aws-sdk-networkfirewall 1.75.0 → 1.77.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d25e10efc371018981b85441b4e4ba6b10a5bb66dfb5edc0f2036cae500bbd59
4
- data.tar.gz: 2081e1591e54a9010f7ffc1d9e10b2ecf3a2787b93c981c182a607c1c914a037
3
+ metadata.gz: ede64ef386739ee353b1302c14b192a02b89812a4a8b8259b9a2158ca473001a
4
+ data.tar.gz: 9513247b0b520a6a91543eb03998d3dbaaf58b907f7fabfd196c5f69690b9e26
5
5
  SHA512:
6
- metadata.gz: 6eec6d1532f60e037bff321cb68c10ba198606421a7d598e2d21a1d9b588a1bdfdd1626c137b3bda5c92586a58d5b978e6da09abff2a9e3ae1421ca92b525fde
7
- data.tar.gz: b94a06bc940ee2fd1039238bc9b997b532cc23170ffb99b7230e5dfc356e19434024483429fb66fdcbe6c910f88a072dc559e7ea08b116ba6f190ebde7814f9f
6
+ metadata.gz: 43f5bfe571ffeaa10cbc635fd5debfa40cee2cd42c19004208055fcbf5866bc908dcfbdc6c77e1f2c6a691120231a5c3720680b77c851ddb63f9c2020cd9da56
7
+ data.tar.gz: c24a6fde89ab499fe37f75211426bde470362b23d59280cf9b9c7f903add191e99915168a2c5e02d8c0dea5e54a09d682fb7d9c084811fcefedf0b692506828d
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.77.0 (2025-09-25)
5
+ ------------------
6
+
7
+ * Feature - Network Firewall now introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traffic.
8
+
9
+ 1.76.0 (2025-09-17)
10
+ ------------------
11
+
12
+ * Feature - Network Firewall now prevents TLS handshakes with the target server until after the Server Name Indication (SNI) has been seen and verified. The monitoring dashboard now provides deeper insights into PrivateLink endpoint candidates and offers filters based on IP addresses and protocol.
13
+
4
14
  1.75.0 (2025-08-28)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.75.0
1
+ 1.77.0
@@ -871,7 +871,7 @@ module Aws::NetworkFirewall
871
871
  # endpoints for a transit gateway-attached firewall. You must specify at
872
872
  # least one Availability Zone. Consider enabling the firewall in every
873
873
  # Availability Zone where you have workloads to maintain Availability
874
- # Zone independence.
874
+ # Zone isolation.
875
875
  #
876
876
  # You can modify Availability Zones later using
877
877
  # AssociateAvailabilityZones or DisassociateAvailabilityZones, but this
@@ -1080,6 +1080,7 @@ module Aws::NetworkFirewall
1080
1080
  # },
1081
1081
  # },
1082
1082
  # },
1083
+ # enable_tls_session_holding: false,
1083
1084
  # },
1084
1085
  # description: "Description",
1085
1086
  # tags: [
@@ -1291,7 +1292,7 @@ module Aws::NetworkFirewall
1291
1292
  # rules_source_list: {
1292
1293
  # targets: ["CollectionMember_String"], # required
1293
1294
  # target_types: ["TLS_SNI"], # required, accepts TLS_SNI, HTTP_HOST
1294
- # generated_rules_type: "ALLOWLIST", # required, accepts ALLOWLIST, DENYLIST
1295
+ # generated_rules_type: "ALLOWLIST", # required, accepts ALLOWLIST, DENYLIST, REJECTLIST, ALERTLIST
