@aws-sdk/client-network-firewall 3.441.0 → 3.445.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +5 -1
- package/dist-cjs/protocols/Aws_json1_0.js +3 -0
- package/dist-es/models/models_0.js +4 -0
- package/dist-es/protocols/Aws_json1_0.js +3 -0
- package/dist-types/commands/CreateRuleGroupCommand.d.ts +10 -0
- package/dist-types/commands/CreateTLSInspectionConfigurationCommand.d.ts +1 -1
- package/dist-types/commands/DeleteRuleGroupCommand.d.ts +9 -0
- package/dist-types/commands/DescribeRuleGroupCommand.d.ts +10 -0
- package/dist-types/commands/UpdateRuleGroupCommand.d.ts +10 -0
- package/dist-types/index.d.ts +2 -0
- package/dist-types/models/models_0.d.ts +95 -17
- package/dist-types/ts3.4/index.d.ts +2 -0
- package/dist-types/ts3.4/models/models_0.d.ts +15 -0
- package/package.json +4 -4
|
@@ -1,7 +1,11 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.ResourceOwnerCheckException = exports.LogDestinationPermissionException = exports.ResourceManagedStatus = exports.ResourceManagedType = exports.LogType = exports.LogDestinationType = exports.InvalidResourcePolicyException = exports.UnsupportedOperationException = exports.RuleGroupType = exports.TCPFlag = exports.StatefulRuleProtocol = exports.StatefulRuleDirection = exports.StatefulAction = exports.TargetType = exports.GeneratedRulesType = exports.ResourceStatus = exports.OverrideAction = exports.StreamExceptionPolicy = exports.RuleOrder = exports.LimitExceededException = exports.PerObjectSyncStatus = exports.FirewallStatusValue = exports.EncryptionType = exports.ConfigurationSyncState = exports.RevocationCheckAction = exports.AttachmentStatus = exports.InsufficientCapacityException = exports.IPAddressType = exports.ThrottlingException = exports.ResourceNotFoundException = exports.InvalidTokenException = exports.InvalidRequestException = exports.InvalidOperationException = exports.InternalServerError = void 0;
|
|
3
|
+
exports.ResourceOwnerCheckException = exports.LogDestinationPermissionException = exports.ResourceManagedStatus = exports.ResourceManagedType = exports.LogType = exports.LogDestinationType = exports.InvalidResourcePolicyException = exports.UnsupportedOperationException = exports.RuleGroupType = exports.TCPFlag = exports.StatefulRuleProtocol = exports.StatefulRuleDirection = exports.StatefulAction = exports.TargetType = exports.GeneratedRulesType = exports.ResourceStatus = exports.OverrideAction = exports.StreamExceptionPolicy = exports.RuleOrder = exports.LimitExceededException = exports.PerObjectSyncStatus = exports.FirewallStatusValue = exports.EncryptionType = exports.ConfigurationSyncState = exports.RevocationCheckAction = exports.AttachmentStatus = exports.InsufficientCapacityException = exports.IPAddressType = exports.ThrottlingException = exports.ResourceNotFoundException = exports.InvalidTokenException = exports.InvalidRequestException = exports.InvalidOperationException = exports.InternalServerError = exports.IdentifiedType = void 0;
|
|
4
4
|
const NetworkFirewallServiceException_1 = require("./NetworkFirewallServiceException");
|
|
5
|
+
exports.IdentifiedType = {
|
|
6
|
+
STATELESS_RULE_CONTAINS_TCP_FLAGS: "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
7
|
+
STATELESS_RULE_FORWARDING_ASYMMETRICALLY: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY",
|
|
8
|
+
};
|
|
5
9
|
class InternalServerError extends NetworkFirewallServiceException_1.NetworkFirewallServiceException {
|
|
6
10
|
constructor(opts) {
|
|
7
11
|
super({
|
|
@@ -1973,6 +1973,7 @@ const de_UnsupportedOperationExceptionRes = async (parsedOutput, context) => {
