4869
- # To use a TLS inspection configuration, you add it to a Network
4878
+ # To use a TLS inspection configuration, you add it to a new Network
4870
4879
  # Firewall firewall policy, then you apply the firewall policy to a
4871
4880
  # firewall. Network Firewall acts as a proxy service to decrypt and
4872
4881
  # inspect inbound traffic. You can reference a TLS inspection
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.32.0'
55
+ GEM_VERSION = '1.34.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.32.0
4
+ version: 1.34.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-06 00:00:00.000000000 Z
11
+ date: 2023-08-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core