@aws-sdk/client-network-firewall 3.74.0 → 3.78.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/CHANGELOG.md +28 -0
  2. package/README.md +7 -7
  3. package/dist-cjs/NetworkFirewall.js +15 -0
  4. package/dist-cjs/commands/UpdateFirewallEncryptionConfigurationCommand.js +36 -0
  5. package/dist-cjs/commands/index.js +1 -0
  6. package/dist-cjs/models/models_0.js +26 -3
  7. package/dist-cjs/pagination/ListFirewallPoliciesPaginator.js +2 -1
  8. package/dist-cjs/pagination/ListFirewallsPaginator.js +2 -1
  9. package/dist-cjs/pagination/ListRuleGroupsPaginator.js +2 -1
  10. package/dist-cjs/pagination/ListTagsForResourcePaginator.js +2 -1
  11. package/dist-cjs/protocols/Aws_json1_0.js +125 -2
  12. package/dist-es/NetworkFirewall.js +15 -0
  13. package/dist-es/commands/UpdateFirewallEncryptionConfigurationCommand.js +39 -0
  14. package/dist-es/commands/index.js +1 -0
  15. package/dist-es/models/models_0.js +17 -0
  16. package/dist-es/pagination/ListFirewallPoliciesPaginator.js +3 -2
  17. package/dist-es/pagination/ListFirewallsPaginator.js +3 -2
  18. package/dist-es/pagination/ListRuleGroupsPaginator.js +3 -2
  19. package/dist-es/pagination/ListTagsForResourcePaginator.js +3 -2
  20. package/dist-es/protocols/Aws_json1_0.js +136 -6
  21. package/dist-types/NetworkFirewall.d.ts +27 -20
  22. package/dist-types/NetworkFirewallClient.d.ts +10 -9
  23. package/dist-types/commands/AssociateSubnetsCommand.d.ts +1 -1
  24. package/dist-types/commands/CreateFirewallCommand.d.ts +3 -3
  25. package/dist-types/commands/CreateFirewallPolicyCommand.d.ts +1 -1
  26. package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -2
  27. package/dist-types/commands/PutResourcePolicyCommand.d.ts +2 -2
  28. package/dist-types/commands/TagResourceCommand.d.ts +2 -2
  29. package/dist-types/commands/UntagResourceCommand.d.ts +2 -2
  30. package/dist-types/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +35 -0
  31. package/dist-types/commands/index.d.ts +1 -0
  32. package/dist-types/models/models_0.d.ts +131 -24
  33. package/dist-types/protocols/Aws_json1_0.d.ts +3 -0
  34. package/dist-types/ts3.4/NetworkFirewall.d.ts +5 -0
  35. package/dist-types/ts3.4/NetworkFirewallClient.d.ts +3 -2
  36. package/dist-types/ts3.4/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +17 -0
  37. package/dist-types/ts3.4/commands/index.d.ts +1 -0
  38. package/dist-types/ts3.4/models/models_0.d.ts +59 -0
  39. package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +3 -0
  40. package/package.json +25 -25
@@ -7,7 +7,7 @@ export interface PutResourcePolicyCommandInput extends PutResourcePolicyRequest
7
7
  export interface PutResourcePolicyCommandOutput extends PutResourcePolicyResponse, __MetadataBearer {
8
8
  }
9
9
  /**
10
- * <p>Creates or updates an AWS Identity and Access Management policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the AWS Resource Access Manager (RAM) service
10
+ * <p>Creates or updates an IAM policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the Amazon Web Services Resource Access Manager (RAM) service
11
11
  * to manage resource sharing for Network Firewall. </p>
12
12
  * <p>Use this operation to create or update a resource policy for your rule group or firewall policy. In the policy, you specify the accounts that you want to share the resource with and the operations that you want the accounts to be able to perform. </p>
13
13
  * <p>When you add an account in the resource policy, you then run the following Resource Access Manager (RAM) operations to access and accept the shared rule group or firewall policy. </p>
@@ -21,7 +21,7 @@ export interface PutResourcePolicyCommandOutput extends PutResourcePolicyRespons
21
21
  * <a href="https://docs.aws.amazon.com/ram/latest/APIReference/API_AcceptResourceShareInvitation.html">AcceptResourceShareInvitation</a> - Accepts the share invitation for a specified resource share. </p>
22
22
  * </li>
23
23
  * </ul>
24
- * <p>For additional information about resource sharing using RAM, see <a href="https://docs.aws.amazon.com/ram/latest/userguide/what-is.html">AWS Resource Access Manager User Guide</a>.</p>
24
+ * <p>For additional information about resource sharing using RAM, see <a href="https://docs.aws.amazon.com/ram/latest/userguide/what-is.html">Resource Access Manager User Guide</a>.</p>
25
25
  * @example
26
26
  * Use a bare-bones client and the command you need to make an API call.
