aws-sdk-networkfirewall 1.46.0 → 1.48.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0a76ef696d1a331f35f03d2a8e93e970488e81849bbbeb97eda0469a82cc4b8d
4
- data.tar.gz: d15f354062995f93d191439ac608d2544cf65d5c96d93ed07ed0a46c5fede6dc
3
+ metadata.gz: b546797808123a231ff6fff93bed1db903297ffc984182fb23059b35d8f38933
4
+ data.tar.gz: 1db2f3de8ec6245f72beae7082b3834841b90ea4ffd9dfe59982f5e909510b5e
5
5
  SHA512:
6
- metadata.gz: 896507096933b9dce4ef4c2b59af52d330310194d637060e91282eb670a58ba08dae04050c638bcdf8c6ce770aefd211119ebc5656d1fc5a765c3f77a5f6275b
7
- data.tar.gz: 7b9c925c21ba50be1f984782f2664ffc105d908b971c8ab81aee6962ff35fb9bbb0b398e454bdecc4b95a60da924f0061729231670c95ff935ddfc6ac02e8864
6
+ metadata.gz: ef6611a4ffa9ba062aa5f9a4039567c00863abdf16ce68738eab60008ea3d3c49997db1e9c67b43306e7b2a531d03c8dfb41a45e002ace13f4406b0448711c1c
7
+ data.tar.gz: 421979f20e2e0c732c8a7fc2f2a78b3b3f7f5dd1e091662e71463fabf5ee2bb262eba7bb4cd60d89245a989585702527c5b11298117f121f8492d903d0a2779e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.48.0 (2024-07-25)
5
+ ------------------
6
+
7
+ * Feature - You can now log events that are related to TLS inspection, in addition to the existing alert and flow logging.
8
+
9
+ 1.47.0 (2024-07-02)
10
+ ------------------
11
+
12
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
13
+
4
14
  1.46.0 (2024-06-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.46.0
1
+ 1.48.0
@@ -312,6 +312,15 @@ module Aws::NetworkFirewall
312
312
  #
313
313
  # @option options [String] :session_token
314
314
  #
315
+ # @option options [Array] :sigv4a_signing_region_set
316
+ # A list of regions that should be signed with SigV4a signing. When
317
+ # not passed, a default `:sigv4a_signing_region_set` is searched for
318
+ # in the following locations:
319
+ #
320
+ # * `Aws.config[:sigv4a_signing_region_set]`
321
+ # * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
322
+ # * `~/.aws/config`
323
+ #
315
324
  # @option options [Boolean] :simple_json (false)
316
325
  # Disables request parameter conversion, validation, and formatting.
317
326
  # Also disables response data type conversions. The request parameters
@@ -1160,14 +1169,16 @@ module Aws::NetworkFirewall
1160
1169
  req.send_request(options)
1161
1170
  end
1162
1171
 
1163
- # Creates an Network Firewall TLS inspection configuration. A TLS
1164
- # inspection configuration contains Certificate Manager certificate
1165
- # associations between and the scope configurations that Network
1166
- # Firewall uses to decrypt and re-encrypt traffic traveling through your
1167
- # firewall.
1168
- #
1169
- # After you create a TLS inspection configuration, you can associate it
1170
- # with a new firewall policy.
1172
+ # Creates an Network Firewall TLS inspection configuration. Network
1173
+ # Firewall uses TLS inspection configurations to decrypt your
1174
+ # firewall's inbound and outbound SSL/TLS traffic. After decryption,
1175
+ # Network Firewall inspects the traffic according to your firewall
1176
+ # policy's stateful rules, and then re-encrypts it before sending it to
1177
+ # its destination. You can enable inspection of your firewall's inbound
1178
+ # traffic, outbound traffic, or both. To use TLS inspection with your
1179
+ # firewall, you must first import or provision certificates using ACM,
1180
+ # create a TLS inspection configuration, add that configuration to a new
1181
+ # firewall policy, and then associate that policy with your firewall.
