aws-sdk-networkfirewall 1.46.0 → 1.48.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +23 -12
- data/lib/aws-sdk-networkfirewall/types.rb +37 -14
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- data/sig/client.rbs +2 -1
- data/sig/resource.rbs +1 -0
- data/sig/types.rbs +1 -1
- metadata +6 -6
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: b546797808123a231ff6fff93bed1db903297ffc984182fb23059b35d8f38933
|
|
4
|
+
data.tar.gz: 1db2f3de8ec6245f72beae7082b3834841b90ea4ffd9dfe59982f5e909510b5e
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: ef6611a4ffa9ba062aa5f9a4039567c00863abdf16ce68738eab60008ea3d3c49997db1e9c67b43306e7b2a531d03c8dfb41a45e002ace13f4406b0448711c1c
|
|
7
|
+
data.tar.gz: 421979f20e2e0c732c8a7fc2f2a78b3b3f7f5dd1e091662e71463fabf5ee2bb262eba7bb4cd60d89245a989585702527c5b11298117f121f8492d903d0a2779e
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,16 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.48.0 (2024-07-25)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - You can now log events that are related to TLS inspection, in addition to the existing alert and flow logging.
|
|
8
|
+
|
|
9
|
+
1.47.0 (2024-07-02)
|
|
10
|
+
------------------
|
|
11
|
+
|
|
12
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
|
13
|
+
|
|
4
14
|
1.46.0 (2024-06-28)
|
|
5
15
|
------------------
|
|
6
16
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.48.0
|
|
@@ -312,6 +312,15 @@ module Aws::NetworkFirewall
|
|
|
312
312
|
#
|
|
313
313
|
# @option options [String] :session_token
|
|
314
314
|
#
|
|
315
|
+
# @option options [Array] :sigv4a_signing_region_set
|
|
316
|
+
# A list of regions that should be signed with SigV4a signing. When
|
|
317
|
+
# not passed, a default `:sigv4a_signing_region_set` is searched for
|
|
318
|
+
# in the following locations:
|
|
319
|
+
#
|
|
320
|
+
# * `Aws.config[:sigv4a_signing_region_set]`
|
|
321
|
+
# * `ENV['AWS_SIGV4A_SIGNING_REGION_SET']`
|
|
322
|
+
# * `~/.aws/config`
|
|
323
|
+
#
|
|
315
324
|
# @option options [Boolean] :simple_json (false)
|
|
316
325
|
# Disables request parameter conversion, validation, and formatting.
|
|
317
326
|
# Also disables response data type conversions. The request parameters
|
|
@@ -1160,14 +1169,16 @@ module Aws::NetworkFirewall
|
|
|
1160
1169
|
req.send_request(options)