27
27
  * ```javascript
@@ -10,8 +10,8 @@ export interface TagResourceCommandOutput extends TagResourceResponse, __Metadat
10
10
  * <p>Adds the specified tags to the specified resource. Tags are key:value pairs that you can
11
11
  * use to categorize and manage your resources, for purposes like billing. For example, you
12
12
  * might set the tag key to "customer" and the value to the customer name or ID. You can
13
- * specify one or more tags to add to each AWS resource, up to 50 tags for a resource.</p>
14
- * <p>You can tag the AWS resources that you manage through AWS Network Firewall: firewalls, firewall
13
+ * specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.</p>
14
+ * <p>You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall
15
15
  * policies, and rule groups. </p>
16
16
  * @example
17
17
  * Use a bare-bones client and the command you need to make an API call.
@@ -10,9 +10,9 @@ export interface UntagResourceCommandOutput extends UntagResourceResponse, __Met
10
10
  * <p>Removes the tags with the specified keys from the specified resource. Tags are key:value
11
11
  * pairs that you can use to categorize and manage your resources, for purposes like billing.
12
12
  * For example, you might set the tag key to "customer" and the value to the customer name or
13
- * ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a
13
+ * ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a
14
14
  * resource.</p>
15
- * <p>You can manage tags for the AWS resources that you manage through AWS Network Firewall:
15
+ * <p>You can manage tags for the Amazon Web Services resources that you manage through Network Firewall:
16
16
  * firewalls, firewall policies, and rule groups. </p>
17
17
  * @example
18
18
  * Use a bare-bones client and the command you need to make an API call.
@@ -0,0 +1,35 @@
1
+ import { Command as $Command } from "@aws-sdk/smithy-client";
2
+ import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types";
3
+ import { UpdateFirewallEncryptionConfigurationRequest, UpdateFirewallEncryptionConfigurationResponse } from "../models/models_0";
4
+ import { NetworkFirewallClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../NetworkFirewallClient";
5
+ export interface UpdateFirewallEncryptionConfigurationCommandInput extends UpdateFirewallEncryptionConfigurationRequest {
6
+ }
7
+ export interface UpdateFirewallEncryptionConfigurationCommandOutput extends UpdateFirewallEncryptionConfigurationResponse, __MetadataBearer {
8
+ }
9
+ /**
10
+ * <p>A complex type that contains settings for encryption of your firewall resources.</p>
11
+ * @example
12
+ * Use a bare-bones client and the command you need to make an API call.
13
+ * ```javascript
14
+ * import { NetworkFirewallClient, UpdateFirewallEncryptionConfigurationCommand } from "@aws-sdk/client-network-firewall"; // ES Modules import
15
+ * // const { NetworkFirewallClient, UpdateFirewallEncryptionConfigurationCommand } = require("@aws-sdk/client-network-firewall"); // CommonJS import
16
+ * const client = new NetworkFirewallClient(config);
17
+ * const command = new UpdateFirewallEncryptionConfigurationCommand(input);
18
+ * const response = await client.send(command);
19
+ * ```
20
+ *
21
+ * @see {@link UpdateFirewallEncryptionConfigurationCommandInput} for command's `input` shape.
22
+ * @see {@link UpdateFirewallEncryptionConfigurationCommandOutput} for command's `response` shape.
