aws-sdk-networkfirewall 1.27.0 → 1.28.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 848dc5acca2271ff27fe731050b218de6eb5bd90c5cf3f9238d2e7876bd779f1
4
- data.tar.gz: 5020c9ed7a2fdde8c547c9e45989ae6c57531ebef798c35c69b18ca031845bf1
3
+ metadata.gz: 0777bee33353956140748399c259f21e1da2819f69f84f0353b438725e003c62
4
+ data.tar.gz: b3e1cf9cde792809cc2963d6b3293aca1915965a1be408eeb21ee22b4ba2db7f
5
5
  SHA512:
6
- metadata.gz: 198569d2c17cdc7db5247a1e39838ec54582a80bafb30946911c02ef36e3482a09a2288407e9bdc86dd9cc8e63914f4dcf4f2b2eb156e220db172cafb8d9d393
7
- data.tar.gz: 56255332e20a9726aba325f3e512b28dad5dfcbd4cc7317df5be254aac4a2c5bddaa6f3ec11fb7d0539938866568997a93cf4c9615e1c83de9b4620f5101cbae
6
+ metadata.gz: b50dc676821f92c9b96e1e41536c72c770c294240907afb2508d9c8001621dd797921395222c3e8d632dddd0415b68a883b6784a2d93f0142ac53089c72cb9ea
7
+ data.tar.gz: d8ce58d223868c23b80041a606de67df91f313f6adbf17066cb11d5b3d4a814a3ac1d294b413371ae371be9faf215d98bb85fa169d4cb13e0ddc9266da6002fb
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.28.0 (2023-05-04)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for the Suricata REJECT option in midstream exception configurations.
8
+
4
9
  1.27.0 (2023-05-03)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.27.0
1
+ 1.28.0
@@ -663,7 +663,7 @@ module Aws::NetworkFirewall
663
663
  # resp.firewall_status.sync_states #=> Hash
664
664
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
665
665
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
666
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
666
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
667
667
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
668
668
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
669
669
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -766,7 +766,7 @@ module Aws::NetworkFirewall
766
766
  # stateful_default_actions: ["CollectionMember_String"],
767
767
  # stateful_engine_options: {
768
768
  # rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
769
- # stream_exception_policy: "DROP", # accepts DROP, CONTINUE
769
+ # stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
770
770
  # },
771
771
  # tls_inspection_configuration_arn: "ResourceArn",
772
772
  # policy_variables: {
@@ -1331,7 +1331,7 @@ module Aws::NetworkFirewall
1331
1331
  # resp.firewall_status.sync_states #=> Hash
1332
1332
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
1333
1333
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
1334
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
1334
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
1335
1335
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
1336
1336
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
1337
1337
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -1593,7 +1593,7 @@ module Aws::NetworkFirewall
1593
1593
  # resp.firewall_status.sync_states #=> Hash
1594
1594
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
1595
1595
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
1596
- # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "SCALING", "READY", "FAILED", "ERROR"
1596
+ # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
1597
1597
  # resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
1598
1598
  # resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
1599
1599
  # resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
@@ -1673,7 +1673,7 @@ module Aws::NetworkFirewall
1673
1673
  # resp.firewall_policy.stateful_default_actions #=> Array
1674
1674
  # resp.firewall_policy.stateful_default_actions[0] #=> String
1675
1675
  # resp.firewall_policy.stateful_engine_options.rule_order #=> String, one of "DEFAULT_ACTION_ORDER", "STRICT_ORDER"
1676
- # resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE"
1676
+ # resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE", "REJECT"
1677
1677
  # resp.firewall_policy.tls_inspection_configuration_arn #=> String
1678
1678
  # resp.firewall_policy.policy_variables.rule_variables #=> Hash
1679
1679
  # resp.firewall_policy.policy_variables.rule_variables["RuleVariableName"].definition #=> Array
@@ -2831,7 +2831,7 @@ module Aws::NetworkFirewall
2831
2831
  # stateful_default_actions: ["CollectionMember_String"],
2832
2832
  # stateful_engine_options: {
2833
2833
  # rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
2834
- # stream_exception_policy: "DROP", # accepts DROP, CONTINUE
2834
+ # stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
2835
2835
  # },
2836
2836
  # tls_inspection_configuration_arn: "ResourceArn",
2837
2837
  # policy_variables: {
@@ -3520,7 +3520,7 @@ module Aws::NetworkFirewall
3520
3520
  params: params,
3521
3521
  config: config)
3522
3522
  context[:gem_name] = 'aws-sdk-networkfirewall'
3523
- context[:gem_version] = '1.27.0'
3523
+ context[:gem_version] = '1.28.0'
3524
3524
  Seahorse::Client::Request.new(handlers, context)
3525
3525
  end
3526
3526
 
@@ -3197,7 +3197,7 @@ module Aws::NetworkFirewall
3197
3197
  #
3198
3198
  #
3199
3199
  #
3200
- # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3200
+ # [1]: https://suricata.readthedocs.iorules/intro.html#
3201
3201
  # @return [Array<Types::StatefulRule>]
3202
3202
  #
3203
3203
  # @!attribute [rw] stateless_rules_and_custom_actions
@@ -3449,6 +3449,13 @@ module Aws::NetworkFirewall
3449
3449
  # behavior is rule dependent—a TCP-layer rule using a
3450
3450
  # `flow:stateless` rule would still match, as would the
3451
3451
  # `aws:drop_strict` default action.
3452
+ #
3453
+ # * `REJECT` - Network Firewall fails closed and drops all subsequent
3454
+ # traffic going to the firewall. Network Firewall also sends a TCP
3455
+ # reject packet back to your client so that the client can
3456
+ # immediately establish a new session. Network Firewall will have
3457
+ # context about the new session and will apply rules to the
3458
+ # subsequent traffic.
3452
3459
  # @return [String]
3453
3460
  #
3454
3461
  # @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/StatefulEngineOptions AWS API Documentation
@@ -3468,7 +3475,7 @@ module Aws::NetworkFirewall
3468
3475
  #
3469
3476
  #
3470
3477
  #
3471
- # [1]: https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html
3478
+ # [1]: https://suricata.readthedocs.iorules/intro.html#
3472
3479
  #
3473
3480
  # @!attribute [rw] action
3474
3481
  # Defines what Network Firewall should do with the packets in a
@@ -3492,6 +3499,16 @@ module Aws::NetworkFirewall
3492
3499
  # drop traffic. You can enable the rule with `ALERT` action, verify
3493
3500
  # in the logs that the rule is filtering as you want, then change
3494
3501
  # the action to `DROP`.
3502
+ #
3503
+ # * **REJECT** - Drops TCP traffic that matches the conditions of the
3504
+ # stateful rule, and sends a TCP reset packet back to sender of the
3505
+ # packet. A TCP reset packet is a packet with no payload and a `RST`
3506
+ # bit contained in the TCP header flags. Also sends an alert log
3507
+ # mesage if alert logging is configured in the Firewall
3508
+ # LoggingConfiguration.
3509
+ #
3510
+ # `REJECT` isn't currently available for use with IMAP and FTP
3511
+ # protocols.
3495
3512
  # @return [String]
3496
3513
  #
3497
3514
  # @!attribute [rw] header
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-networkfirewall/customizations'
52
52
  # @!group service
53
53
  module Aws::NetworkFirewall
54
54
 
55
- GEM_VERSION = '1.27.0'
55
+ GEM_VERSION = '1.28.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-networkfirewall
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.27.0
4
+ version: 1.28.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-05-03 00:00:00.000000000 Z
11
+ date: 2023-05-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core