|
|
|
1973
1973
|
};
|
|
1974
1974
|
const se_CreateRuleGroupRequest = (input, context) => {
|
|
1975
1975
|
return (0, smithy_client_1.take)(input, {
|
|
1976
|
+
AnalyzeRuleGroup: [],
|
|
1976
1977
|
Capacity: [],
|
|
1977
1978
|
Description: [],
|
|
1978
1979
|
DryRun: [],
|
|
@@ -1987,6 +1988,7 @@ const se_CreateRuleGroupRequest = (input, context) => {
|
|
|
1987
1988
|
};
|
|
1988
1989
|
const se_UpdateRuleGroupRequest = (input, context) => {
|
|
1989
1990
|
return (0, smithy_client_1.take)(input, {
|
|
1991
|
+
AnalyzeRuleGroup: [],
|
|
1990
1992
|
Description: [],
|
|
1991
1993
|
DryRun: [],
|
|
1992
1994
|
EncryptionConfiguration: smithy_client_1._json,
|
|
@@ -2081,6 +2083,7 @@ const de_FirewallPolicyResponse = (output, context) => {
|
|
|
2081
2083
|
};
|
|
2082
2084
|
const de_RuleGroupResponse = (output, context) => {
|
|
2083
2085
|
return (0, smithy_client_1.take)(output, {
|
|
2086
|
+
AnalysisResults: smithy_client_1._json,
|
|
2084
2087
|
Capacity: smithy_client_1.expectInt32,
|
|
2085
2088
|
ConsumedCapacity: smithy_client_1.expectInt32,
|
|
2086
2089
|
Description: smithy_client_1.expectString,
|
|
@@ -1,4 +1,8 @@
|
|
|
1
1
|
import { NetworkFirewallServiceException as __BaseException } from "./NetworkFirewallServiceException";
|
|
2
|
+
export const IdentifiedType = {
|
|
3
|
+
STATELESS_RULE_CONTAINS_TCP_FLAGS: "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
4
|
+
STATELESS_RULE_FORWARDING_ASYMMETRICALLY: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY",
|
|
5
|
+
};
|
|
2
6
|
export class InternalServerError extends __BaseException {
|
|
3
7
|
constructor(opts) {
|
|
4
8
|
super({
|
|
@@ -1897,6 +1897,7 @@ const de_UnsupportedOperationExceptionRes = async (parsedOutput, context) => {
|
|
|
1897
1897
|
};
|
|
1898
1898
|
const se_CreateRuleGroupRequest = (input, context) => {
|
|
1899
1899
|
return take(input, {
|
|
1900
|
+
AnalyzeRuleGroup: [],
|
|
1900
1901
|
Capacity: [],
|
|
1901
1902
|
Description: [],
|
|
1902
1903
|
DryRun: [],
|
|
@@ -1911,6 +1912,7 @@ const se_CreateRuleGroupRequest = (input, context) => {
|
|
|
1911
1912
|
};
|
|
1912
1913
|
const se_UpdateRuleGroupRequest = (input, context) => {
|
|
1913
1914
|
return take(input, {
|
|
1915
|
+
AnalyzeRuleGroup: [],
|
|
1914
1916
|
Description: [],
|
|
1915
1917
|
DryRun: [],
|
|
1916
1918
|
EncryptionConfiguration: _json,
|
|
@@ -2005,6 +2007,7 @@ const de_FirewallPolicyResponse = (output, context) => {
|
|
|
2005
2007
|
};
|
|
2006
2008
|
const de_RuleGroupResponse = (output, context) => {
|
|
2007
2009
|
return take(output, {
|
|
2010
|
+
AnalysisResults: _json,
|
|
2008
2011
|
Capacity: __expectInt32,
|
|
2009
2012
|
ConsumedCapacity: __expectInt32,
|
|
2010
2013
|
Description: __expectString,
|
|
@@ -178,6 +178,7 @@ export interface CreateRuleGroupCommandOutput extends CreateRuleGroupResponse, _
|
|
|
178
178
|
* SourceArn: "STRING_VALUE",
|
|
179
179
|
* SourceUpdateToken: "STRING_VALUE",
|
|
180
180
|
* },
|
|
181
|
+
* AnalyzeRuleGroup: true || false,
|
|
181
182
|
* };
|
|
182
183
|
* const command = new CreateRuleGroupCommand(input);
|
|
183
184
|
* const response = await client.send(command);
|
|
@@ -209,6 +210,15 @@ export interface CreateRuleGroupCommandOutput extends CreateRuleGroupResponse, _
|
|
|
209
210
|
* // },
|
|
210
211
|
* // SnsTopic: "STRING_VALUE",
|
|
211
212
|
* // LastModifiedTime: new Date("TIMESTAMP"),
|
|
213
|
+
* // AnalysisResults: [ // AnalysisResultList
|
|
214
|
+
* // { // AnalysisResult
|
|
215
|
+
* // IdentifiedRuleIds: [ // RuleIdList
|
|
216