23
+ * @see {@link NetworkFirewallClientResolvedConfig | config} for NetworkFirewallClient's `config` shape.
24
+ *
25
+ */
26
+ export declare class UpdateFirewallEncryptionConfigurationCommand extends $Command<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput, NetworkFirewallClientResolvedConfig> {
27
+ readonly input: UpdateFirewallEncryptionConfigurationCommandInput;
28
+ constructor(input: UpdateFirewallEncryptionConfigurationCommandInput);
29
+ /**
30
+ * @internal
31
+ */
32
+ resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: NetworkFirewallClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput>;
33
+ private serialize;
34
+ private deserialize;
35
+ }
@@ -23,6 +23,7 @@ export * from "./TagResourceCommand";
23
23
  export * from "./UntagResourceCommand";
24
24
  export * from "./UpdateFirewallDeleteProtectionCommand";
25
25
  export * from "./UpdateFirewallDescriptionCommand";
26
+ export * from "./UpdateFirewallEncryptionConfigurationCommand";
26
27
  export * from "./UpdateFirewallPolicyChangeProtectionCommand";
27
28
  export * from "./UpdateFirewallPolicyCommand";
28
29
  export * from "./UpdateLoggingConfigurationCommand";
@@ -5,7 +5,7 @@ import { NetworkFirewallServiceException as __BaseException } from "./NetworkFir
5
5
  * <code>PublishMetrics</code>
6
6
  * <a>CustomAction</a>. A CloudWatch custom metric dimension is a name/value pair that's
7
7
  * part of the identity of a metric. </p>
8
- * <p>AWS Network Firewall sets the dimension name to <code>CustomAction</code> and you provide the
8
+ * <p>Network Firewall sets the dimension name to <code>CustomAction</code> and you provide the
9
9
  * dimension value. </p>
10
10
  * <p>For more information about CloudWatch custom metric dimensions, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/publishingMetrics.html#usingDimensions">Publishing Custom Metrics</a> in the <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html">Amazon CloudWatch User
11
11
  * Guide</a>.</p>
@@ -228,7 +228,7 @@ export declare class ThrottlingException extends __BaseException {
228
228
  }
229
229
  /**
230
230
  * <p>The ID for a subnet that you want to associate with the firewall. This is used with
231
- * <a>CreateFirewall</a> and <a>AssociateSubnets</a>. AWS Network Firewall
231
+ * <a>CreateFirewall</a> and <a>AssociateSubnets</a>. Network Firewall
232
232
  * creates an instance of the associated firewall in each subnet that you specify, to filter
233
233
  * traffic in the subnet's Availability Zone.</p>
234
234
  */
@@ -299,7 +299,7 @@ export declare namespace AssociateSubnetsResponse {
299
299
  const filterSensitiveLog: (obj: AssociateSubnetsResponse) => any;
300
300
  }
301
301
  /**
302
- * <p>AWS doesn't currently have enough available capacity to fulfill your request. Try your
302
+ * <p>Amazon Web Services doesn't currently have enough available capacity to fulfill your request. Try your
303
303
  * request later. </p>
304
304
  */
305
305
  export declare class InsufficientCapacityException extends __BaseException {
@@ -319,7 +319,7 @@ export declare enum AttachmentStatus {
319
319
  }
320
320
  /**
321
321
  * <p>The configuration and status for a single subnet that you've specified for use by the
322
- * AWS Network Firewall firewall. This is part of the <a>FirewallStatus</a>.</p>
322
+ * Network Firewall firewall. This is part of the <a>FirewallStatus</a>.</p>
323
323
  */
324
324
  export interface Attachment {
325
325
  /**
@@ -353,11 +353,34 @@ export declare enum ConfigurationSyncState {
353
353
  IN_SYNC = "IN_SYNC",
354
354
  PENDING = "PENDING"
355
355
  }
356
+ export declare enum EncryptionType {
357
+ AWS_OWNED_KMS_KEY = "AWS_OWNED_KMS_KEY",
358
+ CUSTOMER_KMS = "CUSTOMER_KMS"
359
+ }
360
+ /**
361
+ * <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
362
+ */
363
+ export interface EncryptionConfiguration {
364
+ /**
365
