@aws-sdk/client-network-firewall 3.326.0 → 3.327.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -153,6 +153,7 @@ exports.RuleOrder = {
153
153
  exports.StreamExceptionPolicy = {
154
154
  CONTINUE: "CONTINUE",
155
155
  DROP: "DROP",
156
+ REJECT: "REJECT",
156
157
  };
157
158
  exports.OverrideAction = {
158
159
  DROP_TO_ALERT: "DROP_TO_ALERT",
@@ -142,6 +142,7 @@ export const RuleOrder = {
142
142
  export const StreamExceptionPolicy = {
143
143
  CONTINUE: "CONTINUE",
144
144
  DROP: "DROP",
145
+ REJECT: "REJECT",
145
146
  };
146
147
  export const OverrideAction = {
147
148
  DROP_TO_ALERT: "DROP_TO_ALERT",
@@ -95,7 +95,7 @@ export interface CreateFirewallCommandOutput extends CreateFirewallResponse, __M
95
95
  * // Attachment: { // Attachment
96
96
  * // SubnetId: "STRING_VALUE",
97
97
  * // EndpointId: "STRING_VALUE",
98
- * // Status: "CREATING" || "DELETING" || "SCALING" || "READY" || "FAILED" || "ERROR",
98
+ * // Status: "CREATING" || "DELETING" || "FAILED" || "ERROR" || "SCALING" || "READY",
99
99
  * // StatusMessage: "STRING_VALUE",
100
100
  * // },
101
101
  * // Config: { // SyncStateConfig
@@ -72,7 +72,7 @@ export interface CreateFirewallPolicyCommandOutput extends CreateFirewallPolicyR
72
72
  * ],
73
73
  * StatefulEngineOptions: { // StatefulEngineOptions
74
74
  * RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
75
- * StreamExceptionPolicy: "DROP" || "CONTINUE",
75
+ * StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
76
76
  * },
77
77
  * TLSInspectionConfigurationArn: "STRING_VALUE",
78
78
  * PolicyVariables: { // PolicyVariables
@@ -78,7 +78,7 @@ export interface DeleteFirewallCommandOutput extends DeleteFirewallResponse, __M
78
78
  * // Attachment: { // Attachment
79
79
  * // SubnetId: "STRING_VALUE",
80
80
  * // EndpointId: "STRING_VALUE",
81
- * // Status: "CREATING" || "DELETING" || "SCALING" || "READY" || "FAILED" || "ERROR",
81
+ * // Status: "CREATING" || "DELETING" || "FAILED" || "ERROR" || "SCALING" || "READY",
82
82
  * // StatusMessage: "STRING_VALUE",
83
83
  * // },
84
84
  * // Config: { // SyncStateConfig
@@ -69,7 +69,7 @@ export interface DescribeFirewallCommandOutput extends DescribeFirewallResponse,
69
69
  * // Attachment: { // Attachment
70
70
  * // SubnetId: "STRING_VALUE",
71
71
  * // EndpointId: "STRING_VALUE",
72
- * // Status: "CREATING" || "DELETING" || "SCALING" || "READY" || "FAILED" || "ERROR",
72
+ * // Status: "CREATING" || "DELETING" || "FAILED" || "ERROR" || "SCALING" || "READY",
73
73
  * // StatusMessage: "STRING_VALUE",
74
74
  * // },
75
75
  * // Config: { // SyncStateConfig
@@ -96,7 +96,7 @@ export interface DescribeFirewallPolicyCommandOutput extends DescribeFirewallPol
96
96
  * // ],
97
97
  * // StatefulEngineOptions: { // StatefulEngineOptions
98
98
  * // RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
99
- * // StreamExceptionPolicy: "DROP" || "CONTINUE",
99
+ * // StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
100
100
  * // },
101
101
  * // TLSInspectionConfigurationArn: "STRING_VALUE",
102
102
  * // PolicyVariables: { // PolicyVariables
@@ -71,7 +71,7 @@ export interface UpdateFirewallPolicyCommandOutput extends UpdateFirewallPolicyR
71
71
  * ],
72
72
  * StatefulEngineOptions: { // StatefulEngineOptions
73
73
  * RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
74
- * StreamExceptionPolicy: "DROP" || "CONTINUE",
74
+ * StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
75
75
  * },
76
76
  * TLSInspectionConfigurationArn: "STRING_VALUE",
77
77
  * PolicyVariables: { // PolicyVariables
@@ -776,6 +776,7 @@ export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
776
776
  export declare const StreamExceptionPolicy: {
777
777
  readonly CONTINUE: "CONTINUE";
778
778
  readonly DROP: "DROP";
779
+ readonly REJECT: "REJECT";
779
780
  };
780
781
  /**
781
782
  * @public
@@ -805,6 +806,10 @@ export interface StatefulEngineOptions {
805
806
  * <p>
806
807
  * <code>CONTINUE</code> - Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to <code>drop http</code> traffic, Network Firewall won't match the traffic for this rule because the service won't have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a <code>flow:stateless</code> rule would still match, as would the <code>aws:drop_strict</code> default action.</p>
807
808
  * </li>
809
+ * <li>
810
+ * <p>
811
+ * <code>REJECT</code> - Network Firewall fails closed and drops all subsequent traffic going to the firewall. Network Firewall also sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall will have context about the new session and will apply rules to the subsequent traffic.</p>
812
+ * </li>
808
813
  * </ul>
809
814
  */
810
815
  StreamExceptionPolicy?: StreamExceptionPolicy | string;
@@ -1342,7 +1347,7 @@ export interface RuleOption {
1342
1347
  * <p>A single Suricata rules specification, for use in a stateful rule group.