|
|
1161
1170
|
end
|
|
1162
1171
|
|
|
1163
|
-
# Creates an Network Firewall TLS inspection configuration.
|
|
1164
|
-
# inspection
|
|
1165
|
-
#
|
|
1166
|
-
# Firewall
|
|
1167
|
-
#
|
|
1168
|
-
#
|
|
1169
|
-
#
|
|
1170
|
-
#
|
|
1172
|
+
# Creates an Network Firewall TLS inspection configuration. Network
|
|
1173
|
+
# Firewall uses TLS inspection configurations to decrypt your
|
|
1174
|
+
# firewall's inbound and outbound SSL/TLS traffic. After decryption,
|
|
1175
|
+
# Network Firewall inspects the traffic according to your firewall
|
|
1176
|
+
# policy's stateful rules, and then re-encrypts it before sending it to
|
|
1177
|
+
# its destination. You can enable inspection of your firewall's inbound
|
|
1178
|
+
# traffic, outbound traffic, or both. To use TLS inspection with your
|
|
1179
|
+
# firewall, you must first import or provision certificates using ACM,
|
|
1180
|
+
# create a TLS inspection configuration, add that configuration to a new
|
|
1181
|
+
# firewall policy, and then associate that policy with your firewall.
|
|
1171
1182
|
#
|
|
1172
1183
|
# To update the settings for a TLS inspection configuration, use
|
|
1173
1184
|
# UpdateTLSInspectionConfiguration.
|
|
@@ -1794,7 +1805,7 @@ module Aws::NetworkFirewall
|
|
|
1794
1805
|
#
|
|
1795
1806
|
# resp.firewall_arn #=> String
|
|
1796
1807
|
# resp.logging_configuration.log_destination_configs #=> Array
|
|
1797
|
-
# resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW"
|
|
1808
|
+
# resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW", "TLS"
|
|
1798
1809
|
# resp.logging_configuration.log_destination_configs[0].log_destination_type #=> String, one of "S3", "CloudWatchLogs", "KinesisDataFirehose"
|
|
1799
1810
|
# resp.logging_configuration.log_destination_configs[0].log_destination #=> Hash
|
|
1800
1811
|
# resp.logging_configuration.log_destination_configs[0].log_destination["HashMapKey"] #=> String
|
|
@@ -3103,7 +3114,7 @@ module Aws::NetworkFirewall
|
|
|
3103
3114
|
# logging_configuration: {
|
|
3104
3115
|
# log_destination_configs: [ # required
|
|
3105
3116
|
# {
|
|
3106
|
-
# log_type: "ALERT", # required, accepts ALERT, FLOW
|
|
3117
|
+
# log_type: "ALERT", # required, accepts ALERT, FLOW, TLS
|
|
3107
3118
|
# log_destination_type: "S3", # required, accepts S3, CloudWatchLogs, KinesisDataFirehose
|
|
3108
3119
|
# log_destination: { # required
|
|
3109
3120
|
# "HashMapKey" => "HashMapValue",
|
|
@@ -3118,7 +3129,7 @@ module Aws::NetworkFirewall
|
|
|
3118
3129
|
# resp.firewall_arn #=> String
|
|
3119
3130
|
# resp.firewall_name #=> String
|
|
3120
3131
|
# resp.logging_configuration.log_destination_configs #=> Array
|
|
3121
|
-
# resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW"
|
|
3132
|
+
# resp.logging_configuration.log_destination_configs[0].log_type #=> String, one of "ALERT", "FLOW", "TLS"
|
|
3122
3133
|
# resp.logging_configuration.log_destination_configs[0].log_destination_type #=> String, one of "S3", "CloudWatchLogs", "KinesisDataFirehose"
|
|
3123
3134
|
# resp.logging_configuration.log_destination_configs[0].log_destination #=> Hash
|
|
3124
3135
|
# resp.logging_configuration.log_destination_configs[0].log_destination["HashMapKey"] #=> String
|
|
@@ -3640,7 +3651,7 @@ module Aws::NetworkFirewall
|
|
|
3640
3651
|
params: params,
|
|
3641
3652
|
config: config)
|
|
3642
3653
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
|
3643
|
-
context[:gem_version] = '1.
|
|
3654
|
+
context[:gem_version] = '1.48.0'
|
|
3644
3655
|
Seahorse::Client::Request.new(handlers, context)
|
|
3645
3656
|
end
|
|
3646
3657
|
|
|
@@ -2696,25 +2696,40 @@ module Aws::NetworkFirewall
|
|
|
2696
2696
|
|
|
2697
2697
|
# Defines where Network Firewall sends logs for the firewall for one log
|
|
2698
2698
|
# type. This is used in LoggingConfiguration. You can send each type of
|
|
2699
|
-
# log to an Amazon S3 bucket, a CloudWatch log group, or a
|
|
2700
|
-
#
|
|
2699
|
+
# log to an Amazon S3 bucket, a CloudWatch log group, or a Firehose
|
|
2700
|
+
# delivery stream.
|
|
2701
2701
|
#
|
|
2702
2702
|
# Network Firewall generates logs for stateful rule groups. You can save
|
|
2703
|
-
# alert and
|
|
2704
|
-
# for all network traffic that it receives. It records alert logs for
|
|
2705
|
-
# traffic that matches stateful rules that have the rule action set to
|
|
2706
|
-
# `DROP` or `ALERT`.
|
|
2703
|
+
# alert, flow, and TLS log types.
|
|
2707
2704
|
#
|
|
2708
2705
|
# @!attribute [rw] log_type
|
|
2709
|
-
# The type of log to
|
|
2710
|
-
#
|
|
2711
|
-
#
|
|
2706
|
+
# The type of log to record. You can record the following types of
|
|
2707
|
+
# logs from your Network Firewall stateful engine.
|
|
2708
|
+
#
|
|
2709
|
+
# * `ALERT` - Logs for traffic that matches your stateful rules and
|
|
2710
|
+
# that have an action that sends an alert. A stateful rule sends
|
|
2711
|
+
# alerts for the rule actions DROP, ALERT, and REJECT. For more
|
|
2712
|
+
# information, see StatefulRule.
|
|
2713
|
+
#
|
|
2714
|
+
# * `FLOW` - Standard network traffic flow logs. The stateful rules
|
|
2715
|
+
# engine records flow logs for all network traffic that it receives.
|
|
2716
|
+
# Each flow log record captures the network flow for a specific
|
|
2717
|
+
# standard stateless rule group.
|
|
2718
|
+
#
|
|
2719
|
+
# * `TLS` - Logs for events that are related to TLS inspection. For
|
|
2720
|
+
# more information, see [Inspecting SSL/TLS traffic with TLS
|
|
2721
|
+
# inspection configurations][1] in the *Network Firewall Developer
|
|
2722
|
+
# Guide*.
|
|
2723
|
+
#
|
|
2724
|
+
#
|
|
2725
|
+
#
|
|
2726
|
+
# [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-configurations.html
|
|
2712
2727
|
# @return [String]
|
|
2713
2728
|
#
|
|
2714
2729
|
# @!attribute [rw] log_destination_type
|
|
2715
2730
|
# The type of storage destination to send these logs to. You can send
|
|
2716
|
-
# logs to an Amazon S3 bucket, a CloudWatch log group, or a
|
|
2717
|
-
#
|
|
2731
|
+
# logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose
|
|
2732
|
+
# delivery stream.
|
|
2718
2733
|
# @return [String]
|
|
2719
2734
|
#
|
|
2720
2735
|
# @!attribute [rw] log_destination
|
|
@@ -2723,6 +2738,7 @@ module Aws::NetworkFirewall
|
|
|
2723
2738
|
#
|
|
2724
2739
|
# * For an Amazon S3 bucket, provide the name of the bucket, with key
|
|
2725
2740
|
# `bucketName`, and optionally provide a prefix, with key `prefix`.
|
|
2741
|
+
#
|
|
2726
2742
|
# The following example specifies an Amazon S3 bucket named
|
|
2727
2743
|
# `DOC-EXAMPLE-BUCKET` and the prefix `alerts`:
|
|
2728
2744
|
#
|
|
@@ -2735,9 +2751,9 @@ module Aws::NetworkFirewall
|
|
|
2735
2751
|
#
|
|
2736
2752
|
# `"LogDestination": \{ "logGroup": "alert-log-group" \}`
|
|
2737
2753
|
#
|
|
2738
|
-
# * For a
|
|
2739
|
-
#
|
|
2740
|
-
#
|
|
2754
|
+
# * For a Firehose delivery stream, provide the name of the delivery
|
|
2755
|
+
# stream, with key `deliveryStream`. The following example specifies
|
|
2756
|
+
# a delivery stream named `alert-delivery-stream`:
|
|
2741
2757
|
#
|
|
2742
2758
|
# `"LogDestination": \{ "deliveryStream": "alert-delivery-stream"
|
|
2743
2759
|
# \}`
|
|
@@ -3711,6 +3727,13 @@ module Aws::NetworkFirewall
|
|
|
3711
3727
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
|
3712
3728
|
# in the logs that the rule is filtering as you want, then change
|
|
3713
3729
|
# the action to `DROP`.
|
|
3730
|
+
#
|
|
3731
|
+
# * **REJECT** - Drops traffic that matches the conditions of the
|
|
3732
|
+
# stateful rule, and sends a TCP reset packet back to sender of the
|
|
3733
|
+
# packet. A TCP reset packet is a packet with no payload and an RST
|
|
3734
|
+
# bit contained in the TCP header flags. REJECT is available only
|
|
3735
|
+
# for TCP traffic. This option doesn't support FTP or IMAP
|
|
3736
|
+
# protocols.
|
|
3714
3737
|
# @return [String]
|
|
3715
3738
|
#
|
|
3716
3739
|
# @!attribute [rw] header
|
data/sig/client.rbs
CHANGED
|
@@ -48,6 +48,7 @@ module Aws
|
|
|
48
48
|
?sdk_ua_app_id: String,
|
|
49
49
|
?secret_access_key: String,
|
|
50
50
|
?session_token: String,
|
|
51
|
+
?sigv4a_signing_region_set: Array[String],
|
|
51
52
|
?simple_json: bool,
|
|
52
53
|
?stub_responses: untyped,
|
|
53
54
|
?token_provider: untyped,
|
|
@@ -814,7 +815,7 @@ module Aws
|
|
|
814
815
|
?logging_configuration: {
|
|
815
816
|
log_destination_configs: Array[
|
|
816
817
|
{
|
|
817
|
-
log_type: ("ALERT" | "FLOW"),
|
|
818
|
+
log_type: ("ALERT" | "FLOW" | "TLS"),
|
|
818
819
|
log_destination_type: ("S3" | "CloudWatchLogs" | "KinesisDataFirehose"),
|
|
819
820
|
log_destination: Hash[::String, ::String]
|
|
820
821
|
},
|
data/sig/resource.rbs
CHANGED
data/sig/types.rbs
CHANGED
|
@@ -526,7 +526,7 @@ module Aws::NetworkFirewall
|
|
|
526
526
|
end
|
|
527
527
|
|
|
528
528
|
class LogDestinationConfig
|
|
529
|
-
attr_accessor log_type: ("ALERT" | "FLOW")
|
|
529
|
+
attr_accessor log_type: ("ALERT" | "FLOW" | "TLS")
|
|
530
530
|
attr_accessor log_destination_type: ("S3" | "CloudWatchLogs" | "KinesisDataFirehose")
|
|
531
531
|
attr_accessor log_destination: ::Hash[::String, ::String]
|
|
532
532
|
SENSITIVE: []
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-networkfirewall
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.48.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-
|
|
11
|
+
date: 2024-07-25 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|
|
@@ -19,7 +19,7 @@ dependencies:
|
|
|
19
19
|
version: '3'
|
|
20
20
|
- - ">="
|
|
21
21
|
- !ruby/object:Gem::Version
|
|
22
|
-
version: 3.
|
|
22
|
+
version: 3.201.0
|
|
23
23
|
type: :runtime
|
|
24
24
|
prerelease: false
|
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
|
@@ -29,21 +29,21 @@ dependencies:
|
|
|
29
29
|
version: '3'
|
|
30
30
|
- - ">="
|
|
31
31
|
- !ruby/object:Gem::Version
|
|
32
|
-
version: 3.
|
|
32
|
+
version: 3.201.0
|
|
33
33
|
- !ruby/object:Gem::Dependency
|
|
34
34
|
name: aws-sigv4
|
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|
|
36
36
|
requirements:
|
|
37
37
|
- - "~>"
|
|
38
38
|
- !ruby/object:Gem::Version
|
|
39
|
-
version: '1.
|
|
39
|
+
version: '1.5'
|
|
40
40
|
type: :runtime
|
|
41
41
|
prerelease: false
|
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
|
43
43
|
requirements:
|
|
44
44
|
- - "~>"
|
|
45
45
|
- !ruby/object:Gem::Version
|
|
46
|
-
version: '1.
|
|
46
|
+
version: '1.5'
|
|
47
47
|
description: Official AWS Ruby gem for AWS Network Firewall (Network Firewall). This
|
|
48
48
|
gem is part of the AWS SDK for Ruby.
|
|
49
49
|
email:
|