+ * <p>The ID of the Amazon Web Services Key Management Service (KMS) customer managed key. You can use any of the key identifiers that KMS supports, unless you're using a key that's managed by another account. If you're using a key managed by another account, then specify the key ARN. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id">Key ID</a> in the <i>Amazon Web Services KMS Developer Guide</i>.</p>
366
+ */
367
+ KeyId?: string;
368
+ /**
369
+ * <p>The type of Amazon Web Services KMS key to use for encryption of your Network Firewall resources.</p>
370
+ */
371
+ Type?: EncryptionType | string;
372
+ }
373
+ export declare namespace EncryptionConfiguration {
374
+ /**
375
+ * @internal
376
+ */
377
+ const filterSensitiveLog: (obj: EncryptionConfiguration) => any;
378
+ }
356
379
  /**
357
- * <p>A key:value pair associated with an AWS resource. The key:value pair can be anything you
380
+ * <p>A key:value pair associated with an Amazon Web Services resource. The key:value pair can be anything you
358
381
  * define. Typically, the tag key represents a category (such as "environment") and the tag
359
382
  * value represents a specific value within that category (such as "test," "development," or
360
- * "production"). You can add up to 50 tags to each AWS resource. </p>
383
+ * "production"). You can add up to 50 tags to each Amazon Web Services resource. </p>
361
384
  */
362
385
  export interface Tag {
363
386
  /**
@@ -425,6 +448,10 @@ export interface CreateFirewallRequest {
425
448
  * <p>The key:value pairs to associate with the resource.</p>
426
449
  */
427
450
  Tags?: Tag[];
451
+ /**
452
+ * <p>A complex type that contains settings for encryption of your firewall resources.</p>
453
+ */
454
+ EncryptionConfiguration?: EncryptionConfiguration;
428
455
  }
429
456
  export declare namespace CreateFirewallRequest {
430
457
  /**
@@ -433,7 +460,7 @@ export declare namespace CreateFirewallRequest {
433
460
  const filterSensitiveLog: (obj: CreateFirewallRequest) => any;
434
461
  }
435
462
  /**
436
- * <p>The firewall defines the configuration settings for an AWS Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource. </p>
463
+ * <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
437
464
  * <p>The status of the firewall, for example whether it's ready to filter network traffic,
438
465
  * is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
439
466
  * objects by calling <a>DescribeFirewall</a>.</p>
@@ -493,6 +520,10 @@ export interface Firewall {
493
520
  * <p></p>
494
521
  */
495
522
  Tags?: Tag[];
523
+ /**
524
+ * <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall.</p>
525
+ */
526
+ EncryptionConfiguration?: EncryptionConfiguration;
496
527
  }
497
528
  export declare namespace Firewall {
498
529
  /**
@@ -534,7 +565,7 @@ export declare namespace PerObjectStatus {
534
565
  /**
535
566
  * <p>The status of the firewall endpoint and firewall policy configuration for a single VPC
536
567
  * subnet. </p>
537
- * <p>For each VPC subnet that you associate with a firewall, AWS Network Firewall does the
568
+ * <p>For each VPC subnet that you associate with a firewall, Network Firewall does the
538
569
  * following: </p>
539
570
  * <ul>
540
571
  * <li>
@@ -655,7 +686,7 @@ export interface StatefulEngineOptions {
655
686
  * <p>Indicates how to manage the order of stateful rule evaluation for the policy. <code>DEFAULT_ACTION_ORDER</code> is
656
687
  * the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
657
688
  * based on certain settings. For more information, see
658
- * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>AWS Network Firewall Developer Guide</i>.
689
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
659
690
  * </p>
660
691
  */
661
692
  RuleOrder?: RuleOrder | string;
@@ -847,7 +878,7 @@ export interface FirewallPolicy {
847
878
  * </li>
848
879
  * </ul>
849
880
  * <p>For more information, see
850
- * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>AWS Network Firewall Developer Guide</i>.
881
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>Network Firewall Developer Guide</i>.
