aws-sdk-networkfirewall 1.33.0 → 1.35.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +8 -5
- data/lib/aws-sdk-networkfirewall/client_api.rb +2 -0
- data/lib/aws-sdk-networkfirewall/types.rb +26 -17
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 93f906c49425708a99fefe392ecc65c744ed614c3731a9449151acf53512963b
|
4
|
+
data.tar.gz: cba122ba325f3fc897c5d8303d76244f9b984114ab4ebdde8c6525a0c78bcc96
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 43149af37997bf292ad1d3da81402f90a52e89f512b437300bd5778529a93413a02716ee61b0523da651d9af9909e402671124ecdc17753dfabe4e82b23a43fb
|
7
|
+
data.tar.gz: 29ff4749347cae6fa3d96730e7aab182271168077a16b8da3e9b4f27a9edaa89ebbc4a13c359f3079da293f1b0f0bae8ac6d2ab35e3f8bc2e6aa7d15f090b9da
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.35.0 (2023-09-27)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.34.0 (2023-08-30)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Network Firewall increasing pagination token string length
|
13
|
+
|
4
14
|
1.33.0 (2023-07-11)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.35.0
|
@@ -1128,7 +1128,7 @@ module Aws::NetworkFirewall
|
|
1128
1128
|
# inbound traffic.
|
1129
1129
|
#
|
1130
1130
|
# After you create a TLS inspection configuration, you associate it with
|
1131
|
-
# a firewall policy.
|
1131
|
+
# a new firewall policy.
|
1132
1132
|
#
|
1133
1133
|
# To update the settings for a TLS inspection configuration, use
|
1134
1134
|
# UpdateTLSInspectionConfiguration.
|
@@ -1163,7 +1163,7 @@ module Aws::NetworkFirewall
|
|
1163
1163
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
1164
1164
|
# its destination.
|
1165
1165
|
#
|
1166
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1166
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1167
1167
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1168
1168
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1169
1169
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -2781,7 +2781,10 @@ module Aws::NetworkFirewall
|
|
2781
2781
|
# You must specify the ARN or the name, and you can specify both.
|
2782
2782
|
#
|
2783
2783
|
# @option params [required, Types::FirewallPolicy] :firewall_policy
|
2784
|
-
# The updated firewall policy to use for the firewall.
|
2784
|
+
# The updated firewall policy to use for the firewall. You can't add or
|
2785
|
+
# remove a TLSInspectionConfiguration after you create a firewall
|
2786
|
+
# policy. However, you can replace an existing TLS inspection
|
2787
|
+
# configuration with another `TLSInspectionConfiguration`.
|
2785
2788
|
#
|
2786
2789
|
# @option params [String] :description
|
2787
2790
|
# A description of the firewall policy.
|
@@ -3405,7 +3408,7 @@ module Aws::NetworkFirewall
|
|
3405
3408
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3406
3409
|
# its destination.
|
3407
3410
|
#
|
3408
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3411
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3409
3412
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3410
3413
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3411
3414
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3540,7 +3543,7 @@ module Aws::NetworkFirewall
|
|
3540
3543
|
params: params,
|
3541
3544
|
config: config)
|
3542
3545
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
3543
|
-
context[:gem_version] = '1.
|
3546
|
+
context[:gem_version] = '1.35.0'
|
3544
3547
|
Seahorse::Client::Request.new(handlers, context)
|
3545
3548
|
end
|
3546
3549
|
|
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
|
|
1116
1116
|
o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
|
1117
1117
|
o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
|
1118
1118
|
o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
|
1119
|
+
o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
|
1120
|
+
o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
|
1119
1121
|
end)
