aws-sdk-networkfirewall 1.32.0 → 1.34.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +12 -5
- data/lib/aws-sdk-networkfirewall/client_api.rb +2 -0
- data/lib/aws-sdk-networkfirewall/types.rb +26 -17
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: fec980bb2effab94f68686a902121b505264c99ea051fb73ef785f4c5faa7bf7
|
4
|
+
data.tar.gz: 399fcdae1c112b420ed040b6f2a74df426d5252afb8fba4d107e4a2f5e08aed1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 01b470715bb8026036f44f17cc34141fc02f8798d05c49b1af1dac8498c7958d98cbad5db0d6e2119e6e23ad81ae562d851aaf00fa87980246176dcf7bb89106
|
7
|
+
data.tar.gz: e45ad769bf991cf21766b32cd6534a399942c74d7dc8bba2c381900bce5b41a67ab47cdc435261b6c5eb8db8efd03fd5291acc89036fcff93eb1bcf0b81e2795
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.34.0 (2023-08-30)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Network Firewall increasing pagination token string length
|
8
|
+
|
9
|
+
1.33.0 (2023-07-11)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.32.0 (2023-07-06)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.34.0
|
@@ -216,6 +216,10 @@ module Aws::NetworkFirewall
|
|
216
216
|
# @option options [Boolean] :endpoint_discovery (false)
|
217
217
|
# When set to `true`, endpoint discovery will be enabled for operations when available.
|
218
218
|
#
|
219
|
+
# @option options [Boolean] :ignore_configured_endpoint_urls
|
220
|
+
# Setting to true disables use of endpoint URLs provided via environment
|
221
|
+
# variables and the shared configuration file.
|
222
|
+
#
|
219
223
|
# @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
|
220
224
|
# The log formatter.
|
221
225
|
#
|
@@ -1124,7 +1128,7 @@ module Aws::NetworkFirewall
|
|
1124
1128
|
# inbound traffic.
|
1125
1129
|
#
|
1126
1130
|
# After you create a TLS inspection configuration, you associate it with
|
1127
|
-
# a firewall policy.
|
1131
|
+
# a new firewall policy.
|
1128
1132
|
#
|
1129
1133
|
# To update the settings for a TLS inspection configuration, use
|
1130
1134
|
# UpdateTLSInspectionConfiguration.
|
@@ -1159,7 +1163,7 @@ module Aws::NetworkFirewall
|
|
1159
1163
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
1160
1164
|
# its destination.
|
1161
1165
|
#
|
1162
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1166
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1163
1167
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1164
1168
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1165
1169
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -2777,7 +2781,10 @@ module Aws::NetworkFirewall
|
|
2777
2781
|
# You must specify the ARN or the name, and you can specify both.
|
2778
2782
|
#
|
2779
2783
|
# @option params [required, Types::FirewallPolicy] :firewall_policy
|
2780
|
-
# The updated firewall policy to use for the firewall.
|
2784
|
+
# The updated firewall policy to use for the firewall. You can't add or
|
2785
|
+
# remove a TLSInspectionConfiguration after you create a firewall
|
2786
|
+
# policy. However, you can replace an existing TLS inspection
|
2787
|
+
# configuration with another `TLSInspectionConfiguration`.
|
2781
2788
|
#
|
2782
2789
|
# @option params [String] :description
|
2783
2790
|
# A description of the firewall policy.
|
@@ -3401,7 +3408,7 @@ module Aws::NetworkFirewall
|
|
3401
3408
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3402
3409
|
# its destination.
|
3403
3410
|
#
|
3404
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3411
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3405
3412
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3406
3413
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3407
3414
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3536,7 +3543,7 @@ module Aws::NetworkFirewall
|
|
3536
3543
|
params: params,
|
3537
3544
|
config: config)
|
3538
3545
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
3539
|
-
context[:gem_version] = '1.