1343
1348
  * Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options.
1344
1349
  * For information about the Suricata <code>Rules</code> format, see
1345
- * <a href="https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html">Rules Format</a>. </p>
1350
+ * <a href="https://suricata.readthedocs.iorules/intro.html#">Rules Format</a>. </p>
1346
1351
  */
1347
1352
  export interface StatefulRule {
1348
1353
  /**
@@ -1371,6 +1376,13 @@ export interface StatefulRule {
1371
1376
  * can enable the rule with <code>ALERT</code> action, verify in the logs that the rule
1372
1377
  * is filtering as you want, then change the action to <code>DROP</code>.</p>
1373
1378
  * </li>
1379
+ * <li>
1380
+ * <p>
1381
+ * <b>REJECT</b> - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a <code>RST</code> bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the <a>Firewall</a>
1382
+ * <a>LoggingConfiguration</a>.</p>
1383
+ * <p>
1384
+ * <code>REJECT</code> isn't currently available for use with IMAP and FTP protocols.</p>
1385
+ * </li>
1374
1386
  * </ul>
1375
1387
  */
1376
1388
  Action: StatefulAction | string | undefined;
@@ -1604,7 +1616,7 @@ export interface RulesSource {
1604
1616
  * <p>An array of individual stateful rules inspection criteria to be used together in a stateful rule group.
1605
1617
  * Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options.
1606
1618
  * For information about the Suricata <code>Rules</code> format, see
1607
- * <a href="https://suricata.readthedocs.io/en/suricata-6.0.9/rules/intro.html">Rules Format</a>. </p>
1619
+ * <a href="https://suricata.readthedocs.iorules/intro.html#">Rules Format</a>. </p>
1608
1620
  */
1609
1621
  StatefulRules?: StatefulRule[];
1610
1622
  /**
@@ -236,6 +236,7 @@ export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
236
236
  export declare const StreamExceptionPolicy: {
237
237
  readonly CONTINUE: "CONTINUE";
238
238
  readonly DROP: "DROP";
239
+ readonly REJECT: "REJECT";
239
240
  };
240
241
  export type StreamExceptionPolicy =
241
242
  (typeof StreamExceptionPolicy)[keyof typeof StreamExceptionPolicy];
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-network-firewall",
3
3
  "description": "AWS SDK for JavaScript Network Firewall Client for Node.js, Browser and React Native",
4
- "version": "3.326.0",
4
+ "version": "3.327.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -21,9 +21,9 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "3.0.0",
23
23
  "@aws-crypto/sha256-js": "3.0.0",
24
- "@aws-sdk/client-sts": "3.326.0",
24
+ "@aws-sdk/client-sts": "3.327.0",
25
25
  "@aws-sdk/config-resolver": "3.310.0",
26
- "@aws-sdk/credential-provider-node": "3.326.0",
26
+ "@aws-sdk/credential-provider-node": "3.327.0",
27
27
  "@aws-sdk/fetch-http-handler": "3.310.0",
28
28
  "@aws-sdk/hash-node": "3.310.0",
29
29
  "@aws-sdk/invalid-dependency": "3.310.0",
@@ -32,11 +32,11 @@
32
32
  "@aws-sdk/middleware-host-header": "3.325.0",
33
33
  "@aws-sdk/middleware-logger": "3.325.0",
34
34
  "@aws-sdk/middleware-recursion-detection": "3.325.0",
35
- "@aws-sdk/middleware-retry": "3.325.0",
35
+ "@aws-sdk/middleware-retry": "3.327.0",
36
36
  "@aws-sdk/middleware-serde": "3.325.0",
37
37
  "@aws-sdk/middleware-signing": "3.325.0",
38
38
  "@aws-sdk/middleware-stack": "3.325.0",
39
- "@aws-sdk/middleware-user-agent": "3.325.0",
39
+ "@aws-sdk/middleware-user-agent": "3.327.0",
40
40
  "@aws-sdk/node-config-provider": "3.310.0",
41
41
  "@aws-sdk/node-http-handler": "3.321.1",
42
42
  "@aws-sdk/protocol-http": "3.310.0",
@@ -48,8 +48,8 @@
48
48
  "@aws-sdk/util-body-length-node": "3.310.0",
49
49
  "@aws-sdk/util-defaults-mode-browser": "3.325.0",
50
50
  "@aws-sdk/util-defaults-mode-node": "3.325.0",
51
- "@aws-sdk/util-endpoints": "3.319.0",
52
- "@aws-sdk/util-retry": "3.310.0",
51
+ "@aws-sdk/util-endpoints": "3.327.0",
52
+ "@aws-sdk/util-retry": "3.327.0",
53
53
  "@aws-sdk/util-user-agent-browser": "3.310.0",
54
54
  "@aws-sdk/util-user-agent-node": "3.310.0",
55
55
  "@aws-sdk/util-utf8": "3.310.0",