|
+
* // "STRING_VALUE",
|
|
217
|
+
* // ],
|
|
218
|
+
* // IdentifiedType: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY" || "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
219
|
+
* // AnalysisDetail: "STRING_VALUE",
|
|
220
|
+
* // },
|
|
221
|
+
* // ],
|
|
212
222
|
* // },
|
|
213
223
|
* // };
|
|
214
224
|
*
|
|
@@ -23,7 +23,7 @@ export interface CreateTLSInspectionConfigurationCommandOutput extends CreateTLS
|
|
|
23
23
|
}
|
|
24
24
|
/**
|
|
25
25
|
* @public
|
|
26
|
-
* <p>Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains
|
|
26
|
+
* <p>Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall.</p>
|
|
27
27
|
* <p>After you create a TLS inspection configuration, you can associate it with a new firewall policy.</p>
|
|
28
28
|
* <p>To update the settings for a TLS inspection configuration, use <a>UpdateTLSInspectionConfiguration</a>.</p>
|
|
29
29
|
* <p>To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, <a>ListTagsForResource</a>, <a>TagResource</a>, and <a>UntagResource</a>.</p>
|
|
@@ -64,6 +64,15 @@ export interface DeleteRuleGroupCommandOutput extends DeleteRuleGroupResponse, _
|
|
|
64
64
|
* // },
|
|
65
65
|
* // SnsTopic: "STRING_VALUE",
|
|
66
66
|
* // LastModifiedTime: new Date("TIMESTAMP"),
|
|
67
|
+
* // AnalysisResults: [ // AnalysisResultList
|
|
68
|
+
* // { // AnalysisResult
|
|
69
|
+
* // IdentifiedRuleIds: [ // RuleIdList
|
|
70
|
+
* // "STRING_VALUE",
|
|
71
|
+
* // ],
|
|
72
|
+
* // IdentifiedType: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY" || "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
73
|
+
* // AnalysisDetail: "STRING_VALUE",
|
|
74
|
+
* // },
|
|
75
|
+
* // ],
|
|
67
76
|
* // },
|
|
68
77
|
* // };
|
|
69
78
|
*
|
|
@@ -34,6 +34,7 @@ export interface DescribeRuleGroupCommandOutput extends DescribeRuleGroupRespons
|
|
|
34
34
|
* RuleGroupName: "STRING_VALUE",
|
|
35
35
|
* RuleGroupArn: "STRING_VALUE",
|
|
36
36
|
* Type: "STATELESS" || "STATEFUL",
|
|
37
|
+
* AnalyzeRuleGroup: true || false,
|
|
37
38
|
* };
|
|
38
39
|
* const command = new DescribeRuleGroupCommand(input);
|
|
39
40
|
* const response = await client.send(command);
|
|
@@ -189,6 +190,15 @@ export interface DescribeRuleGroupCommandOutput extends DescribeRuleGroupRespons
|
|
|
189
190
|
* // },
|
|
190
191
|
* // SnsTopic: "STRING_VALUE",
|
|
191
192
|
* // LastModifiedTime: new Date("TIMESTAMP"),
|
|
193
|
+
* // AnalysisResults: [ // AnalysisResultList
|
|
194
|
+
* // { // AnalysisResult
|
|
195
|
+
* // IdentifiedRuleIds: [ // RuleIdList
|
|
196
|
+
* // "STRING_VALUE",
|
|
197
|
+
* // ],
|
|
198
|
+
* // IdentifiedType: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY" || "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
199
|
+
* // AnalysisDetail: "STRING_VALUE",
|
|
200
|
+
* // },
|
|
201
|
+
* // ],
|
|
192
202
|
* // },
|
|
193
203
|
* // };
|
|
194
204
|
*
|
|
@@ -175,6 +175,7 @@ export interface UpdateRuleGroupCommandOutput extends UpdateRuleGroupResponse, _
|
|
|
175
175
|
* SourceArn: "STRING_VALUE",
|
|
176
176
|
* SourceUpdateToken: "STRING_VALUE",
|
|
177
177
|
* },
|
|
178
|
+
* AnalyzeRuleGroup: true || false,
|
|
178
179
|
* };
|
|
179
180
|
* const command = new UpdateRuleGroupCommand(input);
|
|
180
181
|
* const response = await client.send(command);
|
|
@@ -206,6 +207,15 @@ export interface UpdateRuleGroupCommandOutput extends UpdateRuleGroupResponse, _
|
|
|
206
207
|
* // },
|
|
207
208
|
* // SnsTopic: "STRING_VALUE",
|
|
208
209
|
* // LastModifiedTime: new Date("TIMESTAMP"),
|
|
210
|
+