|
3546
|
+
context[:gem_version] = '1.34.0'
|
3540
3547
|
Seahorse::Client::Request.new(handlers, context)
|
3541
3548
|
end
|
3542
3549
|
|
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
|
|
1116
1116
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
1117
1117
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1118
1118
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
|
1119
|
+
o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
|
1120
|
+
o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
|
1119
1121
|
end)
|
1120
1122
|
|
1121
1123
|
api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
|
|
717
717
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
718
718
|
# to its destination.
|
719
719
|
#
|
720
|
-
# To use a TLS inspection configuration, you add it to a Network
|
720
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
721
721
|
# Firewall firewall policy, then you apply the firewall policy to a
|
722
722
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
723
723
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
|
|
1438
1438
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
1439
1439
|
# to its destination.
|
1440
1440
|
#
|
1441
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1441
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1442
1442
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1443
1443
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1444
1444
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
|
|
3135
3135
|
# StatefulRule configuration.
|
3136
3136
|
#
|
3137
3137
|
# @!attribute [rw] keyword
|
3138
|
+
# The keyword for the Suricata compatible rule option. You must
|
3139
|
+
# include a `sid` (signature ID), and can optionally include other
|
3140
|
+
# keywords. For information about Suricata compatible keywords, see
|
3141
|
+
# [Rule options][1] in the Suricata documentation.
|
3142
|
+
#
|
3143
|
+
#
|
3144
|
+
#
|
3145
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3138
3146
|
# @return [String]
|
3139
3147
|
#
|
3140
3148
|
# @!attribute [rw] settings
|
3149
|
+
# The settings of the Suricata compatible rule option. Rule options
|
3150
|
+
# have zero or more setting values, and the number of possible and
|
3151
|
+
# required settings depends on the `Keyword`. For more information
|
3152
|
+
# about the settings for specific options, see [Rule options][1].
|
3153
|
+
#
|
3154
|
+
#
|
3155
|
+
#
|
3156
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3141
3157
|
# @return [Array<String>]
|
3142
3158
|
#
|
3143
3159
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
|
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
|
|
3197
3213
|
#
|
3198
3214
|
#
|
3199
3215
|
#
|
3200
|
-
# [1]: https://suricata.readthedocs.
|
3216
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3201
3217
|
# @return [Array<Types::StatefulRule>]
|
3202
3218
|
#
|
3203
3219
|
# @!attribute [rw] stateless_rules_and_custom_actions
|
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
|
|
3475
3491
|
#
|
3476
3492
|
#
|
3477
3493
|
#
|
3478
|
-
# [1]: https://suricata.readthedocs.
|
3494
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3479
3495
|
#
|
3480
3496
|
# @!attribute [rw] action
|
3481
3497
|
# Defines what Network Firewall should do with the packets in a
|
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
|
|
3499
3515
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
3500
3516
|
# in the logs that the rule is filtering as you want, then change
|
3501
3517
|
# the action to `DROP`.
|
3502
|
-
#
|
3503
|
-
# * **REJECT** - Drops TCP traffic that matches the conditions of the
|
3504
|
-
# stateful rule, and sends a TCP reset packet back to sender of the
|
3505
|
-
# packet. A TCP reset packet is a packet with no payload and a `RST`
|
3506
|
-
# bit contained in the TCP header flags. Also sends an alert log
|
3507
|
-
# mesage if alert logging is configured in the Firewall
|
3508
|
-
# LoggingConfiguration.
|
3509
|
-
#
|
3510
|
-
# `REJECT` isn't currently available for use with IMAP and FTP
|
3511
|
-
# protocols.
|
3512
3518
|
# @return [String]
|
3513
3519
|
#
|
3514
3520
|
# @!attribute [rw] header
|
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
|
|
3803
3809
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3804
3810
|
# its destination.
|
3805
3811
|
#
|
3806
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3812
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3807
3813
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3808
3814
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3809
3815
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
|
|
4483
4489
|
# @return [String]
|
4484
4490
|
#
|
4485
4491
|
# @!attribute [rw] firewall_policy
|
4486
|
-
# The updated firewall policy to use for the firewall.
|
4492
|
+
# The updated firewall policy to use for the firewall. You can't add
|
4493
|
+
# or remove a TLSInspectionConfiguration after you create a firewall
|
4494
|
+
# policy. However, you can replace an existing TLS inspection
|
4495
|
+
# configuration with another `TLSInspectionConfiguration`.
|
4487
4496
|
# @return [Types::FirewallPolicy]
|
4488
4497
|
#
|
4489
4498
|
# @!attribute [rw] description
|
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
|
|
4866
4875
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
4867
4876
|
# to its destination.
|
4868
4877
|
#
|
4869
|
-
# To use a TLS inspection configuration, you add it to a Network
|
4878
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
4870
4879
|
# Firewall firewall policy, then you apply the firewall policy to a
|
4871
4880
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
4872
4881
|
# inspect inbound traffic. You can reference a TLS inspection
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-networkfirewall
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.34.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-08-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|