|
1120
1122
|
|
1121
1123
|
api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
|
|
717
717
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
718
718
|
# to its destination.
|
719
719
|
#
|
720
|
-
# To use a TLS inspection configuration, you add it to a Network
|
720
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
721
721
|
# Firewall firewall policy, then you apply the firewall policy to a
|
722
722
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
723
723
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
|
|
1438
1438
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
1439
1439
|
# to its destination.
|
1440
1440
|
#
|
1441
|
-
# To use a TLS inspection configuration, you add it to a Network
|
1441
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
1442
1442
|
# Firewall firewall policy, then you apply the firewall policy to a
|
1443
1443
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
1444
1444
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
|
|
3135
3135
|
# StatefulRule configuration.
|
3136
3136
|
#
|
3137
3137
|
# @!attribute [rw] keyword
|
3138
|
+
# The keyword for the Suricata compatible rule option. You must
|
3139
|
+
# include a `sid` (signature ID), and can optionally include other
|
3140
|
+
# keywords. For information about Suricata compatible keywords, see
|
3141
|
+
# [Rule options][1] in the Suricata documentation.
|
3142
|
+
#
|
3143
|
+
#
|
3144
|
+
#
|
3145
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3138
3146
|
# @return [String]
|
3139
3147
|
#
|
3140
3148
|
# @!attribute [rw] settings
|
3149
|
+
# The settings of the Suricata compatible rule option. Rule options
|
3150
|
+
# have zero or more setting values, and the number of possible and
|
3151
|
+
# required settings depends on the `Keyword`. For more information
|
3152
|
+
# about the settings for specific options, see [Rule options][1].
|
3153
|
+
#
|
3154
|
+
#
|
3155
|
+
#
|
3156
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
|
3141
3157
|
# @return [Array<String>]
|
3142
3158
|
#
|
3143
3159
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
|
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
|
|
3197
3213
|
#
|
3198
3214
|
#
|
3199
3215
|
#
|
3200
|
-
# [1]: https://suricata.readthedocs.
|
3216
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3201
3217
|
# @return [Array<Types::StatefulRule>]
|
3202
3218
|
#
|
3203
3219
|
# @!attribute [rw] stateless_rules_and_custom_actions
|
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
|
|
3475
3491
|
#
|
3476
3492
|
#
|
3477
3493
|
#
|
3478
|
-
# [1]: https://suricata.readthedocs.
|
3494
|
+
# [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
|
3479
3495
|
#
|
3480
3496
|
# @!attribute [rw] action
|
3481
3497
|
# Defines what Network Firewall should do with the packets in a
|
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
|
|
3499
3515
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
3500
3516
|
# in the logs that the rule is filtering as you want, then change
|
3501
3517
|
# the action to `DROP`.
|
3502
|
-
#
|
3503
|
-
# * **REJECT** - Drops TCP traffic that matches the conditions of the
|
3504
|
-
# stateful rule, and sends a TCP reset packet back to sender of the
|
3505
|
-
# packet. A TCP reset packet is a packet with no payload and a `RST`
|
3506
|
-
# bit contained in the TCP header flags. Also sends an alert log
|
3507
|
-
# mesage if alert logging is configured in the Firewall
|
3508
|
-
# LoggingConfiguration.
|
3509
|
-
#
|
3510
|
-
# `REJECT` isn't currently available for use with IMAP and FTP
|
3511
|
-
# protocols.
|
3512
3518
|
# @return [String]
|
3513
3519
|
#
|
3514
3520
|
# @!attribute [rw] header
|
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
|
|
3803
3809
|
# traffic. Network Firewall re-encrypts the traffic before sending it to
|
3804
3810
|
# its destination.
|
3805
3811
|
#
|
3806
|
-
# To use a TLS inspection configuration, you add it to a Network
|
3812
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
3807
3813
|
# Firewall firewall policy, then you apply the firewall policy to a
|
3808
3814
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
3809
3815
|
# inspect inbound traffic. You can reference a TLS inspection
|
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
|
|
4483
4489
|
# @return [String]
|
4484
4490
|
#
|
4485
4491
|
# @!attribute [rw] firewall_policy
|
4486
|
-
# The updated firewall policy to use for the firewall.
|
4492
|
+
# The updated firewall policy to use for the firewall. You can't add
|
4493
|
+
# or remove a TLSInspectionConfiguration after you create a firewall
|
4494
|
+
# policy. However, you can replace an existing TLS inspection
|
4495
|
+
# configuration with another `TLSInspectionConfiguration`.
|
4487
4496
|
# @return [Types::FirewallPolicy]
|
4488
4497
|
#
|
4489
4498
|
# @!attribute [rw] description
|
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
|
|
4866
4875
|
# traffic. Network Firewall re-encrypts the traffic before sending it
|
4867
4876
|
# to its destination.
|
4868
4877
|
#
|
4869
|
-
# To use a TLS inspection configuration, you add it to a Network
|
4878
|
+
# To use a TLS inspection configuration, you add it to a new Network
|
4870
4879
|
# Firewall firewall policy, then you apply the firewall policy to a
|
4871
4880
|
# firewall. Network Firewall acts as a proxy service to decrypt and
|
4872
4881
|
# inspect inbound traffic. You can reference a TLS inspection
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-networkfirewall
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.35.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-09-27 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.184.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.184.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|