* // AnalysisResults: [ // AnalysisResultList
|
|
211
|
+
* // { // AnalysisResult
|
|
212
|
+
* // IdentifiedRuleIds: [ // RuleIdList
|
|
213
|
+
* // "STRING_VALUE",
|
|
214
|
+
* // ],
|
|
215
|
+
* // IdentifiedType: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY" || "STATELESS_RULE_CONTAINS_TCP_FLAGS",
|
|
216
|
+
* // AnalysisDetail: "STRING_VALUE",
|
|
217
|
+
* // },
|
|
218
|
+
* // ],
|
|
209
219
|
* // },
|
|
210
220
|
* // };
|
|
211
221
|
*
|
package/dist-types/index.d.ts
CHANGED
|
@@ -83,6 +83,8 @@
|
|
|
83
83
|
export * from "./NetworkFirewallClient";
|
|
84
84
|
export * from "./NetworkFirewall";
|
|
85
85
|
export { ClientInputEndpointParameters } from "./endpoint/EndpointParameters";
|
|
86
|
+
export { RuntimeExtension } from "./runtimeExtensions";
|
|
87
|
+
export { NetworkFirewallExtensionConfiguration } from "./extensionConfiguration";
|
|
86
88
|
export * from "./commands";
|
|
87
89
|
export * from "./pagination";
|
|
88
90
|
export * from "./models";
|
|
@@ -75,6 +75,63 @@ export interface Address {
|
|
|
75
75
|
*/
|
|
76
76
|
AddressDefinition: string | undefined;
|
|
77
77
|
}
|
|
78
|
+
/**
|
|
79
|
+
* @public
|
|
80
|
+
* @enum
|
|
81
|
+
*/
|
|
82
|
+
export declare const IdentifiedType: {
|
|
83
|
+
readonly STATELESS_RULE_CONTAINS_TCP_FLAGS: "STATELESS_RULE_CONTAINS_TCP_FLAGS";
|
|
84
|
+
readonly STATELESS_RULE_FORWARDING_ASYMMETRICALLY: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY";
|
|
85
|
+
};
|
|
86
|
+
/**
|
|
87
|
+
* @public
|
|
88
|
+
*/
|
|
89
|
+
export type IdentifiedType = (typeof IdentifiedType)[keyof typeof IdentifiedType];
|
|
90
|
+
/**
|
|
91
|
+
* @public
|
|
92
|
+
* <p>The analysis result for Network Firewall's stateless rule group analyzer. Every time you call <a>CreateRuleGroup</a>, <a>UpdateRuleGroup</a>, or <a>DescribeRuleGroup</a> on a stateless rule group, Network Firewall analyzes the stateless rule groups in your account and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in a list of analysis results.</p>
|
|
93
|
+
*/
|
|
94
|
+
export interface AnalysisResult {
|
|
95
|
+
/**
|
|
96
|
+
* @public
|
|
97
|
+
* <p>The priority number of the stateless rules identified in the analysis.</p>
|
|
98
|
+
*/
|
|
99
|
+
IdentifiedRuleIds?: string[];
|
|
100
|
+
/**
|
|
101
|
+
* @public
|
|
102
|
+
* <p>The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations:</p>
|
|
103
|
+
* <ul>
|
|
104
|
+
* <li>
|
|
105
|
+
* <p>
|
|
106
|
+
* <code>STATELESS_RULE_FORWARDING_ASYMMETRICALLY</code>
|
|
107
|
+
* </p>
|
|
108
|
+
* <p>Cause: One or more stateless rules with the action <code>pass</code> or <code>forward</code> are forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers, don't match the set of destination IP addresses or their associated port numbers.</p>
|
|
109
|
+
* <p>To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.</p>
|
|
110
|
+
* </li>
|
|
111
|
+
* <li>
|
|
112
|
+
* <p>
|
|
113
|
+
* <code>STATELESS_RULE_CONTAINS_TCP_FLAGS</code>
|
|
114
|
+
* </p>
|
|
115
|
+
* <p>Cause: At least one stateless rule with the action <code>pass</code> or<code>forward</code> contains TCP flags that are inconsistent in the forward and return directions.</p>
|
|
116
|
+
* <p>To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:</p>
|
|
117
|
+
* <ul>
|
|
118
|
+
* <li>
|
|
119
|
+
* <p>Remove unnecessary TCP flag inspections from the rules.</p>
|
|
120
|
+
* </li>
|
|
121
|
+
* <li>
|
|
122
|
+
* <p>If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the TCP connection cycle, for example <code>SYN</code> and <code>ACK</code> flags used in a 3-way TCP handshake.</p>