1295
1296
  # },
1296
1297
  # stateful_rules: [
1297
1298
  # {
@@ -1838,7 +1839,7 @@ module Aws::NetworkFirewall
1838
1839
  # the firewall owner or the transit gateway owner can delete the
1839
1840
  # attachment.
1840
1841
  #
1841
- # After you delete a transit gateway attachment, raffic will no longer
1842
+ # After you delete a transit gateway attachment, traffic will no longer
1842
1843
  # flow through the firewall endpoints.
1843
1844
  #
1844
1845
  # After you initiate the delete operation, use DescribeFirewall to
@@ -2268,6 +2269,7 @@ module Aws::NetworkFirewall
2268
2269
  # resp.firewall_policy.policy_variables.rule_variables #=> Hash
2269
2270
  # resp.firewall_policy.policy_variables.rule_variables["RuleVariableName"].definition #=> Array
2270
2271
  # resp.firewall_policy.policy_variables.rule_variables["RuleVariableName"].definition[0] #=> String
2272
+ # resp.firewall_policy.enable_tls_session_holding #=> Boolean
2271
2273
  #
2272
2274
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DescribeFirewallPolicy AWS API Documentation
2273
2275
  #
@@ -2488,7 +2490,7 @@ module Aws::NetworkFirewall
2488
2490
  # resp.rule_group.rules_source.rules_source_list.targets[0] #=> String
2489
2491
  # resp.rule_group.rules_source.rules_source_list.target_types #=> Array
2490
2492
  # resp.rule_group.rules_source.rules_source_list.target_types[0] #=> String, one of "TLS_SNI", "HTTP_HOST"
2491
- # resp.rule_group.rules_source.rules_source_list.generated_rules_type #=> String, one of "ALLOWLIST", "DENYLIST"
2493
+ # resp.rule_group.rules_source.rules_source_list.generated_rules_type #=> String, one of "ALLOWLIST", "DENYLIST", "REJECTLIST", "ALERTLIST"
2492
2494
  # resp.rule_group.rules_source.stateful_rules #=> Array
2493
2495
  # resp.rule_group.rules_source.stateful_rules[0].action #=> String, one of "PASS", "DROP", "ALERT", "REJECT"
2494
2496
  # resp.rule_group.rules_source.stateful_rules[0].header.protocol #=> String, one of "IP", "TCP", "UDP", "ICMP", "HTTP", "FTP", "TLS", "SMB", "DNS", "DCERPC", "SSH", "SMTP", "IMAP", "MSN", "KRB5", "IKEV2", "TFTP", "NTP", "DHCP", "HTTP2", "QUIC"
@@ -3722,8 +3724,9 @@ module Aws::NetworkFirewall
3722
3724
  # creation of routing components between the transit gateway and
3723
3725
  # firewall endpoints.
3724
3726
  #
3725
- # Only the firewall owner can reject the attachment. After rejection, no
3726
- # traffic will flow through the firewall endpoints for this attachment.
3727
+ # Only the transit gateway owner can reject the attachment. After
3728
+ # rejection, no traffic will flow through the firewall endpoints for
3729
+ # this attachment.
3727
3730
  #
3728
3731
  # Use DescribeFirewall to monitor the rejection status. To accept the
3729
3732
  # attachment instead of rejecting it, use
@@ -4541,6 +4544,7 @@ module Aws::NetworkFirewall
4541
4544
  # },
4542
4545
  # },
4543
4546
  # },
4547
+ # enable_tls_session_holding: false,
4544
4548
  # },
4545
4549
  # description: "Description",
4546
4550
  # dry_run: false,
@@ -4890,7 +4894,7 @@ module Aws::NetworkFirewall
4890
4894
  # rules_source_list: {
4891
4895
  # targets: ["CollectionMember_String"], # required
4892
4896
  # target_types: ["TLS_SNI"], # required, accepts TLS_SNI, HTTP_HOST
4893
- # generated_rules_type: "ALLOWLIST", # required, accepts ALLOWLIST, DENYLIST
4897
+ # generated_rules_type: "ALLOWLIST", # required, accepts ALLOWLIST, DENYLIST, REJECTLIST, ALERTLIST
4894
4898
  # },
4895
4899
  # stateful_rules: [
4896
4900
  # {
@@ -5273,7 +5277,7 @@ module Aws::NetworkFirewall
