aws-sdk-networkfirewall 1.33.0 → 1.35.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5ccbb35f3251f2e41a815f4850190c4313694307556f06cf5089c9e59858fd3c
4
- data.tar.gz: 564bd90f9e6acb94af9aef77411d63f96bb8612203c630b3bc573924c712efe3
3
+ metadata.gz: 93f906c49425708a99fefe392ecc65c744ed614c3731a9449151acf53512963b
4
+ data.tar.gz: cba122ba325f3fc897c5d8303d76244f9b984114ab4ebdde8c6525a0c78bcc96
5
5
  SHA512:
6
- metadata.gz: bc18d0e4b8be77f6b6fe766bfafe1d54a64e83fc1ea0b5c3ca8c10253f1648cf3a12ec3d1fc4e1b03b88bbd38a691602de91097cbe425363901d5d72460aa439
7
- data.tar.gz: d6b8181d64d0c680a615a18dd7f41e9c8945e9d45c6b73b62515eec59050171dee90663c1a8806c0f8786ea1539e74f90ebf4c60c7e440a7ffa9f9c3c32e2af8
6
+ metadata.gz: 43149af37997bf292ad1d3da81402f90a52e89f512b437300bd5778529a93413a02716ee61b0523da651d9af9909e402671124ecdc17753dfabe4e82b23a43fb
7
+ data.tar.gz: 29ff4749347cae6fa3d96730e7aab182271168077a16b8da3e9b4f27a9edaa89ebbc4a13c359f3079da293f1b0f0bae8ac6d2ab35e3f8bc2e6aa7d15f090b9da
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.35.0 (2023-09-27)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.34.0 (2023-08-30)
10
+ ------------------
11
+
12
+ * Feature - Network Firewall increasing pagination token string length
13
+
4
14
  1.33.0 (2023-07-11)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.33.0
1
+ 1.35.0
@@ -1128,7 +1128,7 @@ module Aws::NetworkFirewall
1128
1128
  # inbound traffic.
1129
1129
  #
1130
1130
  # After you create a TLS inspection configuration, you associate it with
1131
- # a firewall policy.
1131
+ # a new firewall policy.
1132
1132
  #
1133
1133
  # To update the settings for a TLS inspection configuration, use
1134
1134
  # UpdateTLSInspectionConfiguration.
@@ -1163,7 +1163,7 @@ module Aws::NetworkFirewall
1163
1163
  # traffic. Network Firewall re-encrypts the traffic before sending it to
1164
1164
  # its destination.
1165
1165
  #
1166
- # To use a TLS inspection configuration, you add it to a Network
1166
+ # To use a TLS inspection configuration, you add it to a new Network
1167
1167
  # Firewall firewall policy, then you apply the firewall policy to a
1168
1168
  # firewall. Network Firewall acts as a proxy service to decrypt and
1169
1169
  # inspect inbound traffic. You can reference a TLS inspection
@@ -2781,7 +2781,10 @@ module Aws::NetworkFirewall
2781
2781
  # You must specify the ARN or the name, and you can specify both.
2782
2782
  #
2783
2783
  # @option params [required, Types::FirewallPolicy] :firewall_policy
2784
- # The updated firewall policy to use for the firewall.
2784
+ # The updated firewall policy to use for the firewall. You can't add or
2785
+ # remove a TLSInspectionConfiguration after you create a firewall
2786
+ # policy. However, you can replace an existing TLS inspection
2787
+ # configuration with another `TLSInspectionConfiguration`.
2785
2788
  #
2786
2789
  # @option params [String] :description
2787
2790
  # A description of the firewall policy.
@@ -3405,7 +3408,7 @@ module Aws::NetworkFirewall
3405
3408
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3406
3409
  # its destination.
3407
3410
  #
3408
- # To use a TLS inspection configuration, you add it to a Network
3411
+ # To use a TLS inspection configuration, you add it to a new Network
3409
3412
  # Firewall firewall policy, then you apply the firewall policy to a
3410
3413
  # firewall. Network Firewall acts as a proxy service to decrypt and
3411
3414
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3540,7 +3543,7 @@ module Aws::NetworkFirewall
3540
3543
  params: params,
3541
3544
  config: config)
3542
3545
  context[:gem_name] = 'aws-sdk-networkfirewall'
3543
- context[:gem_version] = '1.33.0'
3546
+ context[:gem_version] = '1.35.0'
3544
3547
  Seahorse::Client::Request.new(handlers, context)
3545
3548
  end
3546
3549
 
@@ -1116,6 +1116,8 @@ module Aws::NetworkFirewall
1116
1116
  o.errors << Shapes::ShapeRef.new(shape: InvalidRequestException)
1117
1117
  o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1118
1118
  o.errors << Shapes::ShapeRef.new(shape: InternalServerError)
1119
+ o.errors << Shapes::ShapeRef.new(shape: LimitExceededException)
1120
+ o.errors << Shapes::ShapeRef.new(shape: InsufficientCapacityException)
1119
1121
  end)
1120
1122
 
