aws-sdk-networkfirewall 1.35.0 → 1.36.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 93f906c49425708a99fefe392ecc65c744ed614c3731a9449151acf53512963b
4
- data.tar.gz: cba122ba325f3fc897c5d8303d76244f9b984114ab4ebdde8c6525a0c78bcc96
3
+ metadata.gz: 5c5bf32a26450f873306ff092b4e1b4ece4508dedc0e8c60f8c90f683a9049a5
4
+ data.tar.gz: cc5d2460dadd157009ec50050cbcc928bfdf37c8ae47b09dffb13aa5eda1e272
5
5
  SHA512:
6
- metadata.gz: 43149af37997bf292ad1d3da81402f90a52e89f512b437300bd5778529a93413a02716ee61b0523da651d9af9909e402671124ecdc17753dfabe4e82b23a43fb
7
- data.tar.gz: 29ff4749347cae6fa3d96730e7aab182271168077a16b8da3e9b4f27a9edaa89ebbc4a13c359f3079da293f1b0f0bae8ac6d2ab35e3f8bc2e6aa7d15f090b9da
6
+ metadata.gz: 1e21e992ce09f252a6f004ab93349d8d4a66f7c08d1658e68a89d515a8f24db017fbeebb17110df25d4a8b89aac63b933f40cf486558490f17bc118db25183d9
7
+ data.tar.gz: b867ef794e837c2045c6ef228f5ae324f5b80844da2198c636c2b4733591ba676959ab4c29f1a82b411f085c0a359feb0edea732c8ba0c75c72d443d905115e4
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.36.0 (2023-10-26)
5
+ ------------------
6
+
7
+ * Feature - Network Firewall now supports inspection of outbound SSL/TLS traffic.
8
+
4
9
  1.35.0 (2023-09-27)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.35.0
1
+ 1.36.0
@@ -818,7 +818,7 @@ module Aws::NetworkFirewall
818
818
  # resp.firewall_policy_response.firewall_policy_arn #=> String
819
819
  # resp.firewall_policy_response.firewall_policy_id #=> String
820
820
  # resp.firewall_policy_response.description #=> String
821
- # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING"
821
+ # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
822
822
  # resp.firewall_policy_response.tags #=> Array
823
823
  # resp.firewall_policy_response.tags[0].key #=> String
824
824
  # resp.firewall_policy_response.tags[0].value #=> String
@@ -1100,7 +1100,7 @@ module Aws::NetworkFirewall
1100
1100
  # resp.rule_group_response.description #=> String
1101
1101
  # resp.rule_group_response.type #=> String, one of "STATELESS", "STATEFUL"
1102
1102
  # resp.rule_group_response.capacity #=> Integer
1103
- # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING"
1103
+ # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1104
1104
  # resp.rule_group_response.tags #=> Array
1105
1105
  # resp.rule_group_response.tags[0].key #=> String
1106
1106
  # resp.rule_group_response.tags[0].value #=> String
@@ -1124,11 +1124,11 @@ module Aws::NetworkFirewall
1124
1124
 
1125
1125
  # Creates an Network Firewall TLS inspection configuration. A TLS
1126
1126
  # inspection configuration contains the Certificate Manager certificate
1127
- # references that Network Firewall uses to decrypt and re-encrypt
1128
- # inbound traffic.
1127
+ # associations that Network Firewall uses to decrypt and re-encrypt
1128
+ # traffic traveling through your firewall.
1129
1129
  #
1130
- # After you create a TLS inspection configuration, you associate it with
1131
- # a new firewall policy.
1130
+ # After you create a TLS inspection configuration, you can associate it
1131
+ # with a new firewall policy.
1132
1132
  #
1133
1133
  # To update the settings for a TLS inspection configuration, use
1134
1134
  # UpdateTLSInspectionConfiguration.
@@ -1142,7 +1142,7 @@ module Aws::NetworkFirewall
1142
1142
  # DescribeTLSInspectionConfiguration.
1143
1143
  #
1144
1144
  # For more information about TLS inspection configurations, see
1145
- # [Decrypting SSL/TLS traffic with TLS inspection configurations][1] in
1145
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1] in
1146
1146
  # the *Network Firewall Developer Guide*.
1147
1147
  #
1148
1148
  #
@@ -1166,12 +1166,12 @@ module Aws::NetworkFirewall
1166
1166
  # To use a TLS inspection configuration, you add it to a new Network
1167
1167
  # Firewall firewall policy, then you apply the firewall policy to a
1168
1168
  # firewall. Network Firewall acts as a proxy service to decrypt and
1169
- # inspect inbound traffic. You can reference a TLS inspection
1170
- # configuration from more than one firewall policy, and you can use a
1171
- # firewall policy in more than one firewall. For more information about
1172
- # using TLS inspection configurations, see [Decrypting SSL/TLS traffic
1173
- # with TLS inspection configurations][1] in the *Network Firewall
1174
- # Developer Guide*.
1169
+ # inspect the traffic traveling through your firewalls. You can
1170
+ # reference a TLS inspection configuration from more than one firewall
1171
+ # policy, and you can use a firewall policy in more than one firewall.
1172
+ # For more information about using TLS inspection configurations, see
1173
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1] in
1174
+ # the *Network Firewall Developer Guide*.
1175
1175
  #
1176
1176
  #
1177
1177
  #
@@ -1242,6 +1242,11 @@ module Aws::NetworkFirewall
1242
1242
  # protocols: [1],
1243
1243
  # },
1244
1244
  # ],
1245
+ # certificate_authority_arn: "ResourceArn",
1246
+ # check_certificate_revocation_status: {
1247
+ # revoked_status_action: "PASS", # accepts PASS, DROP, REJECT
1248
+ # unknown_status_action: "PASS", # accepts PASS, DROP, REJECT
1249
+ # },
1245
1250
  # },
1246
1251
  # ],
1247
1252
  # },
@@ -1264,7 +1269,7 @@ module Aws::NetworkFirewall
1264
1269
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_arn #=> String
1265
1270
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_name #=> String
1266
1271
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_id #=> String
1267
- # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING"
1272
+ # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1268
1273
  # resp.tls_inspection_configuration_response.description #=> String
1269
1274
  # resp.tls_inspection_configuration_response.tags #=> Array
1270
1275
  # resp.tls_inspection_configuration_response.tags[0].key #=> String
@@ -1278,6 +1283,10 @@ module Aws::NetworkFirewall
1278
1283
  # resp.tls_inspection_configuration_response.certificates[0].certificate_serial #=> String
1279
1284
  # resp.tls_inspection_configuration_response.certificates[0].status #=> String
1280
1285
  # resp.tls_inspection_configuration_response.certificates[0].status_message #=> String
1286
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_arn #=> String
1287
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_serial #=> String
1288
+ # resp.tls_inspection_configuration_response.certificate_authority.status #=> String
1289
+ # resp.tls_inspection_configuration_response.certificate_authority.status_message #=> String
1281
1290
  #
1282
1291
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/CreateTLSInspectionConfiguration AWS API Documentation
1283
1292
  #
@@ -1400,7 +1409,7 @@ module Aws::NetworkFirewall
1400
1409
  # resp.firewall_policy_response.firewall_policy_arn #=> String
1401
1410
  # resp.firewall_policy_response.firewall_policy_id #=> String
1402
1411
  # resp.firewall_policy_response.description #=> String
1403
- # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING"
1412
+ # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1404
1413
  # resp.firewall_policy_response.tags #=> Array
1405
1414
  # resp.firewall_policy_response.tags[0].key #=> String
1406
1415
  # resp.firewall_policy_response.tags[0].value #=> String
@@ -1487,7 +1496,7 @@ module Aws::NetworkFirewall
1487
1496
  # resp.rule_group_response.description #=> String
1488
1497
  # resp.rule_group_response.type #=> String, one of "STATELESS", "STATEFUL"
1489
1498
  # resp.rule_group_response.capacity #=> Integer
1490
- # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING"
1499
+ # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1491
1500
  # resp.rule_group_response.tags #=> Array
1492
1501
  # resp.rule_group_response.tags[0].key #=> String
1493
1502
  # resp.rule_group_response.tags[0].value #=> String
@@ -1538,7 +1547,7 @@ module Aws::NetworkFirewall
1538
1547
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_arn #=> String
1539
1548
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_name #=> String
1540
1549
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_id #=> String
1541
- # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING"
1550
+ # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1542
1551
  # resp.tls_inspection_configuration_response.description #=> String
1543
1552
  # resp.tls_inspection_configuration_response.tags #=> Array
1544
1553
  # resp.tls_inspection_configuration_response.tags[0].key #=> String
@@ -1552,6 +1561,10 @@ module Aws::NetworkFirewall
1552
1561
  # resp.tls_inspection_configuration_response.certificates[0].certificate_serial #=> String
1553
1562
  # resp.tls_inspection_configuration_response.certificates[0].status #=> String
1554
1563
  # resp.tls_inspection_configuration_response.certificates[0].status_message #=> String
1564
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_arn #=> String
1565
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_serial #=> String
1566
+ # resp.tls_inspection_configuration_response.certificate_authority.status #=> String
1567
+ # resp.tls_inspection_configuration_response.certificate_authority.status_message #=> String
1555
1568
  #
1556
1569
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DeleteTLSInspectionConfiguration AWS API Documentation
1557
1570
  #
@@ -1665,7 +1678,7 @@ module Aws::NetworkFirewall
1665
1678
  # resp.firewall_policy_response.firewall_policy_arn #=> String
1666
1679
  # resp.firewall_policy_response.firewall_policy_id #=> String
1667
1680
  # resp.firewall_policy_response.description #=> String
1668
- # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING"
1681
+ # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1669
1682
  # resp.firewall_policy_response.tags #=> Array
1670
1683
  # resp.firewall_policy_response.tags[0].key #=> String
1671
1684
  # resp.firewall_policy_response.tags[0].value #=> String
@@ -1879,7 +1892,7 @@ module Aws::NetworkFirewall
1879
1892
  # resp.rule_group_response.description #=> String
1880
1893
  # resp.rule_group_response.type #=> String, one of "STATELESS", "STATEFUL"
1881
1894
  # resp.rule_group_response.capacity #=> Integer
1882
- # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING"
1895
+ # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
1883
1896
  # resp.rule_group_response.tags #=> Array
1884
1897
  # resp.rule_group_response.tags[0].key #=> String
1885
1898
  # resp.rule_group_response.tags[0].value #=> String
@@ -2011,10 +2024,13 @@ module Aws::NetworkFirewall
2011
2024
  # resp.tls_inspection_configuration.server_certificate_configurations[0].scopes[0].destination_ports[0].to_port #=> Integer
2012
2025
  # resp.tls_inspection_configuration.server_certificate_configurations[0].scopes[0].protocols #=> Array
2013
2026
  # resp.tls_inspection_configuration.server_certificate_configurations[0].scopes[0].protocols[0] #=> Integer
2027
+ # resp.tls_inspection_configuration.server_certificate_configurations[0].certificate_authority_arn #=> String
2028
+ # resp.tls_inspection_configuration.server_certificate_configurations[0].check_certificate_revocation_status.revoked_status_action #=> String, one of "PASS", "DROP", "REJECT"
2029
+ # resp.tls_inspection_configuration.server_certificate_configurations[0].check_certificate_revocation_status.unknown_status_action #=> String, one of "PASS", "DROP", "REJECT"
2014
2030
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_arn #=> String
2015
2031
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_name #=> String
2016
2032
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_id #=> String
2017
- # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING"
2033
+ # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
2018
2034
  # resp.tls_inspection_configuration_response.description #=> String
2019
2035
  # resp.tls_inspection_configuration_response.tags #=> Array
2020
2036
  # resp.tls_inspection_configuration_response.tags[0].key #=> String
@@ -2028,6 +2044,10 @@ module Aws::NetworkFirewall
2028
2044
  # resp.tls_inspection_configuration_response.certificates[0].certificate_serial #=> String
2029
2045
  # resp.tls_inspection_configuration_response.certificates[0].status #=> String
2030
2046
  # resp.tls_inspection_configuration_response.certificates[0].status_message #=> String
2047
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_arn #=> String
2048
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_serial #=> String
2049
+ # resp.tls_inspection_configuration_response.certificate_authority.status #=> String
2050
+ # resp.tls_inspection_configuration_response.certificate_authority.status_message #=> String
2031
2051
  #
2032
2052
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DescribeTLSInspectionConfiguration AWS API Documentation
2033
2053
  #
@@ -2880,7 +2900,7 @@ module Aws::NetworkFirewall
2880
2900
  # resp.firewall_policy_response.firewall_policy_arn #=> String
2881
2901
  # resp.firewall_policy_response.firewall_policy_id #=> String
2882
2902
  # resp.firewall_policy_response.description #=> String
2883
- # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING"
2903
+ # resp.firewall_policy_response.firewall_policy_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
2884
2904
  # resp.firewall_policy_response.tags #=> Array
2885
2905
  # resp.firewall_policy_response.tags[0].key #=> String
2886
2906
  # resp.firewall_policy_response.tags[0].value #=> String
@@ -3289,7 +3309,7 @@ module Aws::NetworkFirewall
3289
3309
  # resp.rule_group_response.description #=> String
3290
3310
  # resp.rule_group_response.type #=> String, one of "STATELESS", "STATEFUL"
3291
3311
  # resp.rule_group_response.capacity #=> Integer
3292
- # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING"
3312
+ # resp.rule_group_response.rule_group_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
3293
3313
  # resp.rule_group_response.tags #=> Array
3294
3314
  # resp.rule_group_response.tags[0].key #=> String
3295
3315
  # resp.rule_group_response.tags[0].value #=> String
@@ -3382,9 +3402,9 @@ module Aws::NetworkFirewall
3382
3402
 
3383
3403
  # Updates the TLS inspection configuration settings for the specified
3384
3404
  # TLS inspection configuration. You use a TLS inspection configuration
3385
- # by reference in one or more firewall policies. When you modify a TLS
3386
- # inspection configuration, you modify all firewall policies that use
3387
- # the TLS inspection configuration.
