aws-sdk-networkfirewall 1.32.0 → 1.34.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +12 -5
- data/lib/aws-sdk-networkfirewall/client_api.rb +2 -0
- data/lib/aws-sdk-networkfirewall/types.rb +26 -17
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: fec980bb2effab94f68686a902121b505264c99ea051fb73ef785f4c5faa7bf7
|
4
|
+
data.tar.gz: 399fcdae1c112b420ed040b6f2a74df426d5252afb8fba4d107e4a2f5e08aed1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 01b470715bb8026036f44f17cc34141fc02f8798d05c49b1af1dac8498c7958d98cbad5db0d6e2119e6e23ad81ae562d851aaf00fa87980246176dcf7bb89106
|
7
|
+
data.tar.gz: e45ad769bf991cf21766b32cd6534a399942c74d7dc8bba2c381900bce5b41a67ab47cdc435261b6c5eb8db8efd03fd5291acc89036fcff93eb1bcf0b81e2795
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.34.0 (2023-08-30)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Network Firewall increasing pagination token string length
|
8
|
+
|
9
|
+
1.33.0 (2023-07-11)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
13
|
+
|
4
14
|
1.32.0 (2023-07-06)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.34.0
|
@@ -216,6 +216,10 @@ module Aws::NetworkFirewall
|
|
216
216
|
# @option options [Boolean] :endpoint_discovery (false)
|
217
217
|
# When set to `true`, endpoint discovery will be enabled for operations when available.
|
218
218
|
#
|
219
|
+
# @option options [Boolean] :ignore_configured_endpoint_urls
|
220
|
+
# Setting to true disables use of endpoint URLs provided via environment
|
221
|
+
# variables and the shared configuration file.
|
222
|
+
#
|
219
223
|
# @option options [Aws::Log::Formatter] :log_formatter (Aws::Log::Formatter.default)
|
220
224
|
# The log formatter.
|
221
225
|
#
|
@@ -1124,7 +1128,7 @@ module Aws::NetworkFirewall
|
|
1124
1128
|
# inbound traffic.
|
1125
1129
|
#
|
1126
1130
|
# After you create a TLS inspection configuration, you associate it with
|
1127
|
-
# a firewall policy.
|
1131
|
+
# a new firewall policy.
|
1128
1132
|
#
|
1129
1133
|
# To update the settings for a TLS inspection configuration, use
|
1130
1134
|
# UpdateTLSInspectionConfiguration.
|
@@ -1159,7 +1163,7 @@ module Aws::NetworkFirewall
|
|
1159
1163
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
1160
1164
|
# its destination.
|
1161
1165
|
#
|
1162
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1166
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1163
1167
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1164
1168
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1165
1169
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -2777,7 +2781,10 @@ module Aws::NetworkFirewall
|
|
2777
2781
|
# You must specify the ARN or the name, and you can specify both.
|
2778
2782
|
#
|
2779
2783
|
# @option params [required, Types::FirewallPolicy] :firewall_policy
|
2780
|
-
# The updated firewall policy to use for the firewall.
|
2784
|
+
# The updated firewall policy to use for the firewall. You can't add or
|
2785
|
+
# remove a TLSInspectionConfiguration after you create a firewall
|
2786
|
+
# policy. However, you can replace an existing TLS inspection
|
2787
|
+
# configuration with another `TLSInspectionConfiguration`.
|
2781
2788
|
#
|
2782
2789
|
# @option params [String] :description
|
2783
2790
|
# A description of the firewall policy.
|
@@ -3401,7 +3408,7 @@ module Aws::NetworkFirewall
|
|
3401
3408
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3402
3409
|
# its destination.
|
3403
3410
|
#
|
3404
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3411
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3405
3412
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3406
3413
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3407
3414
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3536,7 +3543,7 @@ module Aws::NetworkFirewall
|
|
3536
3543
|
params: params,
|
3537
3544
|
config: config)
|
3538
3545
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
3539
|
-
context[:gem_version] = '1.
