@aws-sdk/client-network-firewall 3.245.0 → 3.252.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +9 -3
- package/dist-cjs/protocols/Aws_json1_0.js +2 -0
- package/dist-es/models/models_0.js +6 -0
- package/dist-es/protocols/Aws_json1_0.js +2 -0
- package/dist-types/models/models_0.d.ts +38 -4
- package/dist-types/ts3.4/models/models_0.d.ts +6 -0
- package/package.json +4 -4
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.
|
|
4
|
-
exports.
|
|
5
|
-
exports.UpdateSubnetChangeProtectionResponseFilterSensitiveLog = exports.UpdateSubnetChangeProtectionRequestFilterSensitiveLog = exports.UpdateRuleGroupResponseFilterSensitiveLog = exports.UpdateRuleGroupRequestFilterSensitiveLog = exports.UpdateLoggingConfigurationResponseFilterSensitiveLog = exports.UpdateLoggingConfigurationRequestFilterSensitiveLog = exports.UpdateFirewallPolicyChangeProtectionResponseFilterSensitiveLog = exports.UpdateFirewallPolicyChangeProtectionRequestFilterSensitiveLog = exports.UpdateFirewallPolicyResponseFilterSensitiveLog = exports.UpdateFirewallPolicyRequestFilterSensitiveLog = exports.UpdateFirewallEncryptionConfigurationResponseFilterSensitiveLog = exports.UpdateFirewallEncryptionConfigurationRequestFilterSensitiveLog = exports.UpdateFirewallDescriptionResponseFilterSensitiveLog = exports.UpdateFirewallDescriptionRequestFilterSensitiveLog = exports.UpdateFirewallDeleteProtectionResponseFilterSensitiveLog = exports.UpdateFirewallDeleteProtectionRequestFilterSensitiveLog = exports.UntagResourceResponseFilterSensitiveLog = exports.UntagResourceRequestFilterSensitiveLog = exports.TagResourceResponseFilterSensitiveLog = exports.TagResourceRequestFilterSensitiveLog = exports.PutResourcePolicyResponseFilterSensitiveLog = exports.PutResourcePolicyRequestFilterSensitiveLog = exports.ListTagsForResourceResponseFilterSensitiveLog = exports.ListTagsForResourceRequestFilterSensitiveLog = exports.ListRuleGroupsResponseFilterSensitiveLog = exports.RuleGroupMetadataFilterSensitiveLog = exports.ListRuleGroupsRequestFilterSensitiveLog = exports.ListFirewallsResponseFilterSensitiveLog = exports.ListFirewallsRequestFilterSensitiveLog = exports.ListFirewallPoliciesResponseFilterSensitiveLog = exports.ListFirewallPoliciesRequestFilterSensitiveLog = exports.FirewallPolicyMetadataFilterSensitiveLog = exports.FirewallMetadataFilterSensitiveLog = exports.DisassociateSubnetsResponseFilterSensitiveLog = exports.DisassociateSubnetsRequestFilterSensitiveLog = exports.DescribeRuleGroupMetadataResponseFilterSensitiveLog = exports.DescribeRuleGroupMetadataRequestFilterSensitiveLog = exports.DescribeRuleGroupResponseFilterSensitiveLog = exports.DescribeRuleGroupRequestFilterSensitiveLog = exports.DescribeResourcePolicyResponseFilterSensitiveLog = exports.DescribeResourcePolicyRequestFilterSensitiveLog = void 0;
|
|
3
|
+
exports.FirewallFilterSensitiveLog = exports.CreateFirewallRequestFilterSensitiveLog = exports.TagFilterSensitiveLog = exports.EncryptionConfigurationFilterSensitiveLog = exports.CapacityUsageSummaryFilterSensitiveLog = exports.CIDRSummaryFilterSensitiveLog = exports.IPSetMetadataFilterSensitiveLog = exports.AttachmentFilterSensitiveLog = exports.AssociateSubnetsResponseFilterSensitiveLog = exports.AssociateSubnetsRequestFilterSensitiveLog = exports.SubnetMappingFilterSensitiveLog = exports.AssociateFirewallPolicyResponseFilterSensitiveLog = exports.AssociateFirewallPolicyRequestFilterSensitiveLog = exports.AddressFilterSensitiveLog = exports.ActionDefinitionFilterSensitiveLog = exports.PublishMetricActionFilterSensitiveLog = exports.DimensionFilterSensitiveLog = exports.ResourceOwnerCheckException = exports.LogDestinationPermissionException = exports.ResourceManagedStatus = exports.ResourceManagedType = exports.LogType = exports.LogDestinationType = exports.InvalidResourcePolicyException = exports.UnsupportedOperationException = exports.RuleGroupType = exports.TCPFlag = exports.StatefulRuleProtocol = exports.StatefulRuleDirection = exports.StatefulAction = exports.TargetType = exports.GeneratedRulesType = exports.ResourceStatus = exports.OverrideAction = exports.StreamExceptionPolicy = exports.RuleOrder = exports.LimitExceededException = exports.PerObjectSyncStatus = exports.FirewallStatusValue = exports.EncryptionType = exports.ConfigurationSyncState = exports.AttachmentStatus = exports.InsufficientCapacityException = exports.IPAddressType = exports.ThrottlingException = exports.ResourceNotFoundException = exports.InvalidTokenException = exports.InvalidRequestException = exports.InvalidOperationException = exports.InternalServerError = void 0;
|
|
4
|
+
exports.LoggingConfigurationFilterSensitiveLog = exports.LogDestinationConfigFilterSensitiveLog = exports.DescribeLoggingConfigurationRequestFilterSensitiveLog = exports.DescribeFirewallPolicyResponseFilterSensitiveLog = exports.DescribeFirewallPolicyRequestFilterSensitiveLog = exports.DescribeFirewallResponseFilterSensitiveLog = exports.DescribeFirewallRequestFilterSensitiveLog = exports.DeleteRuleGroupResponseFilterSensitiveLog = exports.DeleteRuleGroupRequestFilterSensitiveLog = exports.DeleteResourcePolicyResponseFilterSensitiveLog = exports.DeleteResourcePolicyRequestFilterSensitiveLog = exports.DeleteFirewallPolicyResponseFilterSensitiveLog = exports.DeleteFirewallPolicyRequestFilterSensitiveLog = exports.DeleteFirewallResponseFilterSensitiveLog = exports.DeleteFirewallRequestFilterSensitiveLog = exports.CreateRuleGroupResponseFilterSensitiveLog = exports.RuleGroupResponseFilterSensitiveLog = exports.CreateRuleGroupRequestFilterSensitiveLog = exports.SourceMetadataFilterSensitiveLog = exports.RuleGroupFilterSensitiveLog = exports.StatefulRuleOptionsFilterSensitiveLog = exports.RuleVariablesFilterSensitiveLog = exports.PortSetFilterSensitiveLog = exports.IPSetFilterSensitiveLog = exports.RulesSourceFilterSensitiveLog = exports.StatelessRulesAndCustomActionsFilterSensitiveLog = exports.StatelessRuleFilterSensitiveLog = exports.RuleDefinitionFilterSensitiveLog = exports.MatchAttributesFilterSensitiveLog = exports.TCPFlagFieldFilterSensitiveLog = exports.PortRangeFilterSensitiveLog = exports.StatefulRuleFilterSensitiveLog = exports.RuleOptionFilterSensitiveLog = exports.HeaderFilterSensitiveLog = exports.RulesSourceListFilterSensitiveLog = exports.ReferenceSetsFilterSensitiveLog = exports.IPSetReferenceFilterSensitiveLog = exports.CreateFirewallPolicyResponseFilterSensitiveLog = exports.FirewallPolicyResponseFilterSensitiveLog = exports.CreateFirewallPolicyRequestFilterSensitiveLog = exports.FirewallPolicyFilterSensitiveLog = exports.StatelessRuleGroupReferenceFilterSensitiveLog = exports.CustomActionFilterSensitiveLog = exports.StatefulRuleGroupReferenceFilterSensitiveLog = exports.StatefulRuleGroupOverrideFilterSensitiveLog = exports.StatefulEngineOptionsFilterSensitiveLog = exports.CreateFirewallResponseFilterSensitiveLog = exports.FirewallStatusFilterSensitiveLog = exports.SyncStateFilterSensitiveLog = exports.PerObjectStatusFilterSensitiveLog = void 0;