3405
+ # by referencing it in one or more firewall policies. When you modify a
3406
+ # TLS inspection configuration, you modify all firewall policies that
3407
+ # use the TLS inspection configuration.
3388
3408
  #
3389
3409
  # To update a TLS inspection configuration, first call
3390
3410
  # DescribeTLSInspectionConfiguration to retrieve the current
@@ -3411,12 +3431,12 @@ module Aws::NetworkFirewall
3411
3431
  # To use a TLS inspection configuration, you add it to a new Network
3412
3432
  # Firewall firewall policy, then you apply the firewall policy to a
3413
3433
  # firewall. Network Firewall acts as a proxy service to decrypt and
3414
- # inspect inbound traffic. You can reference a TLS inspection
3415
- # configuration from more than one firewall policy, and you can use a
3416
- # firewall policy in more than one firewall. For more information about
3417
- # using TLS inspection configurations, see [Decrypting SSL/TLS traffic
3418
- # with TLS inspection configurations][1] in the *Network Firewall
3419
- # Developer Guide*.
3434
+ # inspect the traffic traveling through your firewalls. You can
3435
+ # reference a TLS inspection configuration from more than one firewall
3436
+ # policy, and you can use a firewall policy in more than one firewall.
3437
+ # For more information about using TLS inspection configurations, see
3438
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1] in
3439
+ # the *Network Firewall Developer Guide*.
3420
3440
  #
3421
3441
  #
3422
3442
  #
@@ -3489,6 +3509,11 @@ module Aws::NetworkFirewall
3489
3509
  # protocols: [1],
3490
3510
  # },
3491
3511
  # ],
3512
+ # certificate_authority_arn: "ResourceArn",
3513
+ # check_certificate_revocation_status: {
3514
+ # revoked_status_action: "PASS", # accepts PASS, DROP, REJECT
3515
+ # unknown_status_action: "PASS", # accepts PASS, DROP, REJECT
3516
+ # },
3492
3517
  # },
3493
3518
  # ],
3494
3519
  # },
@@ -3506,7 +3531,7 @@ module Aws::NetworkFirewall
3506
3531
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_arn #=> String
3507
3532
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_name #=> String
3508
3533
  # resp.tls_inspection_configuration_response.tls_inspection_configuration_id #=> String
3509
- # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING"
3534
+ # resp.tls_inspection_configuration_response.tls_inspection_configuration_status #=> String, one of "ACTIVE", "DELETING", "ERROR"
3510
3535
  # resp.tls_inspection_configuration_response.description #=> String
3511
3536
  # resp.tls_inspection_configuration_response.tags #=> Array
3512
3537
  # resp.tls_inspection_configuration_response.tags[0].key #=> String
@@ -3520,6 +3545,10 @@ module Aws::NetworkFirewall
3520
3545
  # resp.tls_inspection_configuration_response.certificates[0].certificate_serial #=> String
3521
3546
  # resp.tls_inspection_configuration_response.certificates[0].status #=> String
3522
3547
  # resp.tls_inspection_configuration_response.certificates[0].status_message #=> String
3548
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_arn #=> String
3549
+ # resp.tls_inspection_configuration_response.certificate_authority.certificate_serial #=> String
3550
+ # resp.tls_inspection_configuration_response.certificate_authority.status #=> String
3551
+ # resp.tls_inspection_configuration_response.certificate_authority.status_message #=> String
3523
3552
  #
3524
3553
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/UpdateTLSInspectionConfiguration AWS API Documentation
3525
3554
  #
@@ -3543,7 +3572,7 @@ module Aws::NetworkFirewall
3543
3572
  params: params,
3544
3573
  config: config)
3545
3574
  context[:gem_name] = 'aws-sdk-networkfirewall'
3546
- context[:gem_version] = '1.35.0'
3575
+ context[:gem_version] = '1.36.0'
3547
3576
  Seahorse::Client::Request.new(handlers, context)
3548
3577
  end
3549
3578
 
@@ -32,6 +32,7 @@ module Aws::NetworkFirewall
32
32
  CIDRSummary = Shapes::StructureShape.new(name: 'CIDRSummary')
33
33
  CapacityUsageSummary = Shapes::StructureShape.new(name: 'CapacityUsageSummary')
34
34
  Certificates = Shapes::ListShape.new(name: 'Certificates')
35
+ CheckCertificateRevocationStatusActions = Shapes::StructureShape.new(name: 'CheckCertificateRevocationStatusActions')
