Skip to content

Commit 3b5b98b

Browse files
Added support for ClientRouteEnforcementOptions flag in CreateClientVpnEndpoint and ModifyClientVpnEndpoint requests and DescribeClientVpnEndpoints responses
1 parent e1717c0 commit 3b5b98b

22 files changed

+459
-30
lines changed

generator/ServiceModels/ec2/ec2-2016-11-15.api.json

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10301,6 +10301,21 @@
1030110301
}
1030210302
}
1030310303
},
10304+
"ClientRouteEnforcementOptions":{
10305+
"type":"structure",
10306+
"members":{
10307+
"Enforced":{"shape":"Boolean"}
10308+
}
10309+
},
10310+
"ClientRouteEnforcementResponseOptions":{
10311+
"type":"structure",
10312+
"members":{
10313+
"Enforced":{
10314+
"shape":"Boolean",
10315+
"locationName":"enforced"
10316+
}
10317+
}
10318+
},
1030410319
"ClientSecretType":{
1030510320
"type":"string",
1030610321
"sensitive":true
@@ -10563,6 +10578,10 @@
1056310578
"shape":"ClientLoginBannerResponseOptions",
1056410579
"locationName":"clientLoginBannerOptions"
1056510580
},
10581+
"ClientRouteEnforcementOptions":{
10582+
"shape":"ClientRouteEnforcementResponseOptions",
10583+
"locationName":"clientRouteEnforcementOptions"
10584+
},
1056610585
"DisconnectOnSessionTimeout":{
1056710586
"shape":"Boolean",
1056810587
"locationName":"disconnectOnSessionTimeout"
@@ -11458,6 +11477,7 @@
1145811477
"ClientConnectOptions":{"shape":"ClientConnectOptions"},
1145911478
"SessionTimeoutHours":{"shape":"Integer"},
1146011479
"ClientLoginBannerOptions":{"shape":"ClientLoginBannerOptions"},
11480+
"ClientRouteEnforcementOptions":{"shape":"ClientRouteEnforcementOptions"},
1146111481
"DisconnectOnSessionTimeout":{"shape":"Boolean"}
1146211482
}
1146311483
},
@@ -35485,6 +35505,7 @@
3548535505
"ClientConnectOptions":{"shape":"ClientConnectOptions"},
3548635506
"SessionTimeoutHours":{"shape":"Integer"},
3548735507
"ClientLoginBannerOptions":{"shape":"ClientLoginBannerOptions"},
35508+
"ClientRouteEnforcementOptions":{"shape":"ClientRouteEnforcementOptions"},
3548835509
"DisconnectOnSessionTimeout":{"shape":"Boolean"}
3548935510
}
3549035511
},
@@ -44762,7 +44783,8 @@
4476244783
"type":"string",
4476344784
"enum":[
4476444785
"alb",
44765-
"nlb"
44786+
"nlb",
44787+
"rnat"
4476644788
]
4476744789
},
4476844790
"ServiceNetworkArn":{"type":"string"},

generator/ServiceModels/ec2/ec2-2016-11-15.docs.json

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -394,7 +394,7 @@
394394
"DescribeVpcEndpointConnectionNotifications": "<p>Describes the connection notifications for VPC endpoints and VPC endpoint services.</p>",
395395
"DescribeVpcEndpointConnections": "<p>Describes the VPC endpoint connections to your VPC endpoint services, including any endpoints that are pending your acceptance.</p>",
396396
"DescribeVpcEndpointServiceConfigurations": "<p>Describes the VPC endpoint service configurations in your account (your services).</p>",
397-
"DescribeVpcEndpointServicePermissions": "<p>Describes the principals (service consumers) that are permitted to discover your VPC endpoint service.</p>",
397+
"DescribeVpcEndpointServicePermissions": "<p>Describes the principals (service consumers) that are permitted to discover your VPC endpoint service. Principal ARNs with path components aren't supported.</p>",
398398
"DescribeVpcEndpointServices": "<p>Describes available services to which you can create a VPC endpoint.</p> <p>When the service provider and the consumer have different accounts in multiple Availability Zones, and the consumer views the VPC endpoint service information, the response only includes the common Availability Zones. For example, when the service provider account uses <code>us-east-1a</code> and <code>us-east-1c</code> and the consumer uses <code>us-east-1a</code> and <code>us-east-1b</code>, the response includes the VPC endpoint services in the common Availability Zone, <code>us-east-1a</code>.</p>",
399399
"DescribeVpcEndpoints": "<p>Describes your VPC endpoints. The default is to describe all your VPC endpoints. Alternatively, you can specify specific VPC endpoint IDs or filter the results to include only the VPC endpoints that match specific criteria.</p>",
400400
"DescribeVpcPeeringConnections": "<p>Describes your VPC peering connections. The default is to describe all your VPC peering connections. Alternatively, you can specify specific VPC peering connection IDs or filter the results to include only the VPC peering connections that match specific criteria.</p>",
@@ -595,7 +595,7 @@
595595
"ModifyVpcEndpointConnectionNotification": "<p>Modifies a connection notification for VPC endpoint or VPC endpoint service. You can change the SNS topic for the notification, or the events for which to be notified. </p>",
596596
"ModifyVpcEndpointServiceConfiguration": "<p>Modifies the attributes of the specified VPC endpoint service configuration.</p> <p>If you set or modify the private DNS name, you must prove that you own the private DNS domain name.</p>",
597597
"ModifyVpcEndpointServicePayerResponsibility": "<p>Modifies the payer responsibility for your VPC endpoint service.</p>",
598-
"ModifyVpcEndpointServicePermissions": "<p>Modifies the permissions for your VPC endpoint service. You can add or remove permissions for service consumers (Amazon Web Services accounts, users, and IAM roles) to connect to your endpoint service.</p> <p>If you grant permissions to all principals, the service is public. Any users who know the name of a public service can send a request to attach an endpoint. If the service does not require manual approval, attachments are automatically approved.</p>",
598+
"ModifyVpcEndpointServicePermissions": "<p>Modifies the permissions for your VPC endpoint service. You can add or remove permissions for service consumers (Amazon Web Services accounts, users, and IAM roles) to connect to your endpoint service. Principal ARNs with path components aren't supported.</p> <p>If you grant permissions to all principals, the service is public. Any users who know the name of a public service can send a request to attach an endpoint. If the service does not require manual approval, attachments are automatically approved.</p>",
599599
"ModifyVpcPeeringConnectionOptions": "<p>Modifies the VPC peering connection options on one side of a VPC peering connection.</p> <p>If the peered VPCs are in the same Amazon Web Services account, you can enable DNS resolution for queries from the local VPC. This ensures that queries from the local VPC resolve to private IP addresses in the peer VPC. This option is not available if the peered VPCs are in different Amazon Web Services accounts or different Regions. For peered VPCs in different Amazon Web Services accounts, each Amazon Web Services account owner must initiate a separate request to modify the peering connection options. For inter-region peering connections, you must use the Region for the requester VPC to modify the requester VPC peering options and the Region for the accepter VPC to modify the accepter VPC peering options. To verify which VPCs are the accepter and the requester for a VPC peering connection, use the <a>DescribeVpcPeeringConnections</a> command.</p>",
600600
"ModifyVpcTenancy": "<p>Modifies the instance tenancy attribute of the specified VPC. You can change the instance tenancy attribute of a VPC to <code>default</code> only. You cannot change the instance tenancy attribute to <code>dedicated</code>.</p> <p>After you modify the tenancy of the VPC, any new instances that you launch into the VPC have a tenancy of <code>default</code>, unless you specify otherwise during launch. The tenancy of any existing instances in the VPC is not affected.</p> <p>For more information, see <a href=\"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/dedicated-instance.html\">Dedicated Instances</a> in the <i>Amazon EC2 User Guide</i>.</p>",
601601
