aws-sdk-networkfirewall 1.32.0 → 1.34.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7c57e1a278e5686178b178262a39919a0b4afb96cc350cf940914ded2f076191
4
- data.tar.gz: 4d8dd5bd39c2f0b13ed20f60ece1b755faef5266400df4a62d24ae98be959f7c
3
+ metadata.gz: fec980bb2effab94f68686a902121b505264c99ea051fb73ef785f4c5faa7bf7
4
+ data.tar.gz: 399fcdae1c112b420ed040b6f2a74df426d5252afb8fba4d107e4a2f5e08aed1
5
5
  SHA512:
6
- metadata.gz: f7e3c1ea84725892c180c5f2ad35016686ca8ce0c87d15093328f7babaa23362369edbc5c16166dbe6e8a455c18b39e89a3756e07c8e6728d879c0d556e99cdd
7
- data.tar.gz: a164f8dc31ef8987018b4bc21477c668c084a501c445c274b6e32b5f07d5532a685240e962ae96751ce7a18b0dcd1f84807ca5eae571493b190d2718ae8f8bf7
6
+ metadata.gz: 01b470715bb8026036f44f17cc34141fc02f8798d05c49b1af1dac8498c7958d98cbad5db0d6e2119e6e23ad81ae562d851aaf00fa87980246176dcf7bb89106
7
+ data.tar.gz: e45ad769bf991cf21766b32cd6534a399942c74d7dc8bba2c381900bce5b41a67ab47cdc435261b6c5eb8db8efd03fd5291acc89036fcff93eb1bcf0b81e2795
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.34.0 (2023-08-30)
5
+ ------------------
6
+
7
+ * Feature - Network Firewall increasing pagination token string length
8
+
9
+ 1.33.0 (2023-07-11)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.32.0 (2023-07-06)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.32.0
1
+ 1.34.0
@@ -216,6 +216,10 @@ module Aws::NetworkFirewall
216
216
  # @option options [Boolean] :endpoint_discovery (false)
217
217
  # When set to `true`, endpoint discovery will be enabled for operations when available.
218
218
  #
219
+ # @option options [Boolean] :ignore_configured_endpoint_urls
220
+ # Setting to true disables use of endpoint URLs provided via environment
221
+ # variables and the shared configuration file.
222
+ #
219
223
  # @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
220
224
  # The log formatter.
221
225
  #
@@ -1124,7 +1128,7 @@ module Aws::NetworkFirewall
1124
1128
  # inbound traffic.
1125
1129
  #
1126
1130
  # After you create a TLS inspection configuration, you associate it with
1127
- # a firewall policy.
1131
+ # a new firewall policy.
1128
1132
  #
1129
1133
  # To update the settings for a TLS inspection configuration, use
1130
1134
  # UpdateTLSInspectionConfiguration.
@@ -1159,7 +1163,7 @@ module Aws::NetworkFirewall
1159
1163
  # traffic. Network Firewall re-encrypts the traffic before sending it to
1160
1164
  # its destination.
1161
1165
  #
1162
- # To use a TLS inspection configuration, you add it to a Network
1166
+ # To use a TLS inspection configuration, you add it to a new Network
1163
1167
  # Firewall firewall policy, then you apply the firewall policy to a
1164
1168
  # firewall. Network Firewall acts as a proxy service to decrypt and
1165
1169
  # inspect inbound traffic. You can reference a TLS inspection
@@ -2777,7 +2781,10 @@ module Aws::NetworkFirewall
2777
2781
  # You must specify the ARN or the name, and you can specify both.
2778
2782
  #
2779
2783
  # @option params [required, Types::FirewallPolicy] :firewall_policy
2780
- # The updated firewall policy to use for the firewall.
2784
+ # The updated firewall policy to use for the firewall. You can't add or
2785
+ # remove a TLSInspectionConfiguration after you create a firewall
2786
+ # policy. However, you can replace an existing TLS inspection
2787
+ # configuration with another `TLSInspectionConfiguration`.
2781
2788
  #
2782
2789
  # @option params [String] :description
2783
2790
  # A description of the firewall policy.
@@ -3401,7 +3408,7 @@ module Aws::NetworkFirewall
3401
3408
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3402
3409
  # its destination.
3403
3410
  #
3404
- # To use a TLS inspection configuration, you add it to a Network
3411
+ # To use a TLS inspection configuration, you add it to a new Network
3405
3412
  # Firewall firewall policy, then you apply the firewall policy to a
3406
3413
  # firewall. Network Firewall acts as a proxy service to decrypt and
3407
3414
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3536,7 +3543,7 @@ module Aws::NetworkFirewall
3536
3543
  params: params,
3537
3544
  config: config)
3538
3545
  context[:gem_name] = 'aws-sdk-networkfirewall'
3539
- context[:gem_version] = '1.32.0'
3546
+ context[:gem_version] = '1.34.0'
3540
3547
  Seahorse::Client::Request.new(handlers, context)
3541
3548
  end
3542
3549
 
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
1116
1116
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
1117
1117
  o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1118
1118
  o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
1119
+ o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
1120
+ o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
1119
1121
  end)
1120
1122
 