35
36
  CollectionMember_String = Shapes::StringShape.new(name: 'CollectionMember_String')
36
37
  ConfigurationSyncState = Shapes::StringShape.new(name: 'ConfigurationSyncState')
37
38
  CreateFirewallPolicyRequest = Shapes::StructureShape.new(name: 'CreateFirewallPolicyRequest')
@@ -159,6 +160,7 @@ module Aws::NetworkFirewall
159
160
  ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
160
161
  ResourceOwnerCheckException = Shapes::StructureShape.new(name: 'ResourceOwnerCheckException')
161
162
  ResourceStatus = Shapes::StringShape.new(name: 'ResourceStatus')
163
+ RevocationCheckAction = Shapes::StringShape.new(name: 'RevocationCheckAction')
162
164
  RuleCapacity = Shapes::IntegerShape.new(name: 'RuleCapacity')
163
165
  RuleDefinition = Shapes::StructureShape.new(name: 'RuleDefinition')
164
166
  RuleGroup = Shapes::StructureShape.new(name: 'RuleGroup')
@@ -306,6 +308,10 @@ module Aws::NetworkFirewall
306
308
 
307
309
  Certificates.member = Shapes::ShapeRef.new(shape: TlsCertificateData)
308
310
 
311
+ CheckCertificateRevocationStatusActions.add_member(:revoked_status_action, Shapes::ShapeRef.new(shape: RevocationCheckAction, location_name: "RevokedStatusAction"))
312
+ CheckCertificateRevocationStatusActions.add_member(:unknown_status_action, Shapes::ShapeRef.new(shape: RevocationCheckAction, location_name: "UnknownStatusAction"))
313
+ CheckCertificateRevocationStatusActions.struct_class = Types::CheckCertificateRevocationStatusActions
314
+
309
315
  CreateFirewallPolicyRequest.add_member(:firewall_policy_name, Shapes::ShapeRef.new(shape: ResourceName, required: true, location_name: "FirewallPolicyName"))
310
316
  CreateFirewallPolicyRequest.add_member(:firewall_policy, Shapes::ShapeRef.new(shape: FirewallPolicy, required: true, location_name: "FirewallPolicy"))
311
317
  CreateFirewallPolicyRequest.add_member(:description, Shapes::ShapeRef.new(shape: Description, location_name: "Description"))
@@ -761,6 +767,8 @@ module Aws::NetworkFirewall
761
767
 
762
768
  ServerCertificateConfiguration.add_member(:server_certificates, Shapes::ShapeRef.new(shape: ServerCertificates, location_name: "ServerCertificates"))
763
769
  ServerCertificateConfiguration.add_member(:scopes, Shapes::ShapeRef.new(shape: ServerCertificateScopes, location_name: "Scopes"))
770
+ ServerCertificateConfiguration.add_member(:certificate_authority_arn, Shapes::ShapeRef.new(shape: ResourceArn, location_name: "CertificateAuthorityArn"))
771
+ ServerCertificateConfiguration.add_member(:check_certificate_revocation_status, Shapes::ShapeRef.new(shape: CheckCertificateRevocationStatusActions, location_name: "CheckCertificateRevocationStatus"))
764
772
  ServerCertificateConfiguration.struct_class = Types::ServerCertificateConfiguration
765
773
 
766
774
  ServerCertificateConfigurations.member = Shapes::ShapeRef.new(shape: ServerCertificateConfiguration)
@@ -865,6 +873,7 @@ module Aws::NetworkFirewall
865
873
  TLSInspectionConfigurationResponse.add_member(:number_of_associations, Shapes::ShapeRef.new(shape: NumberOfAssociations, location_name: "NumberOfAssociations"))
866
874
  TLSInspectionConfigurationResponse.add_member(:encryption_configuration, Shapes::ShapeRef.new(shape: EncryptionConfiguration, location_name: "EncryptionConfiguration"))
867
875
  TLSInspectionConfigurationResponse.add_member(:certificates, Shapes::ShapeRef.new(shape: Certificates, location_name: "Certificates"))
876
+ TLSInspectionConfigurationResponse.add_member(:certificate_authority, Shapes::ShapeRef.new(shape: TlsCertificateData, location_name: "CertificateAuthority"))
868
877
  TLSInspectionConfigurationResponse.struct_class = Types::TLSInspectionConfigurationResponse
869
878
 
870
879
  TLSInspectionConfigurations.member = Shapes::ShapeRef.new(shape: TLSInspectionConfigurationMetadata)
@@ -32,7 +32,7 @@ module Aws::NetworkFirewall
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://network-firewall-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -355,6 +355,55 @@ module Aws::NetworkFirewall
355
355
  include Aws::Structure
356
356
  end
357
357
 
358
+ # Defines the actions to take on the SSL/TLS connection if the
359
+ # certificate presented by the server in the connection has a revoked or
360
+ # unknown status.
