@aws-sdk/client-network-firewall 3.306.0 → 3.307.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -36,7 +36,7 @@ prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network F
36
36
  perimeter of your VPC. This includes filtering traffic going to and coming from an internet
37
37
  gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
38
38
  with Suricata, a free, open source network analysis and threat detection engine.
39
- Network Firewall supports Suricata version 5.0.2. For information about Suricata,
39
+ Network Firewall supports Suricata version 6.0.9. For information about Suricata,
40
40
  see the <a href="https://suricata.io/">Suricata website</a>.</p>
41
41
  <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
42
42
  The following are just a few examples: </p>
@@ -89,6 +89,7 @@ exports.ThrottlingException = ThrottlingException;
89
89
  exports.IPAddressType = {
90
90
  DUALSTACK: "DUALSTACK",
91
91
  IPV4: "IPV4",
92
+ IPV6: "IPV6",
92
93
  };
93
94
  class InsufficientCapacityException extends NetworkFirewallServiceException_1.NetworkFirewallServiceException {
94
95
  constructor(opts) {
@@ -80,6 +80,7 @@ export class ThrottlingException extends __BaseException {
80
80
  export const IPAddressType = {
81
81
  DUALSTACK: "DUALSTACK",
82
82
  IPV4: "IPV4",
83
+ IPV6: "IPV6",
83
84
  };
84
85
  export class InsufficientCapacityException extends __BaseException {
85
86
  constructor(opts) {
@@ -65,7 +65,7 @@ import { NetworkFirewallClient } from "./NetworkFirewallClient";
65
65
  * perimeter of your VPC. This includes filtering traffic going to and coming from an internet
66
66
  * gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
67
67
  * with Suricata, a free, open source network analysis and threat detection engine.
68
- * Network Firewall supports Suricata version 5.0.2. For information about Suricata,
68
+ * Network Firewall supports Suricata version 6.0.9. For information about Suricata,
69
69
  * see the <a href="https://suricata.io/">Suricata website</a>.</p>
70
70
  * <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
71
71
  * The following are just a few examples: </p>
@@ -206,7 +206,7 @@ export interface NetworkFirewallClientResolvedConfig extends NetworkFirewallClie
206
206
  * perimeter of your VPC. This includes filtering traffic going to and coming from an internet
207
207
  * gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
208
208
  * with Suricata, a free, open source network analysis and threat detection engine.
209
- * Network Firewall supports Suricata version 5.0.2. For information about Suricata,
209
+ * Network Firewall supports Suricata version 6.0.9. For information about Suricata,
210
210
  * see the <a href="https://suricata.io/">Suricata website</a>.</p>
211
211
  * <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
212
212
  * The following are just a few examples: </p>
@@ -38,7 +38,7 @@ export interface AssociateSubnetsCommandOutput extends AssociateSubnetsResponse,
38
38
  * SubnetMappings: [ // SubnetMappings // required
39
39
  * { // SubnetMapping
40
40
  * SubnetId: "STRING_VALUE", // required
41
- * IPAddressType: "DUALSTACK" || "IPV4",
41
+ * IPAddressType: "DUALSTACK" || "IPV4" || "IPV6",
42
42
  * },
43
43
  * ],
44
44
  * };
@@ -39,7 +39,7 @@ export interface CreateFirewallCommandOutput extends CreateFirewallResponse, __M
39
39
  * SubnetMappings: [ // SubnetMappings // required
40
40
  * { // SubnetMapping
41
41
  * SubnetId: "STRING_VALUE", // required
42
- * IPAddressType: "DUALSTACK" || "IPV4",
42
+ * IPAddressType: "DUALSTACK" || "IPV4" || "IPV6",
43
43
  * },
44
44
  * ],
45
45
  * DeleteProtection: true || false,
@@ -219,6 +219,7 @@ export declare class ThrottlingException extends __BaseException {
219
219
  export declare const IPAddressType: {
220
220
  readonly DUALSTACK: "DUALSTACK";
221
221
  readonly IPV4: "IPV4";
222
+ readonly IPV6: "IPV6";
222
223
  };
223
224
  /**
224
225
  * @public
@@ -1313,7 +1314,7 @@ export interface RuleOption {
1313
1314
  * <p>A single Suricata rules specification, for use in a stateful rule group.
1314
1315
  * Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options.
1315
1316
  * For information about the Suricata <code>Rules</code> format, see
1316
- * <a href="https://suricata.readthedocs.io/rules/intro.html#">Rules Format</a>. </p>
1317
+ * <a href="https://suricata.readthedocs.iorules/intro.html#">Rules Format</a>. </p>
1317
1318
  */
1318
1319
  export interface StatefulRule {
1319
1320
  /**
@@ -1582,7 +1583,7 @@ export interface RulesSource {
1582
1583
  * <p>An array of individual stateful rules inspection criteria to be used together in a stateful rule group.
1583
1584
  * Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options.
1584
1585
  * For information about the Suricata <code>Rules</code> format, see
1585
- * <a href="https://suricata.readthedocs.io/rules/intro.html#">Rules Format</a>. </p>
1586
+ * <a href="https://suricata.readthedocs.iorules/intro.html#">Rules Format</a>. </p>
1586
1587
  */
1587
1588
  StatefulRules?: StatefulRule[];
1588
1589
  /**
@@ -75,6 +75,7 @@ export declare class ThrottlingException extends __BaseException {
75
75
  export declare const IPAddressType: {
76
76
  readonly DUALSTACK: "DUALSTACK";
77
77
  readonly IPV4: "IPV4";
78
+ readonly IPV6: "IPV6";
78
79
  };
79
80
  export type IPAddressType = (typeof IPAddressType)[keyof typeof IPAddressType];
80
81
  export interface SubnetMapping {
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-network-firewall",
3
3
  "description": "AWS SDK for JavaScript Network Firewall Client for Node.js, Browser and React Native",
4
- "version": "3.306.0",
4
+ "version": "3.307.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",