1121
1123
  api.add_operation(:delete_firewall, Seahorse::Model::Operation.new.tap do |o|
@@ -717,7 +717,7 @@ module Aws::NetworkFirewall
717
717
  # traffic. Network Firewall re-encrypts the traffic before sending it
718
718
  # to its destination.
719
719
  #
720
- # To use a TLS inspection configuration, you add it to a Network
720
+ # To use a TLS inspection configuration, you add it to a new Network
721
721
  # Firewall firewall policy, then you apply the firewall policy to a
722
722
  # firewall. Network Firewall acts as a proxy service to decrypt and
723
723
  # inspect inbound traffic. You can reference a TLS inspection
@@ -1438,7 +1438,7 @@ module Aws::NetworkFirewall
1438
1438
  # traffic. Network Firewall re-encrypts the traffic before sending it
1439
1439
  # to its destination.
1440
1440
  #
1441
- # To use a TLS inspection configuration, you add it to a Network
1441
+ # To use a TLS inspection configuration, you add it to a new Network
1442
1442
  # Firewall firewall policy, then you apply the firewall policy to a
1443
1443
  # firewall. Network Firewall acts as a proxy service to decrypt and
1444
1444
  # inspect inbound traffic. You can reference a TLS inspection
@@ -3135,9 +3135,25 @@ module Aws::NetworkFirewall
3135
3135
  # StatefulRule configuration.
3136
3136
  #
3137
3137
  # @!attribute [rw] keyword
3138
+ # The keyword for the Suricata compatible rule option. You must
3139
+ # include a `sid` (signature ID), and can optionally include other
3140
+ # keywords. For information about Suricata compatible keywords, see
3141
+ # [Rule options][1] in the Suricata documentation.
3142
+ #
3143
+ #
3144
+ #
3145
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3138
3146
  # @return [String]
3139
3147
  #
3140
3148
  # @!attribute [rw] settings
3149
+ # The settings of the Suricata compatible rule option. Rule options
3150
+ # have zero or more setting values, and the number of possible and
3151
+ # required settings depends on the `Keyword`. For more information
3152
+ # about the settings for specific options, see [Rule options][1].
3153
+ #
3154
+ #
3155
+ #
3156
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html#rule-options
3141
3157
  # @return [Array<String>]
3142
3158
  #
3143
3159
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleOption AWS API Documentation
@@ -3197,7 +3213,7 @@ module Aws::NetworkFirewall
3197
3213
  #
3198
3214
  #
3199
3215
  #
3200
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3216
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3201
3217
  # @return [Array<Types::StatefulRule>]
3202
3218
  #
3203
3219
  # @!attribute [rw] stateless_rules_and_custom_actions
@@ -3475,7 +3491,7 @@ module Aws::NetworkFirewall
3475
3491
  #
3476
3492
  #
3477
3493
  #
3478
- # [1]: https://suricata.readthedocs.iorules/intro.html#
3494
+ # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3479
3495
  #
3480
3496
  # @!attribute [rw] action
3481
3497
  # Defines what Network Firewall should do with the packets in a
@@ -3499,16 +3515,6 @@ module Aws::NetworkFirewall
3499
3515
  # drop traffic. You can enable the rule with `ALERT` action, verify
3500
3516
  # in the logs that the rule is filtering as you want, then change
3501
3517
  # the action to `DROP`.
3502
- #
3503
- # * **REJECT** - Drops TCP traffic that matches the conditions of the
3504
- # stateful rule, and sends a TCP reset packet back to sender of the
3505
- # packet. A TCP reset packet is a packet with no payload and a `RST`
3506
- # bit contained in the TCP header flags. Also sends an alert log
3507
- # mesage if alert logging is configured in the Firewall
3508
- # LoggingConfiguration.
3509
- #
3510
- # `REJECT` isn't currently available for use with IMAP and FTP
3511
- # protocols.
3512
3518
  # @return [String]
3513
3519
  #
3514
3520
  # @!attribute [rw] header
@@ -3803,7 +3809,7 @@ module Aws::NetworkFirewall
3803
3809
  # traffic. Network Firewall re-encrypts the traffic before sending it to
3804
3810
  # its destination.
3805
3811
  #
3806
- # To use a TLS inspection configuration, you add it to a Network
3812
+ # To use a TLS inspection configuration, you add it to a new Network
3807
3813
  # Firewall firewall policy, then you apply the firewall policy to a
3808
3814
  # firewall. Network Firewall acts as a proxy service to decrypt and
3809
3815
  # inspect inbound traffic. You can reference a TLS inspection
@@ -4483,7 +4489,10 @@ module Aws::NetworkFirewall
4483
4489
  # @return [String]
4484
4490
  #
4485
4491
  # @!attribute [rw] firewall_policy
4486
- # The updated firewall policy to use for the firewall.
4492
+ # The updated firewall policy to use for the firewall. You can't add
4493
+ # or remove a TLSInspectionConfiguration after you create a firewall
4494
+ # policy. However, you can replace an existing TLS inspection
4495
+ # configuration with another `TLSInspectionConfiguration`.
4487
4496
  # @return [Types::FirewallPolicy]
4488
4497
  #
4489
4498
  # @!attribute [rw] description
@@ -4866,7 +4875,7 @@ module Aws::NetworkFirewall
4866
4875
  # traffic. Network Firewall re-encrypts the traffic before sending it
4867
4876
  # to its destination.
4868
4877
  #
4869
- # To use a TLS inspection configuration, you add it to a Network
4878
+ # To use a TLS inspection configuration, you add it to a new Network
4870
4879
  # Firewall firewall policy, then you apply the firewall policy to a
4871
4880
  # firewall. Network Firewall acts as a proxy service to decrypt and
4872
4881
  # inspect inbound traffic. You can reference a TLS inspection
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.33.0'
55
+ GEM_VERSION = '1.35.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.33.0
4
+ version: 1.35.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-11 00:00:00.000000000 Z
11
+ date: 2023-09-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.177.0
22
+ version: 3.184.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.177.0
32
+ version: 3.184.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement