aws-sdk-networkfirewall 1.27.0 → 1.28.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +7 -7
- data/lib/aws-sdk-networkfirewall/types.rb +19 -2
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 0777bee33353956140748399c259f21e1da2819f69f84f0353b438725e003c62
|
|
4
|
+
data.tar.gz: b3e1cf9cde792809cc2963d6b3293aca1915965a1be408eeb21ee22b4ba2db7f
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b50dc676821f92c9b96e1e41536c72c770c294240907afb2508d9c8001621dd797921395222c3e8d632dddd0415b68a883b6784a2d93f0142ac53089c72cb9ea
|
|
7
|
+
data.tar.gz: d8ce58d223868c23b80041a606de67df91f313f6adbf17066cb11d5b3d4a814a3ac1d294b413371ae371be9faf215d98bb85fa169d4cb13e0ddc9266da6002fb
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.28.0
|
|
@@ -663,7 +663,7 @@ module Aws::NetworkFirewall
|
|
|
663
663
|
# resp.firewall_status.sync_states #=> Hash
|
|
664
664
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
|
|
665
665
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
|
|
666
|
-
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "
|
|
666
|
+
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
|
|
667
667
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
|
|
668
668
|
# resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
|
|
669
669
|
# resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
|
|
@@ -766,7 +766,7 @@ module Aws::NetworkFirewall
|
|
|
766
766
|
# stateful_default_actions: ["CollectionMember_String"],
|
|
767
767
|
# stateful_engine_options: {
|
|
768
768
|
# rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
|
|
769
|
-
# stream_exception_policy: "DROP", # accepts DROP, CONTINUE
|
|
769
|
+
# stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
|
|
770
770
|
# },
|
|
771
771
|
# tls_inspection_configuration_arn: "ResourceArn",
|
|
772
772
|
# policy_variables: {
|
|
@@ -1331,7 +1331,7 @@ module Aws::NetworkFirewall
|
|
|
1331
1331
|
# resp.firewall_status.sync_states #=> Hash
|
|
1332
1332
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
|
|
1333
1333
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
|
|
1334
|
-
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "
|
|
1334
|
+
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
|
|
1335
1335
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
|
|
1336
1336
|
# resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
|
|
1337
1337
|
# resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
|
|
@@ -1593,7 +1593,7 @@ module Aws::NetworkFirewall
|
|
|
1593
1593
|
# resp.firewall_status.sync_states #=> Hash
|
|
1594
1594
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.subnet_id #=> String
|
|
1595
1595
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.endpoint_id #=> String
|
|
1596
|
-
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "
|
|
1596
|
+
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status #=> String, one of "CREATING", "DELETING", "FAILED", "ERROR", "SCALING", "READY"
|
|
1597
1597
|
# resp.firewall_status.sync_states["AvailabilityZone"].attachment.status_message #=> String
|
|
1598
1598
|
# resp.firewall_status.sync_states["AvailabilityZone"].config #=> Hash
|
|
1599
1599
|
# resp.firewall_status.sync_states["AvailabilityZone"].config["ResourceName"].sync_status #=> String, one of "PENDING", "IN_SYNC", "CAPACITY_CONSTRAINED"
|
|
@@ -1673,7 +1673,7 @@ module Aws::NetworkFirewall
|
|
|
1673
1673
|
# resp.firewall_policy.stateful_default_actions #=> Array
|
|
1674
1674
|
# resp.firewall_policy.stateful_default_actions[0] #=> String
|
|
1675
1675
|
# resp.firewall_policy.stateful_engine_options.rule_order #=> String, one of "DEFAULT_ACTION_ORDER", "STRICT_ORDER"
|
|
1676
|
-
# resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE"
|
|
1676
|
+
# resp.firewall_policy.stateful_engine_options.stream_exception_policy #=> String, one of "DROP", "CONTINUE", "REJECT"
|
|
1677
1677
|
# resp.firewall_policy.tls_inspection_configuration_arn #=> String
|
|
1678
1678
|
# resp.firewall_policy.policy_variables.rule_variables #=> Hash
|
|
1679
1679
|
# resp.firewall_policy.policy_variables.rule_variables["RuleVariableName"].definition #=> Array
|
|
@@ -2831,7 +2831,7 @@ module Aws::NetworkFirewall
|
|
|
2831
2831
|
# stateful_default_actions: ["CollectionMember_String"],
|
|
2832
2832
|
# stateful_engine_options: {
|
|
2833
2833
|
# rule_order: "DEFAULT_ACTION_ORDER", # accepts DEFAULT_ACTION_ORDER, STRICT_ORDER
|
|
2834
|
-
# stream_exception_policy: "DROP", # accepts DROP, CONTINUE
|
|
2834
|
+
# stream_exception_policy: "DROP", # accepts DROP, CONTINUE, REJECT
|
|
2835
2835
|
# },
|
|
2836
2836
|
# tls_inspection_configuration_arn: "ResourceArn",
|
|
2837
2837
|
# policy_variables: {
|
|
@@ -3520,7 +3520,7 @@ module Aws::NetworkFirewall
|
|
|
3520
3520
|
params: params,
|
|
3521
3521
|
config: config)
|
|
3522
3522
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
|
3523
|
-
context[:gem_version] = '1.