|
|
5
|
+
exports.UpdateSubnetChangeProtectionResponseFilterSensitiveLog = exports.UpdateSubnetChangeProtectionRequestFilterSensitiveLog = exports.UpdateRuleGroupResponseFilterSensitiveLog = exports.UpdateRuleGroupRequestFilterSensitiveLog = exports.UpdateLoggingConfigurationResponseFilterSensitiveLog = exports.UpdateLoggingConfigurationRequestFilterSensitiveLog = exports.UpdateFirewallPolicyChangeProtectionResponseFilterSensitiveLog = exports.UpdateFirewallPolicyChangeProtectionRequestFilterSensitiveLog = exports.UpdateFirewallPolicyResponseFilterSensitiveLog = exports.UpdateFirewallPolicyRequestFilterSensitiveLog = exports.UpdateFirewallEncryptionConfigurationResponseFilterSensitiveLog = exports.UpdateFirewallEncryptionConfigurationRequestFilterSensitiveLog = exports.UpdateFirewallDescriptionResponseFilterSensitiveLog = exports.UpdateFirewallDescriptionRequestFilterSensitiveLog = exports.UpdateFirewallDeleteProtectionResponseFilterSensitiveLog = exports.UpdateFirewallDeleteProtectionRequestFilterSensitiveLog = exports.UntagResourceResponseFilterSensitiveLog = exports.UntagResourceRequestFilterSensitiveLog = exports.TagResourceResponseFilterSensitiveLog = exports.TagResourceRequestFilterSensitiveLog = exports.PutResourcePolicyResponseFilterSensitiveLog = exports.PutResourcePolicyRequestFilterSensitiveLog = exports.ListTagsForResourceResponseFilterSensitiveLog = exports.ListTagsForResourceRequestFilterSensitiveLog = exports.ListRuleGroupsResponseFilterSensitiveLog = exports.RuleGroupMetadataFilterSensitiveLog = exports.ListRuleGroupsRequestFilterSensitiveLog = exports.ListFirewallsResponseFilterSensitiveLog = exports.ListFirewallsRequestFilterSensitiveLog = exports.ListFirewallPoliciesResponseFilterSensitiveLog = exports.ListFirewallPoliciesRequestFilterSensitiveLog = exports.FirewallPolicyMetadataFilterSensitiveLog = exports.FirewallMetadataFilterSensitiveLog = exports.DisassociateSubnetsResponseFilterSensitiveLog = exports.DisassociateSubnetsRequestFilterSensitiveLog = exports.DescribeRuleGroupMetadataResponseFilterSensitiveLog = exports.DescribeRuleGroupMetadataRequestFilterSensitiveLog = exports.DescribeRuleGroupResponseFilterSensitiveLog = exports.DescribeRuleGroupRequestFilterSensitiveLog = exports.DescribeResourcePolicyResponseFilterSensitiveLog = exports.DescribeResourcePolicyRequestFilterSensitiveLog = exports.DescribeLoggingConfigurationResponseFilterSensitiveLog = void 0;
|
|
6
6
|
const NetworkFirewallServiceException_1 = require("./NetworkFirewallServiceException");
|
|
7
7
|
class InternalServerError extends NetworkFirewallServiceException_1.NetworkFirewallServiceException {
|
|
8
8
|
constructor(opts) {
|
|
@@ -88,6 +88,11 @@ class ThrottlingException extends NetworkFirewallServiceException_1.NetworkFirew
|
|
|
88
88
|
}
|
|
89
89
|
}
|
|
90
90
|
exports.ThrottlingException = ThrottlingException;
|
|
91
|
+
var IPAddressType;
|
|
92
|
+
(function (IPAddressType) {
|
|
93
|
+
IPAddressType["DUALSTACK"] = "DUALSTACK";
|
|
94
|
+
IPAddressType["IPV4"] = "IPV4";
|
|
95
|
+
})(IPAddressType = exports.IPAddressType || (exports.IPAddressType = {}));
|
|
91
96
|
class InsufficientCapacityException extends NetworkFirewallServiceException_1.NetworkFirewallServiceException {
|
|
92
97
|
constructor(opts) {
|
|
93
98
|
super({
|
|
@@ -180,6 +185,7 @@ var StatefulAction;
|
|
|
180
185
|
StatefulAction["ALERT"] = "ALERT";