1121
1123
  api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
717
717
  # traffic. Network Firewall re-encrypts the traffic before sending it
718
718
  # to its destination.
719
719
  #
720
- # To use a TLS inspection configuration, you add it to a Network
720
+ # To use a TLS inspection configuration, you add it to a new Network
721
721
  # Firewall firewall policy, then you apply the firewall policy to a
722
722
  # firewall. Network Firewall acts as a proxy service to decrypt and
723
723
  # inspect inbound traffic. You can reference a TLS inspection
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
1438
1438
  # traffic. Network Firewall re-encrypts the traffic before sending it
1439
1439
  # to its destination.
1440
1440
  #
1441
- # To use a TLS inspection configuration, you add it to a Network
1441
+ # To use a TLS inspection configuration, you add it to a new Network
1442
1442
  # Firewall firewall policy, then you apply the firewall policy to a
1443
1443
  # firewall. Network Firewall acts as a proxy service to decrypt and
1444
1444
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
3135
3135
  # StatefulRule configuration.
3136
3136
  #
3137
3137
  # @!attribute [rw] keyword
3138
+ # The keyword for the Suricata compatible rule option. You must
3139
+ # include a `sid` (signature ID), and can optionally include other
3140
+ # keywords. For information about Suricata compatible keywords, see
3141
+ # [Rule options][1] in the Suricata documentation.
3142
+ #
3143
+ #
3144
+ #
3145
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3138
3146
  # @return [String]
3139
3147
  #
3140
3148
  # @!attribute [rw] settings
3149
+ # The settings of the Suricata compatible rule option. Rule options
3150
+ # have zero or more setting values, and the number of possible and
3151
+ # required settings depends on the `Keyword`. For more information
3152
+ # about the settings for specific options, see [Rule options][1].
3153
+ #
3154
+ #
3155
+ #
3156
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3141
3157
  # @return [Array<String>]
3142
3158
  #
3143
3159
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
3197
3213
  #
3198
3214
  #
3199
3215
  #
3200
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3216
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3201
3217
  # @return [Array<Types::StatefulRule>]
3202
3218
  #
3203
3219
  # @!attribute [rw] stateless_rules_and_custom_actions
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
3475
3491
  #
3476
3492
  #
3477
3493
  #
3478
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3494
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3479
3495
  #
3480
3496
  # @!attribute [rw] action
3481
3497
  # Defines what Network Firewall should do with the packets in a
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
3499
3515
  # drop traffic. You can enable the rule with `ALERT` action, verify
3500
3516
  # in the logs that the rule is filtering as you want, then change
3501
3517
  # the action to `DROP`.
3502
- #
3503
- # * **REJECT** - Drops TCP traffic that matches the conditions of the
3504
- # stateful rule, and sends a TCP reset packet back to sender of the
3505
- # packet. A TCP reset packet is a packet with no payload and a `RST`
3506
- # bit contained in the TCP header flags. Also sends an alert log
3507
- # mesage if alert logging is configured in the Firewall
3508
- # LoggingConfiguration.
3509
- #
3510
- # `REJECT` isn't currently available for use with IMAP and FTP
3511
- # protocols.
3512
3518
  # @return [String]
3513
3519
  #
3514
3520
  # @!attribute [rw] header
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
3803
3809
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3804
3810
  # its destination.
3805
3811
  #
3806
- # To use a TLS inspection configuration, you add it to a Network
3812
+ # To use a TLS inspection configuration, you add it to a new Network
3807
3813
  # Firewall firewall policy, then you apply the firewall policy to a
3808
3814
  # firewall. Network Firewall acts as a proxy service to decrypt and
3809
3815
  # inspect inbound traffic. You can reference a TLS inspection
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
4483
4489
  # @return [String]
4484
4490
  #
4485
4491
  # @!attribute [rw] firewall_policy
4486
- # The updated firewall policy to use for the firewall.
4492
+ # The updated firewall policy to use for the firewall. You can't add
4493
+ # or remove a TLSInspectionConfiguration after you create a firewall
4494
+ # policy. However, you can replace an existing TLS inspection
4495
+ # configuration with another `TLSInspectionConfiguration`.
4487
4496
  # @return [Types::FirewallPolicy]
4488
4497
  #
4489
4498
  # @!attribute [rw] description
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
4866
4875
  # traffic. Network Firewall re-encrypts the traffic before sending it
4867
4876
  # to its destination.
4868
4877
  #
4869
- # To use a TLS inspection configuration, you add it to a Network
4878
+ # To use a TLS inspection configuration, you add it to a new Network
4870
4879
  # Firewall firewall policy, then you apply the firewall policy to a
4871
4880
  # firewall. Network Firewall acts as a proxy service to decrypt and
4872
4881
  # inspect inbound traffic. You can reference a TLS inspection
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.32.0'
55
+ GEM_VERSION = '1.34.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.32.0
4
+ version: 1.34.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-06 00:00:00.000000000 Z
11
+ date: 2023-08-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core