851
882
  * </p>
852
883
  */
853
884
  StatefulDefaultActions?: string[];
@@ -889,6 +920,10 @@ export interface CreateFirewallPolicyRequest {
889
920
  * <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
890
921
  */
891
922
  DryRun?: boolean;
923
+ /**
924
+ * <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
925
+ */
926
+ EncryptionConfiguration?: EncryptionConfiguration;
892
927
  }
893
928
  export declare namespace CreateFirewallPolicyRequest {
894
929
  /**
@@ -947,6 +982,10 @@ export interface FirewallPolicyResponse {
947
982
  * <p>The number of firewalls that are associated with this firewall policy.</p>
948
983
  */
949
984
  NumberOfAssociations?: number;
985
+ /**
986
+ * <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall policy.</p>
987
+ */
988
+ EncryptionConfiguration?: EncryptionConfiguration;
950
989
  }
951
990
  export declare namespace FirewallPolicyResponse {
952
991
  /**
@@ -982,7 +1021,7 @@ export declare enum TargetType {
982
1021
  /**
983
1022
  * <p>Stateful inspection criteria for a domain list rule group. </p>
984
1023
  * <p>For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.</p>
985
- * <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in AWS Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
1024
+ * <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
986
1025
  */
987
1026
  export interface RulesSourceList {
988
1027
  /**
@@ -1043,13 +1082,13 @@ export declare enum StatefulRuleProtocol {
1043
1082
  UDP = "UDP"
1044
1083
  }
1045
1084
  /**
1046
- * <p>The basic rule criteria for AWS Network Firewall to use to inspect packet headers in stateful
1085
+ * <p>The basic rule criteria for Network Firewall to use to inspect packet headers in stateful
1047
1086
  * traffic flow inspection. Traffic flows that match the criteria are a match for the
1048
1087
  * corresponding <a>StatefulRule</a>. </p>
1049
1088
  */
1050
1089
  export interface Header {
1051
1090
  /**
1052
- * <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on AWS and on the internet is IP.</p>
1091
+ * <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on Amazon Web Services and on the internet is IP.</p>
1053
1092
  */
1054
1093
  Protocol: StatefulRuleProtocol | string | undefined;
1055
1094
  /**
@@ -1292,7 +1331,7 @@ export declare namespace MatchAttributes {
1292
1331
  const filterSensitiveLog: (obj: MatchAttributes) => any;
1293
1332
  }
1294
1333
  /**
1295
- * <p>The inspection criteria and action for a single stateless rule. AWS Network Firewall inspects each packet for the specified matching
1334
+ * <p>The inspection criteria and action for a single stateless rule. Network Firewall inspects each packet for the specified matching
1296
1335
  * criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on
1297
1336
  * the packet.</p>
1298
1337
  */
@@ -1505,7 +1544,7 @@ export interface StatefulRuleOptions {
1505
1544
  * <p>Indicates how to manage the order of the rule evaluation for the rule group. <code>DEFAULT_ACTION_ORDER</code> is
1506
1545
  * the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
1507
1546
  * based on certain settings. For more information, see
1508
- * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>AWS Network Firewall Developer Guide</i>.
1547
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
1509
1548
  * </p>
1510
1549
  */
1511
1550
  RuleOrder?: RuleOrder | string;
@@ -1518,7 +1557,7 @@ export declare namespace StatefulRuleOptions {
1518
1557
  }
1519
1558
  /**
1520
1559
  * <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
1521
- * <p>AWS Network Firewall uses a rule group to inspect and control network traffic.
1560
+ * <p>Network Firewall uses a rule group to inspect and control network traffic.