|
3546
|
+
context[:gem_version] = '1.34.0'
|
3540
3547
|
Seahorse::Client::Request.new(handlers, context)
|
3541
3548
|
end
|
3542
3549
|
|
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
|
|
1116
1116
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
1117
1117
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1118
1118
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
|
1119
|
+
o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
|
1120
|
+
o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
|
1119
1121
|
end)
|
1120
1122
|
|
1121
1123
|
api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
|
|
717
717
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
718
718
|
# to its destination.
|
719
719
|
#
|
720
|
-
# To use a TLS inspection configuration, you add it to a Network
|
720
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
721
721
|
# Firewall firewall policy, then you apply the firewall policy to a
|
722
722
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
723
723
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
|
|
1438
1438
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
1439
1439
|
# to its destination.
|
1440
1440
|
#
|
1441
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1441
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1442
1442
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1443
1443
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1444
1444
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
|
|
3135
3135
|
# StatefulRule configuration.
|
3136
3136
|
#
|
3137
3137
|
# @!attribute [rw] keyword
|
3138
|
+
# The keyword for the Suricata compatible rule option. You must
|
3139
|
+
# include a `sid` (signature ID), and can optionally include other
|
3140
|
+
# keywords. For information about Suricata compatible keywords, see
|
3141
|
+
# [Rule options][1] in the Suricata documentation.
|
3142
|
+
#
|
3143
|
+
#
|
3144
|
+
#
|
3145
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3138
3146
|
# @return [String]
|
3139
3147
|
#
|
3140
3148
|
# @!attribute [rw] settings
|
3149
|
+
# The settings of the Suricata compatible rule option. Rule options
|
3150
|
+
# have zero or more setting values, and the number of possible and
|
3151
|
+
# required settings depends on the `Keyword`. For more information
|
3152
|
+
# about the settings for specific options, see [Rule options][1].
|
3153
|
+
#
|
3154
|
+
#
|
3155
|
+
#
|
3156
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3141
3157
|
# @return [Array<String>]
|
3142
3158
|
#
|
3143
3159
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
|
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
|
|
3197
3213
|
#
|
3198
3214
|
#
|
3199
3215
|
#
|
3200
|
-
# [1]: https://suricata.readthedocs.
|
3216
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3201
3217
|
# @return [Array<Types::StatefulRule>]
|
3202
3218
|
#
|
3203
3219
|
# @!attribute [rw] stateless_rules_and_custom_actions
|
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
|
|
3475
3491
|
#
|
3476
3492
|
#
|
3477
3493
|
#
|
3478
|
-
# [1]: https://suricata.readthedocs.
|
3494
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3479
3495
|
#
|
3480
3496
|
# @!attribute [rw] action
|
3481
3497
|
# Defines what Network Firewall should do with the packets in a
|
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
|
|
3499
3515
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
3500
3516
|
# in the logs that the rule is filtering as you want, then change
|
3501
3517
|
# the action to `DROP`.
|
3502
|
-
#
|
3503
|
-
# * **REJECT** - Drops TCP traffic that matches the conditions of the
|
3504
|
-
# stateful rule, and sends a TCP reset packet back to sender of the
|
3505
|
-
# packet. A TCP reset packet is a packet with no payload and a `RST`
|
3506
|
-
# bit contained in the TCP header flags. Also sends an alert log
|
3507
|
-
# mesage if alert logging is configured in the Firewall
|
3508
|
-
# LoggingConfiguration.
|
3509
|
-
#
|
3510
|
-
# `REJECT` isn't currently available for use with IMAP and FTP
|
3511
|
-
# protocols.
|
3512
3518
|
# @return [String]
|
3513
3519
|
#
|
3514
3520
|
# @!attribute [rw] header
|
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
|
|
3803
3809
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3804
3810
|
# its destination.
|
3805
3811
|
#
|
3806
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3812
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3807
3813
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3808
3814
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3809
3815
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
|
|
4483
4489
|
# @return [String]
|
4484
4490
|
#
|
4485
4491
|
# @!attribute [rw] firewall_policy
|
4486
|
-
# The updated firewall policy to use for the firewall.
|
4492
|
+
# The updated firewall policy to use for the firewall. You can't add
|
4493
|
+
# or remove a TLSInspectionConfiguration after you create a firewall
|
4494
|
+
# policy. However, you can replace an existing TLS inspection
|
4495
|
+
# configuration with another `TLSInspectionConfiguration`.
|
4487
4496
|
# @return [Types::FirewallPolicy]
|
4488
4497
|
#
|
4489
4498
|
# @!attribute [rw] description
|
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
|
|
4866
4875
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
4867
4876
|
# to its destination.
|
4868
4877
|
#
|
4869
|
-
# To use a TLS inspection configuration, you add it to a Network
|
4878
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
4870
4879
|
# Firewall firewall policy, then you apply the firewall policy to a
|
4871
4880
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
4872
4881
|
# inspect inbound traffic. You can reference a TLS inspection
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-networkfirewall
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.34.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-08-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|