1171
1182
  #
1172
1183
  # To update the settings for a TLS inspection configuration, use
1173
1184
  # UpdateTLSInspectionConfiguration.
@@ -1794,7 +1805,7 @@ module Aws::NetworkFirewall
1794
1805
  #
1795
1806
  # resp.firewall_arn #=> String
1796
1807
  # resp.logging_configuration.log_destination_configs #=> Array
1797
- # resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW"
1808
+ # resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW", "TLS"
1798
1809
  # resp.logging_configuration.log_destination_configs[0].log_destination_type #=> String, one of "S3", "CloudWatchLogs", "KinesisDataFirehose"
1799
1810
  # resp.logging_configuration.log_destination_configs[0].log_destination #=> Hash
1800
1811
  # resp.logging_configuration.log_destination_configs[0].log_destination["HashMapKey"] #=> String
@@ -3103,7 +3114,7 @@ module Aws::NetworkFirewall
3103
3114
  # logging_configuration: {
3104
3115
  # log_destination_configs: [ # required
3105
3116
  # {
3106
- # log_type: "ALERT", # required, accepts ALERT, FLOW
3117
+ # log_type: "ALERT", # required, accepts ALERT, FLOW, TLS
3107
3118
  # log_destination_type: "S3", # required, accepts S3, CloudWatchLogs, KinesisDataFirehose
3108
3119
  # log_destination: { # required
3109
3120
  # "HashMapKey" => "HashMapValue",
@@ -3118,7 +3129,7 @@ module Aws::NetworkFirewall
3118
3129
  # resp.firewall_arn #=> String
3119
3130
  # resp.firewall_name #=> String
3120
3131
  # resp.logging_configuration.log_destination_configs #=> Array
3121
- # resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW"
3132
+ # resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW", "TLS"
3122
3133
  # resp.logging_configuration.log_destination_configs[0].log_destination_type #=> String, one of "S3", "CloudWatchLogs", "KinesisDataFirehose"
3123
3134
  # resp.logging_configuration.log_destination_configs[0].log_destination #=> Hash
3124
3135
  # resp.logging_configuration.log_destination_configs[0].log_destination["HashMapKey"] #=> String
@@ -3640,7 +3651,7 @@ module Aws::NetworkFirewall
3640
3651
  params: params,
3641
3652
  config: config)
3642
3653
  context[:gem_name] = 'aws-sdk-networkfirewall'
3643
- context[:gem_version] = '1.46.0'
3654
+ context[:gem_version] = '1.48.0'
3644
3655
  Seahorse::Client::Request.new(handlers, context)
3645
3656
  end
3646
3657
 
@@ -2696,25 +2696,40 @@ module Aws::NetworkFirewall
2696
2696
 
2697
2697
  # Defines where Network Firewall sends logs for the firewall for one log
2698
2698
  # type. This is used in LoggingConfiguration. You can send each type of
2699
- # log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data
2700
- # Firehose delivery stream.
2699
+ # log to an Amazon S3 bucket, a CloudWatch log group, or a Firehose
2700
+ # delivery stream.
2701
2701
  #
2702
2702
  # Network Firewall generates logs for stateful rule groups. You can save
2703
- # alert and flow log types. The stateful rules engine records flow logs
2704
- # for all network traffic that it receives. It records alert logs for
2705
- # traffic that matches stateful rules that have the rule action set to
2706
- # `DROP` or `ALERT`.
2703
+ # alert, flow, and TLS log types.
2707
2704
  #
2708
2705
  # @!attribute [rw] log_type
2709
- # The type of log to send. Alert logs report traffic that matches a
2710
- # StatefulRule with an action setting that sends an alert log message.
2711
- # Flow logs are standard network traffic flow logs.
2706
+ # The type of log to record. You can record the following types of
2707
+ # logs from your Network Firewall stateful engine.
2708
+ #
2709
+ # * `ALERT` - Logs for traffic that matches your stateful rules and
2710
+ # that have an action that sends an alert. A stateful rule sends
2711
+ # alerts for the rule actions DROP, ALERT, and REJECT. For more
2712
+ # information, see StatefulRule.
2713
+ #
2714
+ # * `FLOW` - Standard network traffic flow logs. The stateful rules
2715
+ # engine records flow logs for all network traffic that it receives.
2716
+ # Each flow log record captures the network flow for a specific
2717
+ # standard stateless rule group.
2718
+ #
2719
+ # * `TLS` - Logs for events that are related to TLS inspection. For
2720
+ # more information, see [Inspecting SSL/TLS traffic with TLS
2721
+ # inspection configurations][1] in the *Network Firewall Developer
2722
+ # Guide*.
2723
+ #
2724
+ #
2725
+ #
2726
+ # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-configurations.html
2712
2727
  # @return [String]
2713
2728
  #
2714
2729
  # @!attribute [rw] log_destination_type
2715
2730
  # The type of storage destination to send these logs to. You can send
2716
- # logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis
2717
- # Data Firehose delivery stream.