1522
1561
  * You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
1523
1562
  * traffic flow. </p>
1524
1563
  * <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
@@ -1638,6 +1677,10 @@ export interface CreateRuleGroupRequest {
1638
1677
  * <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
1639
1678
  */
1640
1679
  DryRun?: boolean;
1680
+ /**
1681
+ * <p>A complex type that contains settings for encryption of your rule group resources.</p>
1682
+ */
1683
+ EncryptionConfiguration?: EncryptionConfiguration;
1641
1684
  }
1642
1685
  export declare namespace CreateRuleGroupRequest {
1643
1686
  /**
@@ -1699,6 +1742,10 @@ export interface RuleGroupResponse {
1699
1742
  * <p>The number of firewall policies that use this rule group.</p>
1700
1743
  */
1701
1744
  NumberOfAssociations?: number;
1745
+ /**
1746
+ * <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your rule group.</p>
1747
+ */
1748
+ EncryptionConfiguration?: EncryptionConfiguration;
1702
1749
  }
1703
1750
  export declare namespace RuleGroupResponse {
1704
1751
  /**
@@ -1743,7 +1790,7 @@ export declare namespace DeleteFirewallRequest {
1743
1790
  }
1744
1791
  export interface DeleteFirewallResponse {
1745
1792
  /**
1746
- * <p>The firewall defines the configuration settings for an AWS Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource. </p>
1793
+ * <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
1747
1794
  * <p>The status of the firewall, for example whether it's ready to filter network traffic,
1748
1795
  * is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
1749
1796
  * objects by calling <a>DescribeFirewall</a>.</p>
@@ -1980,7 +2027,7 @@ export declare enum LogType {
1980
2027
  FLOW = "FLOW"
1981
2028
  }
1982
2029
  /**
1983
- * <p>Defines where AWS Network Firewall sends logs for the firewall for one log type. This is used
2030
+ * <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
1984
2031
  * in <a>LoggingConfiguration</a>. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.</p>
1985
2032
  * <p>Network Firewall generates logs for stateful rule groups. You can save alert and flow log
1986
2033
  * types. The stateful rules engine records flow logs for all network traffic that it receives.
@@ -2042,7 +2089,7 @@ export declare namespace LogDestinationConfig {
2042
2089
  const filterSensitiveLog: (obj: LogDestinationConfig) => any;
2043
2090
  }
2044
2091
  /**
2045
- * <p>Defines how AWS Network Firewall performs logging for a <a>Firewall</a>. </p>
2092
+ * <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
2046
2093
  */
2047
2094
  export interface LoggingConfiguration {
2048
2095
  /**
@@ -2063,7 +2110,7 @@ export interface DescribeLoggingConfigurationResponse {
2063
2110
  */
2064
2111
  FirewallArn?: string;
2065
2112
  /**
2066
- * <p>Defines how AWS Network Firewall performs logging for a <a>Firewall</a>. </p>
2113
+ * <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
2067
2114
  */
2068
2115
  LoggingConfiguration?: LoggingConfiguration;
2069
2116
  }
@@ -2087,7 +2134,7 @@ export declare namespace DescribeResourcePolicyRequest {
2087
2134
  }
2088
2135
  export interface DescribeResourcePolicyResponse {
2089
2136
  /**
2090
- * <p>The AWS Identity and Access Management policy for the resource. </p>
2137
+ * <p>The IAM policy for the resource. </p>
2091
2138
  */
2092
2139
  Policy?: string;
2093
2140
  }
@@ -2131,7 +2178,7 @@ export interface DescribeRuleGroupResponse {
2131
2178
  UpdateToken: string | undefined;
2132
2179
  /**
2133
2180
  * <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
2134
- * <p>AWS Network Firewall uses a rule group to inspect and control network traffic.
2181
+ * <p>Network Firewall uses a rule group to inspect and control network traffic.