|
|
181
186
|
StatefulAction["DROP"] = "DROP";
|
|
182
187
|
StatefulAction["PASS"] = "PASS";
|
|
188
|
+
StatefulAction["REJECT"] = "REJECT";
|
|
183
189
|
})(StatefulAction = exports.StatefulAction || (exports.StatefulAction = {}));
|
|
184
190
|
var StatefulRuleDirection;
|
|
185
191
|
(function (StatefulRuleDirection) {
|
|
@@ -2421,6 +2421,7 @@ const serializeAws_json1_0StatelessRulesAndCustomActions = (input, context) => {
|
|
|
2421
2421
|
};
|
|
2422
2422
|
const serializeAws_json1_0SubnetMapping = (input, context) => {
|
|
2423
2423
|
return {
|
|
2424
|
+
...(input.IPAddressType != null && { IPAddressType: input.IPAddressType }),
|
|
2424
2425
|
...(input.SubnetId != null && { SubnetId: input.SubnetId }),
|
|
2425
2426
|
};
|
|
2426
2427
|
};
|
|
@@ -3388,6 +3389,7 @@ const deserializeAws_json1_0StatelessRulesAndCustomActions = (output, context) =
|
|
|
3388
3389
|
};
|
|
3389
3390
|
const deserializeAws_json1_0SubnetMapping = (output, context) => {
|
|
3390
3391
|
return {
|
|
3392
|
+
IPAddressType: (0, smithy_client_1.expectString)(output.IPAddressType),
|
|
3391
3393
|
SubnetId: (0, smithy_client_1.expectString)(output.SubnetId),
|
|
3392
3394
|
};
|
|
3393
3395
|
};
|
|
@@ -77,6 +77,11 @@ export class ThrottlingException extends __BaseException {
|
|
|
77
77
|
this.Message = opts.Message;
|
|
78
78
|
}
|
|
79
79
|
}
|
|
80
|
+
export var IPAddressType;
|
|
81
|
+
(function (IPAddressType) {
|
|
82
|
+
IPAddressType["DUALSTACK"] = "DUALSTACK";
|
|
83
|
+
IPAddressType["IPV4"] = "IPV4";
|
|
84
|
+
})(IPAddressType || (IPAddressType = {}));
|
|
80
85
|
export class InsufficientCapacityException extends __BaseException {
|
|
81
86
|
constructor(opts) {
|
|
82
87
|
super({
|
|
@@ -167,6 +172,7 @@ export var StatefulAction;
|
|
|
167
172
|
StatefulAction["ALERT"] = "ALERT";
|
|
168
173
|
StatefulAction["DROP"] = "DROP";
|
|
169
174
|
StatefulAction["PASS"] = "PASS";
|
|
175
|
+
StatefulAction["REJECT"] = "REJECT";
|
|
170
176
|
})(StatefulAction || (StatefulAction = {}));
|
|
171
177
|
export var StatefulRuleDirection;
|
|
172
178
|
(function (StatefulRuleDirection) {
|
|
@@ -2355,6 +2355,7 @@ const serializeAws_json1_0StatelessRulesAndCustomActions = (input, context) => {
|
|
|
2355
2355
|
};
|
|
2356
2356
|
const serializeAws_json1_0SubnetMapping = (input, context) => {
|
|
2357
2357
|
return {
|
|
2358
|
+
...(input.IPAddressType != null && { IPAddressType: input.IPAddressType }),
|
|
2358
2359
|
...(input.SubnetId != null && { SubnetId: input.SubnetId }),
|
|
2359
2360
|
};
|
|
2360
2361
|
};
|
|
@@ -3322,6 +3323,7 @@ const deserializeAws_json1_0StatelessRulesAndCustomActions = (output, context) =
|
|
|
3322
3323
|
};
|
|
3323
3324
|
const deserializeAws_json1_0SubnetMapping = (output, context) => {
|
|
3324
3325
|
return {
|
|
3326
|
+
IPAddressType: __expectString(output.IPAddressType),
|
|
3325
3327
|
SubnetId: __expectString(output.SubnetId),
|
|
3326
3328
|
};
|
|
3327
3329
|
};
|
|
@@ -46,7 +46,7 @@ export interface ActionDefinition {
|
|
|
46
46
|
*/
|
|
47
47
|
export interface Address {
|
|
48
48
|
/**
|
|
49
|
-
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4. </p>
|
|
49
|
+
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. </p>
|
|
50
50
|
* <p>Examples: </p>
|
|
51
51
|
* <ul>
|
|
52
52
|
* <li>
|
|
@@ -55,6 +55,12 @@ export interface Address {
|
|
|
55
55
|
* <li>
|
|
56
56
|
* <p>To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify <code>192.0.2.0/24</code>.</p>