2731
+ # logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose
2732
+ # delivery stream.
2718
2733
  # @return [String]
2719
2734
  #
2720
2735
  # @!attribute [rw] log_destination
@@ -2723,6 +2738,7 @@ module Aws::NetworkFirewall
2723
2738
  #
2724
2739
  # * For an Amazon S3 bucket, provide the name of the bucket, with key
2725
2740
  # `bucketName`, and optionally provide a prefix, with key `prefix`.
2741
+ #
2726
2742
  # The following example specifies an Amazon S3 bucket named
2727
2743
  # `DOC-EXAMPLE-BUCKET` and the prefix `alerts`:
2728
2744
  #
@@ -2735,9 +2751,9 @@ module Aws::NetworkFirewall
2735
2751
  #
2736
2752
  # `"LogDestination": \{ "logGroup": "alert-log-group" \}`
2737
2753
  #
2738
- # * For a Kinesis Data Firehose delivery stream, provide the name of
2739
- # the delivery stream, with key `deliveryStream`. The following
2740
- # example specifies a delivery stream named `alert-delivery-stream`:
2754
+ # * For a Firehose delivery stream, provide the name of the delivery
2755
+ # stream, with key `deliveryStream`. The following example specifies
2756
+ # a delivery stream named `alert-delivery-stream`:
2741
2757
  #
2742
2758
  # `"LogDestination": \{ "deliveryStream": "alert-delivery-stream"
2743
2759
  # \}`
@@ -3711,6 +3727,13 @@ module Aws::NetworkFirewall
3711
3727
  # drop traffic. You can enable the rule with `ALERT` action, verify
3712
3728
  # in the logs that the rule is filtering as you want, then change
3713
3729
  # the action to `DROP`.
3730
+ #
3731
+ # * **REJECT** - Drops traffic that matches the conditions of the
3732
+ # stateful rule, and sends a TCP reset packet back to sender of the
3733
+ # packet. A TCP reset packet is a packet with no payload and an RST
3734
+ # bit contained in the TCP header flags. REJECT is available only
3735
+ # for TCP traffic. This option doesn't support FTP or IMAP
3736
+ # protocols.
3714
3737
  # @return [String]
3715
3738
  #
3716
3739
  # @!attribute [rw] header
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.46.0'
55
+ GEM_VERSION = '1.48.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
@@ -814,7 +815,7 @@ module Aws
814
815
  ?logging_configuration: {
815
816
  log_destination_configs: Array[
816
817
  {
817
- log_type: ("ALERT" | "FLOW"),
818
+ log_type: ("ALERT" | "FLOW" | "TLS"),
818
819
  log_destination_type: ("S3" | "CloudWatchLogs" | "KinesisDataFirehose"),
819
820
  log_destination: Hash[::String, ::String]
820
821
  },
data/sig/resource.rbs CHANGED
@@ -48,6 +48,7 @@ module Aws
48
48
  ?sdk_ua_app_id: String,
49
49
  ?secret_access_key: String,
50
50
  ?session_token: String,
51
+ ?sigv4a_signing_region_set: Array[String],
51
52
  ?simple_json: bool,
52
53
  ?stub_responses: untyped,
53
54
  ?token_provider: untyped,
data/sig/types.rbs CHANGED
@@ -526,7 +526,7 @@ module Aws::NetworkFirewall
526
526
  end
527
527
 
528
528
  class LogDestinationConfig
529
- attr_accessor log_type: ("ALERT" | "FLOW")
529
+ attr_accessor log_type: ("ALERT" | "FLOW" | "TLS")
530
530
  attr_accessor log_destination_type: ("S3" | "CloudWatchLogs" | "KinesisDataFirehose")
531
531
  attr_accessor log_destination: ::Hash[::String, ::String]
532
532
  SENSITIVE: []
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.46.0
4
+ version: 1.48.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-06-28 00:00:00.000000000 Z
11
+ date: 2024-07-25 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.199.0
22
+ version: 3.201.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,21 +29,21 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.199.0
32
+ version: 3.201.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
36
36
  requirements:
37
37
  - - "~>"
38
38
  - !ruby/object:Gem::Version
39
- version: '1.1'
39
+ version: '1.5'
40
40
  type: :runtime
41
41
  prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
- version: '1.1'
46
+ version: '1.5'
47
47
  description: Official AWS Ruby gem for AWS Network Firewall (Network Firewall). This
48
48
  gem is part of the AWS SDK for Ruby.
49
49
  email: