Skip to content

Commit 52aaaf2

Browse files
author
AWS
committed
Amazon Elastic Compute Cloud Update: Added support for ClientRouteEnforcementOptions flag in CreateClientVpnEndpoint and ModifyClientVpnEndpoint requests and DescribeClientVpnEndpoints responses
1 parent 1eef5bc commit 52aaaf2

File tree

2 files changed

+46
-5
lines changed

2 files changed

+46
-5
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon Elastic Compute Cloud",
4+
"contributor": "",
5+
"description": "Added support for ClientRouteEnforcementOptions flag in CreateClientVpnEndpoint and ModifyClientVpnEndpoint requests and DescribeClientVpnEndpoints responses"
6+
}

services/ec2/src/main/resources/codegen-resources/service-2.json

Lines changed: 40 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3917,7 +3917,7 @@
39173917
},
39183918
"input":{"shape":"DescribeVpcEndpointServicePermissionsRequest"},
39193919
"output":{"shape":"DescribeVpcEndpointServicePermissionsResult"},
3920-
"documentation":"<p>Describes the principals (service consumers) that are permitted to discover your VPC endpoint service.</p>"
3920+
"documentation":"<p>Describes the principals (service consumers) that are permitted to discover your VPC endpoint service. Principal ARNs with path components aren't supported.</p>"
39213921
},
39223922
"DescribeVpcEndpointServices":{
39233923
"name":"DescribeVpcEndpointServices",
@@ -5910,7 +5910,7 @@
59105910
},
59115911
"input":{"shape":"ModifyVpcEndpointServicePermissionsRequest"},
59125912
"output":{"shape":"ModifyVpcEndpointServicePermissionsResult"},
5913-
"documentation":"<p>Modifies the permissions for your VPC endpoint service. You can add or remove permissions for service consumers (Amazon Web Services accounts, users, and IAM roles) to connect to your endpoint service.</p> <p>If you grant permissions to all principals, the service is public. Any users who know the name of a public service can send a request to attach an endpoint. If the service does not require manual approval, attachments are automatically approved.</p>"
5913+
"documentation":"<p>Modifies the permissions for your VPC endpoint service. You can add or remove permissions for service consumers (Amazon Web Services accounts, users, and IAM roles) to connect to your endpoint service. Principal ARNs with path components aren't supported.</p> <p>If you grant permissions to all principals, the service is public. Any users who know the name of a public service can send a request to attach an endpoint. If the service does not require manual approval, attachments are automatically approved.</p>"
59145914
},
59155915
"ModifyVpcPeeringConnectionOptions":{
59165916
"name":"ModifyVpcPeeringConnectionOptions",
@@ -12088,6 +12088,27 @@
1208812088
},
1208912089
"documentation":"<p>Current state of options for customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p>"
1209012090
},
12091+
"ClientRouteEnforcementOptions":{
12092+
"type":"structure",
12093+
"members":{
12094+
"Enforced":{
12095+
"shape":"Boolean",
12096+
"documentation":"<p>Enable or disable the client route enforcement feature.</p> <p>Valid values: <code>true | false</code> </p> <p>Default value: <code>false</code> </p>"
12097+
}
12098+
},
12099+
"documentation":"<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>"
12100+
},
12101+
"ClientRouteEnforcementResponseOptions":{
12102+
"type":"structure",
12103+
"members":{
12104+
"Enforced":{
12105+
"shape":"Boolean",
12106+
"documentation":"<p>Status of the client route enforcement feature.</p> <p>Valid values: <code>true | false</code> </p> <p>Default value: <code>false</code> </p>",
12107+
"locationName":"enforced"
12108+
}
12109+
},
12110+
"documentation":"<p>The current status of client route enforcement. The state will either be <code>true</code> (enabled) or <code>false</code> (disabled).</p>"
12111+
},
1209112112
"ClientSecretType":{
1209212113
"type":"string",
1209312114
"sensitive":true
@@ -12412,6 +12433,11 @@
1241212433
"documentation":"<p>Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p>",
1241312434
"locationName":"clientLoginBannerOptions"
1241412435
},
12436+
"ClientRouteEnforcementOptions":{
12437+
"shape":"ClientRouteEnforcementResponseOptions",
12438+
"documentation":"<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>",
12439+