5273
5277
  tracer: tracer
5274
5278
  )
5275
5279
  context[:gem_name] = 'aws-sdk-networkfirewall'
5276
- context[:gem_version] = '1.75.0'
5280
+ context[:gem_version] = '1.77.0'
5277
5281
  Seahorse::Client::Request.new(handlers, context)
5278
5282
  end
5279
5283
 
@@ -119,6 +119,7 @@ module Aws::NetworkFirewall
119
119
  DisassociateSubnetsResponse = Shapes::StructureShape.new(name: 'DisassociateSubnetsResponse')
120
120
  Domain = Shapes::StringShape.new(name: 'Domain')
121
121
  EnableMonitoringDashboard = Shapes::BooleanShape.new(name: 'EnableMonitoringDashboard')
122
+ EnableTLSSessionHolding = Shapes::BooleanShape.new(name: 'EnableTLSSessionHolding')
122
123
  EnabledAnalysisType = Shapes::StringShape.new(name: 'EnabledAnalysisType')
123
124
  EnabledAnalysisTypes = Shapes::ListShape.new(name: 'EnabledAnalysisTypes')
124
125
  EncryptionConfiguration = Shapes::StructureShape.new(name: 'EncryptionConfiguration')
@@ -792,6 +793,7 @@ module Aws::NetworkFirewall
792
793
  FirewallPolicy.add_member(:stateful_engine_options, Shapes::ShapeRef.new(shape: StatefulEngineOptions, location_name: "StatefulEngineOptions"))
793
794
  FirewallPolicy.add_member(:tls_inspection_configuration_arn, Shapes::ShapeRef.new(shape: ResourceArn, location_name: "TLSInspectionConfigurationArn"))
794
795
  FirewallPolicy.add_member(:policy_variables, Shapes::ShapeRef.new(shape: PolicyVariables, location_name: "PolicyVariables"))
796
+ FirewallPolicy.add_member(:enable_tls_session_holding, Shapes::ShapeRef.new(shape: EnableTLSSessionHolding, location_name: "EnableTLSSessionHolding"))
795
797
  FirewallPolicy.struct_class = Types::FirewallPolicy
796
798
 
797
799
  FirewallPolicyMetadata.add_member(:name, Shapes::ShapeRef.new(shape: ResourceName, location_name: "Name"))
@@ -949,7 +949,7 @@ module Aws::NetworkFirewall
949
949
  # endpoints for a transit gateway-attached firewall. You must specify
950
950
  # at least one Availability Zone. Consider enabling the firewall in
951
951
  # every Availability Zone where you have workloads to maintain
952
- # Availability Zone independence.
952
+ # Availability Zone isolation.
953
953
  #
954
954
  # You can modify Availability Zones later using
955
955
  # AssociateAvailabilityZones or DisassociateAvailabilityZones, but
@@ -2969,6 +2969,12 @@ module Aws::NetworkFirewall
2969
2969
  # settings in your firewall policy.
2970
2970
  # @return [Types::PolicyVariables]
2971
2971
  #
2972
+ # @!attribute [rw] enable_tls_session_holding
2973
+ # When true, prevents TCP and TLS packets from reaching destination
2974
+ # servers until TLS Inspection has evaluated Server Name Indication
2975
+ # (SNI) rules. Requires an associated TLS Inspection configuration.
2976
+ # @return [Boolean]
2977
+ #
2972
2978
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/FirewallPolicy AWS API Documentation
2973
2979
  #
2974
2980
  class FirewallPolicy < Struct.new(
@@ -2980,7 +2986,8 @@ module Aws::NetworkFirewall
2980
2986
  :stateful_default_actions,
2981
2987
  :stateful_engine_options,
2982
2988
  :tls_inspection_configuration_arn,
2983
- :policy_variables)
2989
+ :policy_variables,
2990
+ :enable_tls_session_holding)
2984
2991
  SENSITIVE = []
2985
2992
  include Aws::Structure
2986
2993
  end
@@ -5198,8 +5205,15 @@ module Aws::NetworkFirewall
5198
5205
  # @return [Array<String>]
5199
5206
  #
5200
5207
  # @!attribute [rw] generated_rules_type
5201
- # Whether you want to allow or deny access to the domains in your
5202
- # target list.
5208
+ # Whether you want to apply allow, reject, alert, or drop behavior to
5209
+ # the domains in your target list.
5210
+ #
5211
+ # <note markdown="1"> When logging is enabled and you choose Alert, traffic that matches
5212
+ # the domain specifications generates an alert in the firewall's
5213
+ # logs. Then, traffic either passes, is rejected, or drops based on
5214
+ # other rules in the firewall policy.
5215
+ #
5216
+ # </note>
5203
5217
  # @return [String]
5204
5218
  #
5205
5219
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RulesSourceList AWS API Documentation
@@ -54,7 +54,7 @@ module Aws::NetworkFirewall
54
54
  autoload :EndpointProvider, 'aws-sdk-networkfirewall/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-networkfirewall/endpoints'
56
56
 
57
- GEM_VERSION = '1.75.0'
57
+ GEM_VERSION = '1.77.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -242,7 +242,8 @@ module Aws
242
242
  rule_variables: Hash[::String, {
243
243
  definition: Array[::String]
244
244
  }]?
245
- }?
245
+ }?,
246
+ enable_tls_session_holding: bool?
246
247
  },
247
248
  ?description: ::String,
248
249
  ?tags: Array[
@@ -286,7 +287,7 @@ module Aws
286
287
  rules_source_list: {
287
288
  targets: Array[::String],
288
289
  target_types: Array[("TLS_SNI" | "HTTP_HOST")],
289
- generated_rules_type: ("ALLOWLIST" | "DENYLIST")
290
+ generated_rules_type: ("ALLOWLIST" | "DENYLIST" | "REJECTLIST" | "ALERTLIST")
290
291
  }?,
291
292
  stateful_rules: Array[
292
293
  {
@@ -1161,7 +1162,8 @@ module Aws
1161
1162
  rule_variables: Hash[::String, {
1162
1163
  definition: Array[::String]
1163
1164
  }]?
1164
- }?
1165
+ }?,
1166
+ enable_tls_session_holding: bool?
1165
1167
  },
1166
1168
  ?description: ::String,
1167
1169
  ?dry_run: bool,
@@ -1241,7 +1243,7 @@ module Aws
1241
1243
  rules_source_list: {
1242
1244
  targets: Array[::String],
1243
1245
  target_types: Array[("TLS_SNI" | "HTTP_HOST")],
1244
- generated_rules_type: ("ALLOWLIST" | "DENYLIST")
1246
+ generated_rules_type: ("ALLOWLIST" | "DENYLIST" | "REJECTLIST" | "ALERTLIST")
1245
1247
  }?,
1246
1248
  stateful_rules: Array[
1247
1249
  {
data/sig/types.rbs CHANGED
@@ -557,6 +557,7 @@ module Aws::NetworkFirewall
557
557
  attr_accessor stateful_engine_options: Types::StatefulEngineOptions
558
558
  attr_accessor tls_inspection_configuration_arn: ::String
559
559
  attr_accessor policy_variables: Types::PolicyVariables
560
+ attr_accessor enable_tls_session_holding: bool
560
561
  SENSITIVE: []
561
562
  end
562
563
 
@@ -1008,7 +1009,7 @@ module Aws::NetworkFirewall
1008
1009
  class RulesSourceList
1009
1010
  attr_accessor targets: ::Array[::String]
1010
1011
  attr_accessor target_types: ::Array[("TLS_SNI" | "HTTP_HOST")]
1011
- attr_accessor generated_rules_type: ("ALLOWLIST" | "DENYLIST")
1012
+ attr_accessor generated_rules_type: ("ALLOWLIST" | "DENYLIST" | "REJECTLIST" | "ALERTLIST")
1012
1013
  SENSITIVE: []
1013
1014
  end
1014
1015
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.75.0
4
+ version: 1.77.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services