361
+ #
362
+ # @!attribute [rw] revoked_status_action
363
+ # Configures how Network Firewall processes traffic when it determines
364
+ # that the certificate presented by the server in the SSL/TLS
365
+ # connection has a revoked status.
366
+ #
367
+ # * **PASS** - Allow the connection to continue, and pass subsequent
368
+ # packets to the stateful engine for inspection.
369
+ #
370
+ # * **DROP** - Network Firewall fails closed and drops all subsequent
371
+ # traffic.
372
+ #
373
+ # * **REJECT** - Network Firewall sends a TCP reject packet back to
374
+ # your client so that the client can immediately establish a new
375
+ # session. Network Firewall then fails closed and drops all
376
+ # subsequent traffic. `REJECT` is available only for TCP traffic.
377
+ # @return [String]
378
+ #
379
+ # @!attribute [rw] unknown_status_action
380
+ # Configures how Network Firewall processes traffic when it determines
381
+ # that the certificate presented by the server in the SSL/TLS
382
+ # connection has an unknown status, or a status that cannot be
383
+ # determined for any other reason, including when the service is
384
+ # unable to connect to the OCSP and CRL endpoints for the certificate.
385
+ #
386
+ # * **PASS** - Allow the connection to continue, and pass subsequent
387
+ # packets to the stateful engine for inspection.
388
+ #
389
+ # * **DROP** - Network Firewall fails closed and drops all subsequent
390
+ # traffic.
391
+ #
392
+ # * **REJECT** - Network Firewall sends a TCP reject packet back to
393
+ # your client so that the client can immediately establish a new
394
+ # session. Network Firewall then fails closed and drops all
395
+ # subsequent traffic. `REJECT` is available only for TCP traffic.
396
+ # @return [String]
397
+ #
398
+ # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/CheckCertificateRevocationStatusActions AWS API Documentation
399
+ #
400
+ class CheckCertificateRevocationStatusActions < Struct.new(
401
+ :revoked_status_action,
402
+ :unknown_status_action)
403
+ SENSITIVE = []
404
+ include Aws::Structure
405
+ end
406
+
358
407
  # @!attribute [rw] firewall_policy_name
359
408
  # The descriptive name of the firewall policy. You can't change the
360
409
  # name of a firewall policy after you create it.
@@ -720,12 +769,12 @@ module Aws::NetworkFirewall
720
769
  # To use a TLS inspection configuration, you add it to a new Network
721
770
  # Firewall firewall policy, then you apply the firewall policy to a
722
771
  # firewall. Network Firewall acts as a proxy service to decrypt and
723
- # inspect inbound traffic. You can reference a TLS inspection
724
- # configuration from more than one firewall policy, and you can use a
725
- # firewall policy in more than one firewall. For more information
726
- # about using TLS inspection configurations, see [Decrypting SSL/TLS
727
- # traffic with TLS inspection configurations][1] in the *Network
728
- # Firewall Developer Guide*.
772
+ # inspect the traffic traveling through your firewalls. You can
773
+ # reference a TLS inspection configuration from more than one firewall
774
+ # policy, and you can use a firewall policy in more than one firewall.
775
+ # For more information about using TLS inspection configurations, see
776
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1]
777
+ # in the *Network Firewall Developer Guide*.
729
778
  #
730
779
  #
731
780
  #
@@ -1441,12 +1490,12 @@ module Aws::NetworkFirewall
1441
1490
  # To use a TLS inspection configuration, you add it to a new Network
1442
1491
  # Firewall firewall policy, then you apply the firewall policy to a
1443
1492
  # firewall. Network Firewall acts as a proxy service to decrypt and
1444
- # inspect inbound traffic. You can reference a TLS inspection
1445
- # configuration from more than one firewall policy, and you can use a
1446
- # firewall policy in more than one firewall. For more information
1447
- # about using TLS inspection configurations, see [Decrypting SSL/TLS
1448
- # traffic with TLS inspection configurations][1] in the *Network
1449
- # Firewall Developer Guide*.
1493
+ # inspect the traffic traveling through your firewalls. You can
1494
+ # reference a TLS inspection configuration from more than one firewall
1495
+ # policy, and you can use a firewall policy in more than one firewall.
1496
+ # For more information about using TLS inspection configurations, see
1497
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1]
1498
+ # in the *Network Firewall Developer Guide*.
1450
1499
  #
1451
1500
  #
1452
1501
  #
@@ -2210,7 +2259,7 @@ module Aws::NetworkFirewall
2210
2259
  include Aws::Structure
2211
2260
  end
2212
2261
 
2213
- # Your request is valid, but Network Firewall couldnt perform the
2262
+ # Your request is valid, but Network Firewall couldn't perform the
2214
2263
  # operation because of a system problem. Retry your request.
2215
2264
  #
2216
2265
  # @!attribute [rw] message
@@ -3281,13 +3330,14 @@ module Aws::NetworkFirewall
3281
3330
  include Aws::Structure
3282
3331
  end
3283
3332
 
3284
- # Any Certificate Manager Secure Sockets Layer/Transport Layer Security
3285
- # (SSL/TLS) server certificate that's associated with a
3286
- # ServerCertificateConfiguration used in a TLSInspectionConfiguration.
3287
- # You must request or import a SSL/TLS certificate into ACM for each
3288
- # domain Network Firewall needs to decrypt and inspect. Network Firewall
3289
- # uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS
3290
- # traffic going to your firewall. For information about working with
3333
+ # Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer
3334
+ # Security (SSL/TLS) server certificate that's associated with a
3335
+ # ServerCertificateConfiguration. Used in a TLSInspectionConfiguration
3336
+ # for inspection of inbound traffic to your firewall. You must request
3337
+ # or import a SSL/TLS certificate into ACM for each domain Network
3338
+ # Firewall needs to decrypt and inspect. Network Firewall uses the
3339
+ # SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic
3340
+ # going to your firewall. For information about working with
3291
3341
  # certificates in Certificate Manager, see [Request a public certificate
3292
3342
  # ][1] or [Importing certificates][2] in the *Certificate Manager User
3293
3343
  # Guide*.
@@ -3299,7 +3349,7 @@ module Aws::NetworkFirewall
3299
3349
  #
3300
3350
  # @!attribute [rw] resource_arn
3301
3351
  # The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS
3302
- # server certificate.
3352
+ # server certificate that's used for inbound SSL/TLS inspection.
3303
3353
  # @return [String]
3304
3354
  #
3305
3355
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/ServerCertificate AWS API Documentation
@@ -3310,10 +3360,11 @@ module Aws::NetworkFirewall
3310
3360
  include Aws::Structure
3311
3361
  end
3312
3362
 
3313
- # Configures the associated Certificate Manager Secure Sockets
3314
- # Layer/Transport Layer Security (SSL/TLS) server certificates and scope
3315
- # settings Network Firewall uses to decrypt traffic in a
3316
- # TLSInspectionConfiguration. For information about working with SSL/TLS
3363
+ # Configures the Certificate Manager certificates and scope that Network
3364
+ # Firewall uses to decrypt and re-encrypt traffic using a
3365
+ # TLSInspectionConfiguration. You can configure `ServerCertificates` for
3366
+ # inbound SSL/TLS inspection, a `CertificateAuthorityArn` for outbound
3367
+ # SSL/TLS inspection, or both. For information about working with
3317
3368
  # certificates for TLS inspection, see [ Requirements for using SSL/TLS
3318
3369
  # server certficiates with TLS inspection configurations][1] in the
3319
3370
  # *Network Firewall Developer Guide*.
@@ -3330,18 +3381,56 @@ module Aws::NetworkFirewall
3330
3381
  #
3331
3382
  # @!attribute [rw] server_certificates
3332
3383
  # The list of a server certificate configuration's Certificate
3333
- # Manager SSL/TLS certificates.
3384
+ # Manager certificates, used for inbound SSL/TLS inspection.
3334
3385
  # @return [Array<Types::ServerCertificate>]
3335
3386
  #
3336
3387
  # @!attribute [rw] scopes
3337
- # A list of a server certificate configuration's scopes.
3388
+ # A list of scopes.
3338
3389
  # @return [Array<Types::ServerCertificateScope>]
3339
3390
  #
3391
+ # @!attribute [rw] certificate_authority_arn
3392
+ # The Amazon Resource Name (ARN) of the imported certificate authority
3393
+ # (CA) certificate configured in Certificate Manager (ACM) to use for
3394
+ # outbound SSL/TLS inspection.
3395
+ #
3396
+ # The following limitations apply:
3397
+ #
3398
+ # * You can use CA certificates that you imported into ACM, but you
3399
+ # can't generate CA certificates with ACM.
3400
+ #
3401
+ # * You can't use certificates issued by Private Certificate
3402
+ # Authority.
3403
+ #
3404
+ # For more information about the certificate requirements for outbound
3405
+ # inspection, see [Requirements for using SSL/TLS certificates with
3406
+ # TLS inspection configurations][1] in the *Network Firewall Developer
3407
+ # Guide*.