|
|
57
57
|
* </li>
|
|
58
|
+
* <li>
|
|
59
|
+
* <p>To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify <code>1111:0000:0000:0000:0000:0000:0000:0111/128</code>.</p>
|
|
60
|
+
* </li>
|
|
61
|
+
* <li>
|
|
62
|
+
* <p>To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify <code>1111:0000:0000:0000:0000:0000:0000:0000/64</code>.</p>
|
|
63
|
+
* </li>
|
|
58
64
|
* </ul>
|
|
59
65
|
* <p>For more information about CIDR notation, see the Wikipedia entry <a href="https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing">Classless
|
|
60
66
|
* Inter-Domain Routing</a>.</p>
|
|
@@ -190,6 +196,10 @@ export declare class ThrottlingException extends __BaseException {
|
|
|
190
196
|
*/
|
|
191
197
|
constructor(opts: __ExceptionOptionType<ThrottlingException, __BaseException>);
|
|
192
198
|
}
|
|
199
|
+
export declare enum IPAddressType {
|
|
200
|
+
DUALSTACK = "DUALSTACK",
|
|
201
|
+
IPV4 = "IPV4"
|
|
202
|
+
}
|
|
193
203
|
/**
|
|
194
204
|
* <p>The ID for a subnet that you want to associate with the firewall. This is used with
|
|
195
205
|
* <a>CreateFirewall</a> and <a>AssociateSubnets</a>. Network Firewall
|
|
@@ -201,6 +211,10 @@ export interface SubnetMapping {
|
|
|
201
211
|
* <p>The unique identifier for the subnet. </p>
|
|
202
212
|
*/
|
|
203
213
|
SubnetId: string | undefined;
|
|
214
|
+
/**
|
|
215
|
+
* <p>The subnet's IP address type. You can't change the IP address type after you create the subnet.</p>
|
|
216
|
+
*/
|
|
217
|
+
IPAddressType?: IPAddressType | string;
|
|
204
218
|
}
|
|
205
219
|
export interface AssociateSubnetsRequest {
|
|
206
220
|
/**
|
|
@@ -970,7 +984,8 @@ export interface RulesSourceList {
|
|
|
970
984
|
export declare enum StatefulAction {
|
|
971
985
|
ALERT = "ALERT",
|
|
972
986
|
DROP = "DROP",
|
|
973
|
-
PASS = "PASS"
|
|
987
|
+
PASS = "PASS",
|
|
988
|
+
REJECT = "REJECT"
|
|
974
989
|
}
|
|
975
990
|
export declare enum StatefulRuleDirection {
|
|
976
991
|
ANY = "ANY",
|
|
@@ -1010,7 +1025,7 @@ export interface Header {
|
|
|
1010
1025
|
/**
|
|
1011
1026
|
* <p>The source IP address or address range to inspect for, in CIDR notation.
|
|
1012
1027
|
* To match with any address, specify <code>ANY</code>. </p>
|
|
1013
|
-
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4. </p>
|
|
1028
|
+
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. </p>
|
|
1014
1029
|
* <p>Examples: </p>
|
|
1015
1030
|
* <ul>
|
|
1016
1031
|
* <li>
|
|
@@ -1019,6 +1034,12 @@ export interface Header {
|
|
|
1019
1034
|
* <li>
|
|
1020
1035
|
* <p>To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify <code>192.0.2.0/24</code>.</p>
|
|
1021
1036
|
* </li>
|
|
1037
|
+
* <li>
|
|
1038
|
+
* <p>To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify <code>1111:0000:0000:0000:0000:0000:0000:0111/128</code>.</p>
|
|
1039
|
+
* </li>
|
|
1040
|
+
* <li>
|
|
1041
|
+
* <p>To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify <code>1111:0000:0000:0000:0000:0000:0000:0000/64</code>.</p>
|
|
1042
|
+
* </li>
|
|
1022
1043
|
* </ul>
|
|
1023
1044
|
* <p>For more information about CIDR notation, see the Wikipedia entry <a href="https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing">Classless
|
|
1024
1045
|
* Inter-Domain Routing</a>.</p>
|
|
@@ -1041,7 +1062,7 @@ export interface Header {
|
|
|
1041
1062
|
/**
|
|
1042
1063
|
* <p>The destination IP address or address range to inspect for, in CIDR notation.