|
|
123
|
+
* </li>
|
|
124
|
+
* </ul>
|
|
125
|
+
* </li>
|
|
126
|
+
* </ul>
|
|
127
|
+
*/
|
|
128
|
+
IdentifiedType?: IdentifiedType;
|
|
129
|
+
/**
|
|
130
|
+
* @public
|
|
131
|
+
* <p>Provides analysis details for the identified rule.</p>
|
|
132
|
+
*/
|
|
133
|
+
AnalysisDetail?: string;
|
|
134
|
+
}
|
|
78
135
|
/**
|
|
79
136
|
* @public
|
|
80
137
|
*/
|
|
@@ -474,11 +531,11 @@ export interface CheckCertificateRevocationStatusActions {
|
|
|
474
531
|
* </li>
|
|
475
532
|
* <li>
|
|
476
533
|
* <p>
|
|
477
|
-
* <b>DROP</b> - Network Firewall
|
|
534
|
+
* <b>DROP</b> - Network Firewall closes the connection and drops subsequent packets for that connection.</p>
|
|
478
535
|
* </li>
|
|
479
536
|
* <li>
|
|
480
537
|
* <p>
|
|
481
|
-
* <b>REJECT</b> - Network Firewall sends a TCP reject packet back to your client
|
|
538
|
+
* <b>REJECT</b> - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. <code>REJECT</code> is available only for TCP traffic.</p>
|
|
482
539
|
* </li>
|
|
483
540
|
* </ul>
|
|
484
541
|
*/
|
|
@@ -493,11 +550,11 @@ export interface CheckCertificateRevocationStatusActions {
|
|
|
493
550
|
* </li>
|
|
494
551
|
* <li>
|
|
495
552
|
* <p>
|
|
496
|
-
* <b>DROP</b> - Network Firewall
|
|
553
|
+
* <b>DROP</b> - Network Firewall closes the connection and drops subsequent packets for that connection.</p>
|
|
497
554
|
* </li>
|
|
498
555
|
* <li>
|
|
499
556
|
* <p>
|
|
500
|
-
* <b>REJECT</b> - Network Firewall sends a TCP reject packet back to your client
|
|
557
|
+
* <b>REJECT</b> - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. <code>REJECT</code> is available only for TCP traffic.</p>
|
|
501
558
|
* </li>
|
|
502
559
|
* </ul>
|
|
503
560
|
*/
|
|
@@ -919,9 +976,9 @@ export type StreamExceptionPolicy = (typeof StreamExceptionPolicy)[keyof typeof
|
|
|
919
976
|
export interface StatefulEngineOptions {
|
|
920
977
|
/**
|
|
921
978
|
* @public
|
|
922
|
-
* <p>Indicates how to manage the order of stateful rule evaluation for the policy. <code>
|
|
923
|
-
* the default
|
|
924
|
-
* based on
|
|
979
|
+
* <p>Indicates how to manage the order of stateful rule evaluation for the policy. <code>STRICT_ORDER</code> is
|
|
980
|
+
* the default and recommended option. With <code>STRICT_ORDER</code>, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don't match any rules. Choose <code>STRICT_ORDER</code> to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is <code>PASS</code>, followed by <code>DROP</code>, <code>REJECT</code>, and <code>ALERT</code> actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
|
|
981
|
+
* based on your settings. For more information, see
|
|
925
982
|
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
|
|
926
983
|
* </p>
|
|
927
984
|
*/
|
|
@@ -1552,8 +1609,7 @@ export interface StatefulRule {
|
|
|
1552
1609
|
* </li>
|
|
1553
1610
|
* <li>
|
|
1554
1611
|
* <p>
|
|
1555
|
-
* <b>ALERT</b> -
|
|
1556
|
-
* intended destination and sends an alert log message, if alert logging is configured in the <a>Firewall</a>
|
|
1612
|
+
* <b>ALERT</b> - Sends an alert log message, if alert logging is configured in the <a>Firewall</a>
|
|
1557
1613
|
* <a>LoggingConfiguration</a>. </p>
|
|
1558
1614
|
* <p>You can use this action to test a rule that you intend to use to drop traffic. You
|
|
1559
1615
|
* can enable the rule with <code>ALERT</code> action, verify in the logs that the rule
|
|
@@ -1795,12 +1851,14 @@ export interface StatelessRulesAndCustomActions {
|
|
|
1795
1851
|