"ModifyVpnConnection": "<p>Modifies the customer gateway or the target gateway of an Amazon Web Services Site-to-Site VPN connection. To modify the target gateway, the following migration options are available:</p> <ul> <li> <p>An existing virtual private gateway to a new virtual private gateway</p> </li> <li> <p>An existing virtual private gateway to a transit gateway</p> </li> <li> <p>An existing transit gateway to a new transit gateway</p> </li> <li> <p>An existing transit gateway to a virtual private gateway</p> </li> </ul> <p>Before you perform the migration to the new gateway, you must configure the new gateway. Use <a>CreateVpnGateway</a> to create a virtual private gateway, or <a>CreateTransitGateway</a> to create a transit gateway.</p> <p>This step is required when you migrate from a virtual private gateway with static routes to a transit gateway. </p> <p>You must delete the static routes before you migrate to the new gateway.</p> <p>Keep a copy of the static route before you delete it. You will need to add back these routes to the transit gateway after the VPN connection migration is complete.</p> <p>After you migrate to the new gateway, you might need to modify your VPC route table. Use <a>CreateRoute</a> and <a>DeleteRoute</a> to make the changes described in <a href=\"https://docs.aws.amazon.com/vpn/latest/s2svpn/modify-vpn-target.html#step-update-routing\">Update VPC route tables</a> in the <i>Amazon Web Services Site-to-Site VPN User Guide</i>.</p> <p>When the new gateway is a transit gateway, modify the transit gateway route table to allow traffic between the VPC and the Amazon Web Services Site-to-Site VPN connection. Use <a>CreateTransitGatewayRoute</a> to add the routes.</p> <p> If you deleted VPN static routes, you must add the static routes to the transit gateway route table.</p> <p>After you perform this operation, the VPN endpoint's IP addresses on the Amazon Web Services side and the tunnel options remain intact. Your Amazon Web Services Site-to-Site VPN connection will be temporarily unavailable for a brief period while we provision the new endpoints.</p>",
@@ -2234,6 +2234,8 @@
22342234
"ClientConnectResponseOptions$Enabled": "<p>Indicates whether client connect options are enabled.</p>",
22352235
"ClientLoginBannerOptions$Enabled": "<p>Enable or disable a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p> <p>Valid values: <code>true | false</code> </p> <p>Default value: <code>false</code> </p>",
22362236
"ClientLoginBannerResponseOptions$Enabled": "<p>Current state of text banner feature.</p> <p>Valid values: <code>true | false</code> </p>",
2237+
"ClientRouteEnforcementOptions$Enforced": "<p>Enable or disable the client route enforcement feature.</p> <p>Valid values: <code>true | false</code> </p> <p>Default value: <code>false</code> </p>",
2238+
"ClientRouteEnforcementResponseOptions$Enforced": "<p>Status of the client route enforcement feature.</p> <p>Valid values: <code>true | false</code> </p> <p>Default value: <code>false</code> </p>",
22372239
"ClientVpnEndpoint$SplitTunnel": "<p>Indicates whether split-tunnel is enabled in the Client VPN endpoint.</p> <p>For information about split-tunnel VPN endpoints, see <a href=\"https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/split-tunnel-vpn.html\">Split-Tunnel Client VPN endpoint</a> in the <i>Client VPN Administrator Guide</i>.</p>",
22382240
"ClientVpnEndpoint$DisconnectOnSessionTimeout": "<p>Indicates whether the client VPN session is disconnected after the maximum <code>sessionTimeoutHours</code> is reached. If <code>true</code>, users are prompted to reconnect client VPN. If <code>false</code>, client VPN attempts to reconnect automatically. The default value is <code>false</code>.</p>",
22392241
"CloudWatchLogOptions$LogEnabled": "<p>Status of VPN tunnel logging feature. Default value is <code>False</code>.</p> <p>Valid values: <code>True</code> | <code>False</code> </p>",
@@ -3979,6 +3981,19 @@
39793981
"ClientVpnEndpoint$ClientLoginBannerOptions": "<p>Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p>"
39803982
}
39813983
},
3984+
"ClientRouteEnforcementOptions": {
3985+
"base": "<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>",
3986+
"refs": {
3987+
"CreateClientVpnEndpointRequest$ClientRouteEnforcementOptions": "<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>",
3988+
"ModifyClientVpnEndpointRequest$ClientRouteEnforcementOptions": "<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>"
3989+
}
3990+
},
3991+
"ClientRouteEnforcementResponseOptions": {
3992+
"base": "<p>The current status of client route enforcement. The state will either be <code>true</code> (enabled) or <code>false</code> (disabled).</p>",
3993+
"refs": {
3994+
"ClientVpnEndpoint$ClientRouteEnforcementOptions": "<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>"
3995+
}
3996+
},
39823997
"ClientSecretType": {
39833998
"base": null,
39843999
"refs": {
@@ -5755,15 +5770,15 @@
57555770
"base": null,
57565771
"refs": {
57575772
"ModifyTransitGatewayOptions$DefaultRouteTableAssociation": "<p>Enable or disable automatic association with the default association route table.</p>",
5758-
"TransitGatewayOptions$DefaultRouteTableAssociation": "<p>Indicates whether resource attachments are automatically associated with the default association route table.</p>",
5773+
"TransitGatewayOptions$DefaultRouteTableAssociation": "<p>Indicates whether resource attachments are automatically associated with the default association route table. Enabled by default. If <code>defaultRouteTableAssociation</code> is set to <code>enable</code>, Amazon Web Services Transit Gateway will create the default transit gateway route table.</p>",
57595774
"TransitGatewayRequestOptions$DefaultRouteTableAssociation": "<p>Enable or disable automatic association with the default association route table. Enabled by default.</p>"
57605775
}
57615776
},
57625777
"DefaultRouteTablePropagationValue": {
57635778
"base": null,
57645779
"refs": {
57655780
"ModifyTransitGatewayOptions$DefaultRouteTablePropagation": "<p>Enable or disable automatic propagation of routes to the default propagation route table.</p>",
5766-
"TransitGatewayOptions$DefaultRouteTablePropagation": "<p>Indicates whether resource attachments automatically propagate routes to the default propagation route table.</p>",
5781+
"TransitGatewayOptions$DefaultRouteTablePropagation": "<p>Indicates whether resource attachments automatically propagate routes to the default propagation route table. Enabled by default. If <code>defaultRouteTablePropagation</code> is set to <code>enable</code>, Amazon Web Services Transit Gateway will create the default transit gateway route table.</p>",
57675782
"TransitGatewayRequestOptions$DefaultRouteTablePropagation": "<p>Enable or disable automatic propagation of routes to the default propagation route table. Enabled by default.</p>"
57685783
}
57695784
},

0 commit comments

Comments
 (0)