|
|
1043
1064
|
* To match with any address, specify <code>ANY</code>. </p>
|
|
1044
|
-
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4. </p>
|
|
1065
|
+
* <p>Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. </p>
|
|
1045
1066
|
* <p>Examples: </p>
|
|
1046
1067
|
* <ul>
|
|
1047
1068
|
* <li>
|
|
@@ -1050,6 +1071,12 @@ export interface Header {
|
|
|
1050
1071
|
* <li>
|
|
1051
1072
|
* <p>To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify <code>192.0.2.0/24</code>.</p>
|
|
1052
1073
|
* </li>
|
|
1074
|
+
* <li>
|
|
1075
|
+
* <p>To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify <code>1111:0000:0000:0000:0000:0000:0000:0111/128</code>.</p>
|
|
1076
|
+
* </li>
|
|
1077
|
+
* <li>
|
|
1078
|
+
* <p>To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify <code>1111:0000:0000:0000:0000:0000:0000:0000/64</code>.</p>
|
|
1079
|
+
* </li>
|
|
1053
1080
|
* </ul>
|
|
1054
1081
|
* <p>For more information about CIDR notation, see the Wikipedia entry <a href="https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing">Classless
|
|
1055
1082
|
* Inter-Domain Routing</a>.</p>
|
|
@@ -1109,6 +1136,13 @@ export interface StatefulRule {
|
|
|
1109
1136
|
* can enable the rule with <code>ALERT</code> action, verify in the logs that the rule
|
|
1110
1137
|
* is filtering as you want, then change the action to <code>DROP</code>.</p>
|
|
1111
1138
|
* </li>
|
|
1139
|
+
* <li>
|
|
1140
|
+
* <p>
|
|
1141
|
+
* <b>REJECT</b> - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a <code>RST</code> bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the <a>Firewall</a>
|
|
1142
|
+
* <a>LoggingConfiguration</a>.</p>
|
|
1143
|
+
* <p>
|
|
1144
|
+
* <code>REJECT</code> isn't currently available for use with IMAP and FTP protocols.</p>
|
|
1145
|
+
* </li>
|
|
1112
1146
|
* </ul>
|
|
1113
1147
|
*/
|
|
1114
1148
|
Action: StatefulAction | string | undefined;
|
|
@@ -72,8 +72,13 @@ export declare class ThrottlingException extends __BaseException {
|
|
|
72
72
|
opts: __ExceptionOptionType<ThrottlingException, __BaseException>
|
|
73
73
|
);
|
|
74
74
|
}
|
|
75
|
+
export declare enum IPAddressType {
|
|
76
|
+
DUALSTACK = "DUALSTACK",
|
|
77
|
+
IPV4 = "IPV4",
|
|
78
|
+
}
|
|
75
79
|
export interface SubnetMapping {
|
|
76
80
|
SubnetId: string | undefined;
|
|
81
|
+
IPAddressType?: IPAddressType | string;
|
|
77
82
|
}
|
|
78
83
|
export interface AssociateSubnetsRequest {
|
|
79
84
|
UpdateToken?: string;
|
|
@@ -289,6 +294,7 @@ export declare enum StatefulAction {
|
|
|
289
294
|
ALERT = "ALERT",
|
|
290
295
|
DROP = "DROP",
|
|
291
296
|
PASS = "PASS",
|
|
297
|
+
REJECT = "REJECT",
|
|
292
298
|
}
|
|
293
299
|
export declare enum StatefulRuleDirection {
|
|
294
300
|
ANY = "ANY",
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-network-firewall",
|
|
3
3
|
"description": "AWS SDK for JavaScript Network Firewall Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.252.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"build:types": "tsc -p tsconfig.types.json",
|
|
12
12
|
"build:types:downlevel": "downlevel-dts dist-types dist-types/ts3.4",
|
|
13
13
|
"clean": "rimraf ./dist-* && rimraf *.tsbuildinfo",
|
|
14
|
-
"generate:client": "
|
|
14
|
+
"generate:client": "node ../../scripts/generate-clients/single-service --solo network-firewall"
|
|
15
15
|
},
|
|
16
16
|
"main": "./dist-cjs/index.js",
|
|
17
17
|
"types": "./dist-types/index.d.ts",
|
|
@@ -20,9 +20,9 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "2.0.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "2.0.0",
|
|
23
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
+
"@aws-sdk/client-sts": "3.252.0",
|
|
24
24
|
"@aws-sdk/config-resolver": "3.234.0",
|
|
25
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
25
|
+
"@aws-sdk/credential-provider-node": "3.252.0",
|
|
26
26
|
"@aws-sdk/fetch-http-handler": "3.226.0",
|
|
27
27
|
"@aws-sdk/hash-node": "3.226.0",
|
|
28
28
|
"@aws-sdk/invalid-dependency": "3.226.0",
|