export interface RulesSource {
|
|
1796
1852
|
/**
|
|
1797
1853
|
* @public
|
|
1798
|
-
* <p>Stateful inspection criteria, provided in Suricata compatible
|
|
1799
|
-
* system (IPS) rules. Suricata is an open-source network IPS that includes a standard
|
|
1854
|
+
* <p>Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard
|
|
1800
1855
|
* rule-based language for network traffic inspection.</p>
|
|
1801
1856
|
* <p>These rules contain the inspection criteria and the action to take for traffic that
|
|
1802
1857
|
* matches the criteria, so this type of rule group doesn't have a separate action
|
|
1803
1858
|
* setting.</p>
|
|
1859
|
+
* <note>
|
|
1860
|
+
* <p>You can't use the <code>priority</code> keyword if the <code>RuleOrder</code> option in <a>StatefulRuleOptions</a> is set to <code>STRICT_ORDER</code>.</p>
|
|
1861
|
+
* </note>
|
|
1804
1862
|
*/
|
|
1805
1863
|
RulesString?: string;
|
|
1806
1864
|
/**
|
|
@@ -1895,7 +1953,7 @@ export interface RuleGroup {
|
|
|
1895
1953
|
/**
|
|
1896
1954
|
* @public
|
|
1897
1955
|
* <p>Additional options governing how Network Firewall handles stateful rules. The policies where you use your stateful
|
|
1898
|
-
* rule group must have stateful rule options settings that are compatible with these settings
|
|
1956
|
+
* rule group must have stateful rule options settings that are compatible with these settings. Some limitations apply; for more information, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-limitations-caveats.html">Strict evaluation order</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1899
1957
|
*/
|
|
1900
1958
|
StatefulRuleOptions?: StatefulRuleOptions;
|
|
1901
1959
|
}
|
|
@@ -2036,6 +2094,11 @@ export interface CreateRuleGroupRequest {
|
|
|
2036
2094
|
* <p>A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.</p>
|
|
2037
2095
|
*/
|
|
2038
2096
|
SourceMetadata?: SourceMetadata;
|
|
2097
|
+
/**
|
|
2098
|
+
* @public
|
|
2099
|
+
* <p>Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to <code>TRUE</code>, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set <code>DryRun</code> to <code>TRUE</code>.</p>
|
|
2100
|
+
*/
|
|
2101
|
+
AnalyzeRuleGroup?: boolean;
|
|
2039
2102
|
}
|
|
2040
2103
|
/**
|
|
2041
2104
|
* @public
|
|
@@ -2125,6 +2188,11 @@ export interface RuleGroupResponse {
|
|
|
2125
2188
|
* <p>The last time that the rule group was changed.</p>
|
|
2126
2189
|
*/
|
|
2127
2190
|
LastModifiedTime?: Date;
|
|
2191
|
+
/**
|
|
2192
|
+
* @public
|
|
2193
|
+
* <p>The list of analysis results for <code>AnalyzeRuleGroup</code>. If you set <code>AnalyzeRuleGroup</code> to <code>TRUE</code> in <a>CreateRuleGroup</a>, <a>UpdateRuleGroup</a>, or <a>DescribeRuleGroup</a>, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.</p>
|
|
2194
|
+
*/
|
|
2195
|
+
AnalysisResults?: AnalysisResult[];
|
|
2128
2196
|
}
|
|
2129
2197
|
/**
|
|
2130
2198
|
* @public
|
|
@@ -2191,7 +2259,7 @@ export interface ServerCertificate {
|
|
|
2191
2259
|
}
|
|
2192
2260
|
/**
|
|
2193
2261
|
* @public
|
|
2194
|
-
* <p>Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a <a>TLSInspectionConfiguration</a>. You can configure <code>ServerCertificates</code> for inbound SSL/TLS inspection, a <code>CertificateAuthorityArn</code> for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html">
|
|
2262
|
+
* <p>Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a <a>TLSInspectionConfiguration</a>. You can configure <code>ServerCertificates</code> for inbound SSL/TLS inspection, a <code>CertificateAuthorityArn</code> for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html"> Using SSL/TLS server certficiates with TLS inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2195