|
|
3523
|
+
context[:gem_version] = '1.28.0'
|
|
3524
3524
|
Seahorse::Client::Request.new(handlers, context)
|
|
3525
3525
|
end
|
|
3526
3526
|
|
|
@@ -3197,7 +3197,7 @@ module Aws::NetworkFirewall
|
|
|
3197
3197
|
#
|
|
3198
3198
|
#
|
|
3199
3199
|
#
|
|
3200
|
-
# [1]: https://suricata.readthedocs.
|
|
3200
|
+
# [1]: https://suricata.readthedocs.iorules/intro.html#
|
|
3201
3201
|
# @return [Array<Types::StatefulRule>]
|
|
3202
3202
|
#
|
|
3203
3203
|
# @!attribute [rw] stateless_rules_and_custom_actions
|
|
@@ -3449,6 +3449,13 @@ module Aws::NetworkFirewall
|
|
|
3449
3449
|
# behavior is rule dependent—a TCP-layer rule using a
|
|
3450
3450
|
# `flow:stateless` rule would still match, as would the
|
|
3451
3451
|
# `aws:drop_strict` default action.
|
|
3452
|
+
#
|
|
3453
|
+
# * `REJECT` - Network Firewall fails closed and drops all subsequent
|
|
3454
|
+
# traffic going to the firewall. Network Firewall also sends a TCP
|
|
3455
|
+
# reject packet back to your client so that the client can
|
|
3456
|
+
# immediately establish a new session. Network Firewall will have
|
|
3457
|
+
# context about the new session and will apply rules to the
|
|
3458
|
+
# subsequent traffic.
|
|
3452
3459
|
# @return [String]
|
|
3453
3460
|
#
|
|
3454
3461
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/StatefulEngineOptions AWS API Documentation
|
|
@@ -3468,7 +3475,7 @@ module Aws::NetworkFirewall
|
|
|
3468
3475
|
#
|
|
3469
3476
|
#
|
|
3470
3477
|
#
|
|
3471
|
-
# [1]: https://suricata.readthedocs.
|
|
3478
|
+
# [1]: https://suricata.readthedocs.iorules/intro.html#
|
|
3472
3479
|
#
|
|
3473
3480
|
# @!attribute [rw] action
|
|
3474
3481
|
# Defines what Network Firewall should do with the packets in a
|
|
@@ -3492,6 +3499,16 @@ module Aws::NetworkFirewall
|
|
|
3492
3499
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
|
3493
3500
|
# in the logs that the rule is filtering as you want, then change
|
|
3494
3501
|
# the action to `DROP`.
|
|
3502
|
+
#
|
|
3503
|
+
# * **REJECT** - Drops TCP traffic that matches the conditions of the
|
|
3504
|
+
# stateful rule, and sends a TCP reset packet back to sender of the
|
|
3505
|
+
# packet. A TCP reset packet is a packet with no payload and a `RST`
|
|
3506
|
+
# bit contained in the TCP header flags. Also sends an alert log
|
|
3507
|
+
# mesage if alert logging is configured in the Firewall
|
|
3508
|
+
# LoggingConfiguration.
|
|
3509
|
+
#
|
|
3510
|
+
# `REJECT` isn't currently available for use with IMAP and FTP
|
|
3511
|
+
# protocols.
|
|
3495
3512
|
# @return [String]
|
|
3496
3513
|
#
|
|
3497
3514
|
# @!attribute [rw] header
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-networkfirewall
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.28.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-05-
|
|
11
|
+
date: 2023-05-04 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: aws-sdk-core
|