"locationName":"clientRouteEnforcementOptions"
12440+
},
1241512441
"DisconnectOnSessionTimeout":{
1241612442
"shape":"Boolean",
1241712443
"documentation":"<p>Indicates whether the client VPN session is disconnected after the maximum <code>sessionTimeoutHours</code> is reached. If <code>true</code>, users are prompted to reconnect client VPN. If <code>false</code>, client VPN attempts to reconnect automatically. The default value is <code>false</code>.</p>",
@@ -13671,6 +13697,10 @@
1367113697
"shape":"ClientLoginBannerOptions",
1367213698
"documentation":"<p>Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p>"
1367313699
},
13700+
"ClientRouteEnforcementOptions":{
13701+
"shape":"ClientRouteEnforcementOptions",
13702+
"documentation":"<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>"
13703+
},
1367413704
"DisconnectOnSessionTimeout":{
1367513705
"shape":"Boolean",
1367613706
"documentation":"<p>Indicates whether the client VPN session is disconnected after the maximum timeout specified in <code>SessionTimeoutHours</code> is reached. If <code>true</code>, users are prompted to reconnect client VPN. If <code>false</code>, client VPN attempts to reconnect automatically. The default value is <code>false</code>.</p>"
@@ -45799,6 +45829,10 @@
4579945829
"shape":"ClientLoginBannerOptions",
4580045830
"documentation":"<p>Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.</p>"
4580145831
},
45832+
"ClientRouteEnforcementOptions":{
45833+
"shape":"ClientRouteEnforcementOptions",
45834+
"documentation":"<p>Client route enforcement is a feature of the Client VPN service that helps enforce administrator defined routes on devices connected through the VPN. T his feature helps improve your security posture by ensuring that network traffic originating from a connected client is not inadvertently sent outside the VPN tunnel.</p> <p>Client route enforcement works by monitoring the route table of a connected device for routing policy changes to the VPN connection. If the feature detects any VPN routing policy modifications, it will automatically force an update to the route table, reverting it back to the expected route configurations.</p>"
45835+
},
4580245836
"DisconnectOnSessionTimeout":{
4580345837
"shape":"Boolean",
4580445838
"documentation":"<p>Indicates whether the client VPN session is disconnected after the maximum timeout specified in <code>sessionTimeoutHours</code> is reached. If <code>true</code>, users are prompted to reconnect client VPN. If <code>false</code>, client VPN attempts to reconnect automatically. The default value is <code>false</code>.</p>"
@@ -58342,7 +58376,8 @@
5834258376
"type":"string",
5834358377
"enum":[
5834458378
"alb",
58345-
"nlb"
58379+
"nlb",
58380+
"rnat"
5834658381
]
5834758382
},
5834858383
"ServiceNetworkArn":{"type":"string"},
@@ -62302,7 +62337,7 @@
6230262337
},
6230362338
"DefaultRouteTableAssociation":{
6230462339
"shape":"DefaultRouteTableAssociationValue",
62305-
"documentation":"<p>Indicates whether resource attachments are automatically associated with the default association route table.</p>",
62340+
"documentation":"<p>Indicates whether resource attachments are automatically associated with the default association route table. Enabled by default. If <code>defaultRouteTableAssociation</code> is set to <code>enable</code>, Amazon Web Services Transit Gateway will create the default transit gateway route table.</p>",
6230662341
"locationName":"defaultRouteTableAssociation"
6230762342
},
6230862343
"AssociationDefaultRouteTableId":{
@@ -62312,7 +62347,7 @@
6231262347
},
6231362348
"DefaultRouteTablePropagation":{
6231462349
"shape":"DefaultRouteTablePropagationValue",
62315-
"documentation":"<p>Indicates whether resource attachments automatically propagate routes to the default propagation route table.</p>",
62350+
"documentation":"<p>Indicates whether resource attachments automatically propagate routes to the default propagation route table. Enabled by default. If <code>defaultRouteTablePropagation</code> is set to <code>enable</code>, Amazon Web Services Transit Gateway will create the default transit gateway route table.</p>",
6231662351
"locationName":"defaultRouteTablePropagation"
6231762352
},
6231862353
"PropagationDefaultRouteTableId":{

0 commit comments

Comments
 (0)