3408
+ #
3409
+ # For information about working with certificates in ACM, see
3410
+ # [Importing certificates][2] in the *Certificate Manager User Guide*.
3411
+ #
3412
+ #
3413
+ #
3414
+ # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html
3415
+ # [2]: https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html
3416
+ # @return [String]
3417
+ #
3418
+ # @!attribute [rw] check_certificate_revocation_status
3419
+ # When enabled, Network Firewall checks if the server certificate
3420
+ # presented by the server in the SSL/TLS connection has a revoked or
3421
+ # unkown status. If the certificate has an unknown or revoked status,
3422
+ # you must specify the actions that Network Firewall takes on outbound
3423
+ # traffic. To use this option, you must specify a
3424
+ # `CertificateAuthorityArn` in ServerCertificateConfiguration.
3425
+ # @return [Types::CheckCertificateRevocationStatusActions]
3426
+ #
3340
3427
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/ServerCertificateConfiguration AWS API Documentation
3341
3428
  #
3342
3429
  class ServerCertificateConfiguration < Struct.new(
3343
3430
  :server_certificates,
3344
- :scopes)
3431
+ :scopes,
3432
+ :certificate_authority_arn,
3433
+ :check_certificate_revocation_status)
3345
3434
  SENSITIVE = []
3346
3435
  include Aws::Structure
3347
3436
  end
@@ -3812,12 +3901,12 @@ module Aws::NetworkFirewall
3812
3901
  # To use a TLS inspection configuration, you add it to a new Network
3813
3902
  # Firewall firewall policy, then you apply the firewall policy to a
3814
3903
  # firewall. Network Firewall acts as a proxy service to decrypt and
3815
- # inspect inbound traffic. You can reference a TLS inspection
3816
- # configuration from more than one firewall policy, and you can use a
3817
- # firewall policy in more than one firewall. For more information about
3818
- # using TLS inspection configurations, see [Decrypting SSL/TLS traffic
3819
- # with TLS inspection configurations][1] in the *Network Firewall
3820
- # Developer Guide*.
3904
+ # inspect the traffic traveling through your firewalls. You can
3905
+ # reference a TLS inspection configuration from more than one firewall
3906
+ # policy, and you can use a firewall policy in more than one firewall.
3907
+ # For more information about using TLS inspection configurations, see
3908
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1] in
3909
+ # the *Network Firewall Developer Guide*.
3821
3910
  #
3822
3911
  #
3823
3912
  #
@@ -3915,6 +4004,10 @@ module Aws::NetworkFirewall
3915
4004
  # configuration.
3916
4005
  # @return [Array<Types::TlsCertificateData>]
3917
4006
  #
4007
+ # @!attribute [rw] certificate_authority
4008
+ # Contains metadata about an Certificate Manager certificate.
4009
+ # @return [Types::TlsCertificateData]
4010
+ #
3918
4011
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/TLSInspectionConfigurationResponse AWS API Documentation
3919
4012
  #
3920
4013
  class TLSInspectionConfigurationResponse < Struct.new(
@@ -3927,7 +4020,8 @@ module Aws::NetworkFirewall
3927
4020
  :last_modified_time,
3928
4021
  :number_of_associations,
3929
4022
  :encryption_configuration,
3930
- :certificates)
4023
+ :certificates,
4024
+ :certificate_authority)
3931
4025
  SENSITIVE = []
3932
4026
  include Aws::Structure
3933
4027
  end
@@ -4878,12 +4972,12 @@ module Aws::NetworkFirewall
4878
4972
  # To use a TLS inspection configuration, you add it to a new Network
4879
4973
  # Firewall firewall policy, then you apply the firewall policy to a
4880
4974
  # firewall. Network Firewall acts as a proxy service to decrypt and
4881
- # inspect inbound traffic. You can reference a TLS inspection
4882
- # configuration from more than one firewall policy, and you can use a
4883
- # firewall policy in more than one firewall. For more information
4884
- # about using TLS inspection configurations, see [Decrypting SSL/TLS
4885
- # traffic with TLS inspection configurations][1] in the *Network
4886
- # Firewall Developer Guide*.
4975
+ # inspect the traffic traveling through your firewalls. You can
4976
+ # reference a TLS inspection configuration from more than one firewall
4977
+ # policy, and you can use a firewall policy in more than one firewall.
4978
+ # For more information about using TLS inspection configurations, see
4979
+ # [Inspecting SSL/TLS traffic with TLS inspection configurations][1]
4980
+ # in the *Network Firewall Developer Guide*.
4887
4981
  #
4888
4982
  #
4889
4983
  #
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.35.0'
55
+ GEM_VERSION = '1.36.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.35.0
4
+ version: 1.36.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-27 00:00:00.000000000 Z
11
+ date: 2023-10-26 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core