2263
|
* <note>
|
|
2196
2264
|
* <p>If a server certificate that's associated with your <a>TLSInspectionConfiguration</a> is revoked, deleted, or expired it can result in client-side TLS errors.</p>
|
|
2197
2265
|
* </note>
|
|
@@ -2199,7 +2267,7 @@ export interface ServerCertificate {
|
|
|
2199
2267
|
export interface ServerCertificateConfiguration {
|
|
2200
2268
|
/**
|
|
2201
2269
|
* @public
|
|
2202
|
-
* <p>The list of
|
|
2270
|
+
* <p>The list of server certificates to use for inbound SSL/TLS inspection.</p>
|
|
2203
2271
|
*/
|
|
2204
2272
|
ServerCertificates?: ServerCertificate[];
|
|
2205
2273
|
/**
|
|
@@ -2209,7 +2277,7 @@ export interface ServerCertificateConfiguration {
|
|
|
2209
2277
|
Scopes?: ServerCertificateScope[];
|
|
2210
2278
|
/**
|
|
2211
2279
|
* @public
|
|
2212
|
-
* <p>The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate
|
|
2280
|
+
* <p>The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.</p>
|
|
2213
2281
|
* <p>The following limitations apply:</p>
|
|
2214
2282
|
* <ul>
|
|
2215
2283
|
* <li>
|
|
@@ -2219,13 +2287,13 @@ export interface ServerCertificateConfiguration {
|
|
|
2219
2287
|
* <p>You can't use certificates issued by Private Certificate Authority.</p>
|
|
2220
2288
|
* </li>
|
|
2221
2289
|
* </ul>
|
|
2222
|
-
* <p>For more information about
|
|
2290
|
+
* <p>For more information about configuring certificates for outbound inspection, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html">Using SSL/TLS certificates with certificates with TLS inspection configurations</a> in the <i>Network Firewall Developer Guide</i>. </p>
|
|
2223
2291
|
* <p>For information about working with certificates in ACM, see <a href="https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html">Importing certificates</a> in the <i>Certificate Manager User Guide</i>.</p>
|
|
2224
2292
|
*/
|
|
2225
2293
|
CertificateAuthorityArn?: string;
|
|
2226
2294
|
/**
|
|
2227
2295
|
* @public
|
|
2228
|
-
* <p>When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To
|
|
2296
|
+
* <p>When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a <code>CertificateAuthorityArn</code> in <a>ServerCertificateConfiguration</a>.</p>
|
|
2229
2297
|
*/
|
|
2230
2298
|
CheckCertificateRevocationStatus?: CheckCertificateRevocationStatusActions;
|
|
2231
2299
|
}
|
|
@@ -2769,6 +2837,11 @@ export interface DescribeRuleGroupRequest {
|
|
|
2769
2837
|
* </note>
|
|
2770
2838
|
*/
|
|
2771
2839
|
Type?: RuleGroupType;
|
|
2840
|
+
/**
|
|
2841
|
+
* @public
|
|
2842
|
+
* <p>Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to <code>TRUE</code>, Network Firewall runs the analysis.</p>
|
|
2843
|
+
*/
|
|
2844
|
+
AnalyzeRuleGroup?: boolean;
|
|
2772
2845
|
}
|
|
2773
2846
|
/**
|
|
2774
2847
|
* @public
|
|
@@ -3798,6 +3871,11 @@ export interface UpdateRuleGroupRequest {
|
|
|
3798
3871
|
* <p>A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.</p>
|
|
3799
3872
|
*/
|
|
3800
3873
|
SourceMetadata?: SourceMetadata;
|
|
3874
|
+
/**
|
|
3875
|
+
* @public
|
|
3876
|
+
* <p>Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to <code>TRUE</code>, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set <code>DryRun</code> to <code>TRUE</code>. </p>
|
|
3877
|
+
*/
|
|
3878
|
+
AnalyzeRuleGroup?: boolean;
|
|
3801
3879
|
}
|
|
3802
3880
|
/**
|
|
3803
3881
|
* @public
|
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
export * from "./NetworkFirewallClient";
|
|
2
2
|
export * from "./NetworkFirewall";
|
|
3
3
|
export { ClientInputEndpointParameters } from "./endpoint/EndpointParameters";
|
|
4
|
+
export { RuntimeExtension } from "./runtimeExtensions";
|
|
5
|
+
export { NetworkFirewallExtensionConfiguration } from "./extensionConfiguration";
|
|
4
6
|
export * from "./commands";
|
|
5
7
|
export * from "./pagination";
|
|
6
8
|
export * from "./models";
|
|
@@ -12,6 +12,17 @@ export interface ActionDefinition {
|
|
|
12
12
|
export interface Address {
|
|
13
13
|
AddressDefinition: string | undefined;
|
|
14
14
|
}
|
|
15
|
+
export declare const IdentifiedType: {
|
|
16
|
+
readonly STATELESS_RULE_CONTAINS_TCP_FLAGS: "STATELESS_RULE_CONTAINS_TCP_FLAGS";
|
|
17
|
+
readonly STATELESS_RULE_FORWARDING_ASYMMETRICALLY: "STATELESS_RULE_FORWARDING_ASYMMETRICALLY";
|
|
18
|
+
};
|
|
19
|
+
export type IdentifiedType =
|
|
20
|
+
(typeof IdentifiedType)[keyof typeof IdentifiedType];
|
|
21
|
+
export interface AnalysisResult {
|
|
22
|
+
IdentifiedRuleIds?: string[];
|
|
23
|
+
IdentifiedType?: IdentifiedType;
|
|
24
|
+
AnalysisDetail?: string;
|
|
25
|
+
}
|
|
15
26
|
export interface AssociateFirewallPolicyRequest {
|
|
16
27
|
UpdateToken?: string;
|
|
17
28
|
FirewallArn?: string;
|
|
@@ -476,6 +487,7 @@ export interface CreateRuleGroupRequest {
|
|
|
476
487
|
DryRun?: boolean;
|
|
477
488
|
EncryptionConfiguration?: EncryptionConfiguration;
|
|
478
489
|
SourceMetadata?: SourceMetadata;
|
|
490
|
+
AnalyzeRuleGroup?: boolean;
|
|
479
491
|
}
|
|
480
492
|
export interface RuleGroupResponse {
|
|
481
493
|
RuleGroupArn: string | undefined;
|
|
@@ -492,6 +504,7 @@ export interface RuleGroupResponse {
|
|
|
492
504
|
SourceMetadata?: SourceMetadata;
|
|
493
505
|
SnsTopic?: string;
|
|
494
506
|
LastModifiedTime?: Date;
|
|
507
|
+
AnalysisResults?: AnalysisResult[];
|
|
495
508
|
}
|
|
496
509
|
export interface CreateRuleGroupResponse {
|
|
497
510
|
UpdateToken: string | undefined;
|
|
@@ -650,6 +663,7 @@ export interface DescribeRuleGroupRequest {
|
|
|
650
663
|
RuleGroupName?: string;
|
|
651
664
|
RuleGroupArn?: string;
|
|
652
665
|
Type?: RuleGroupType;
|
|
666
|
+
AnalyzeRuleGroup?: boolean;
|
|
653
667
|
}
|
|
654
668
|
export interface DescribeRuleGroupResponse {
|
|
655
669
|
UpdateToken: string | undefined;
|
|
@@ -882,6 +896,7 @@ export interface UpdateRuleGroupRequest {
|
|
|
882
896
|
DryRun?: boolean;
|
|
883
897
|
EncryptionConfiguration?: EncryptionConfiguration;
|
|
884
898
|
SourceMetadata?: SourceMetadata;
|
|
899
|
+
AnalyzeRuleGroup?: boolean;
|
|
885
900
|
}
|
|
886
901
|
export interface UpdateRuleGroupResponse {
|
|
887
902
|
UpdateToken: string | undefined;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-network-firewall",
|
|
3
3
|
"description": "AWS SDK for JavaScript Network Firewall Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.445.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -21,9 +21,9 @@
|
|
|
21
21
|
"dependencies": {
|
|
22
22
|
"@aws-crypto/sha256-browser": "3.0.0",
|
|
23
23
|
"@aws-crypto/sha256-js": "3.0.0",
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
25
|
-
"@aws-sdk/core": "3.
|
|
26
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
24
|
+
"@aws-sdk/client-sts": "3.445.0",
|
|
25
|
+
"@aws-sdk/core": "3.445.0",
|
|
26
|
+
"@aws-sdk/credential-provider-node": "3.445.0",
|
|
27
27
|
"@aws-sdk/middleware-host-header": "3.433.0",
|
|
28
28
|
"@aws-sdk/middleware-logger": "3.433.0",
|
|
29
29
|
"@aws-sdk/middleware-recursion-detection": "3.433.0",
|