2135
2182
  * You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
2136
2183
  * traffic flow. </p>
2137
2184
  * <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
@@ -2528,7 +2575,7 @@ export interface PutResourcePolicyRequest {
2528
2575
  */
2529
2576
  ResourceArn: string | undefined;
2530
2577
  /**
2531
- * <p>The AWS Identity and Access Management policy statement that lists the accounts that you want to share your rule group or firewall policy with
2578
+ * <p>The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with
2532
2579
  * and the operations that you want the accounts to be able to perform. </p>
2533
2580
  * <p>For a rule group resource, you can specify the following operations in the Actions section of the statement:</p>
2534
2581
  * <ul>
@@ -2748,6 +2795,58 @@ export declare namespace UpdateFirewallDescriptionResponse {
2748
2795
  */
2749
2796
  const filterSensitiveLog: (obj: UpdateFirewallDescriptionResponse) => any;
2750
2797
  }
2798
+ export interface UpdateFirewallEncryptionConfigurationRequest {
2799
+ /**
2800
+ * <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
2801
+ * <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
2802
+ * <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
2803
+ */
2804
+ UpdateToken?: string;
2805
+ /**
2806
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2807
+ */
2808
+ FirewallArn?: string;
2809
+ /**
2810
+ * <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
2811
+ */
2812
+ FirewallName?: string;
2813
+ /**
2814
+ * <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
2815
+ */
2816
+ EncryptionConfiguration?: EncryptionConfiguration;
2817
+ }
2818
+ export declare namespace UpdateFirewallEncryptionConfigurationRequest {
2819
+ /**
2820
+ * @internal
2821
+ */
2822
+ const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationRequest) => any;
2823
+ }
2824
+ export interface UpdateFirewallEncryptionConfigurationResponse {
2825
+ /**
2826
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2827
+ */
2828
+ FirewallArn?: string;
2829
+ /**
2830
+ * <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
2831
+ */
2832
+ FirewallName?: string;
2833
+ /**
2834
+ * <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
2835
+ * <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
2836
+ * <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
2837
+ */
2838
+ UpdateToken?: string;
2839
+ /**
2840
+ * <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
2841
+ */
2842
+ EncryptionConfiguration?: EncryptionConfiguration;
2843
+ }
2844
+ export declare namespace UpdateFirewallEncryptionConfigurationResponse {
2845
+ /**
2846
+ * @internal
2847
+ */
2848
+ const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationResponse) => any;
2849
+ }
2751
2850
  export interface UpdateFirewallPolicyRequest {
2752
2851
  /**
2753
2852
  * <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the firewall policy. The token marks the state of the policy resource at the time of the request. </p>
@@ -2781,6 +2880,10 @@ export interface UpdateFirewallPolicyRequest {
2781
2880
  * <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
2782
2881
  */
2783
2882
  DryRun?: boolean;
2883
+ /**
2884
+ * <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
2885
+ */
2886
+ EncryptionConfiguration?: EncryptionConfiguration;
2784
2887
  }
2785
2888
  export declare namespace UpdateFirewallPolicyRequest {
2786
2889
  /**
@@ -2896,7 +2999,7 @@ export interface UpdateLoggingConfigurationResponse {
2896
2999
  */
2897
3000
  FirewallName?: string;
2898
3001
  /**
2899
- * <p>Defines how AWS Network Firewall performs logging for a <a>Firewall</a>. </p>
3002
+ * <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
2900
3003
  */
2901
3004
  LoggingConfiguration?: LoggingConfiguration;
2902
3005
  }
@@ -2960,6 +3063,10 @@ export interface UpdateRuleGroupRequest {
2960
3063
  * <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
2961
3064
  */
2962
3065
  DryRun?: boolean;
3066
+ /**
3067
+ * <p>A complex type that contains settings for encryption of your rule group resources.</p>
3068
+ */
3069
+ EncryptionConfiguration?: EncryptionConfiguration;
2963
3070
  }
2964
3071
  export declare namespace UpdateRuleGroupRequest {
2965
3072
  /**
@@ -25,6 +25,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "../commands/T
25
25
  import { UntagResourceCommandInput, UntagResourceCommandOutput } from "../commands/UntagResourceCommand";
26
26
  import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "../commands/UpdateFirewallDeleteProtectionCommand";
27
27
  import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "../commands/UpdateFirewallDescriptionCommand";
28
+ import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "../commands/UpdateFirewallEncryptionConfigurationCommand";
28
29
  import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "../commands/UpdateFirewallPolicyChangeProtectionCommand";
29
30
  import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "../commands/UpdateFirewallPolicyCommand";
30
31
  import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "../commands/UpdateLoggingConfigurationCommand";
@@ -55,6 +56,7 @@ export declare const serializeAws_json1_0TagResourceCommand: (input: TagResource
55
56
  export declare const serializeAws_json1_0UntagResourceCommand: (input: UntagResourceCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
56
57
  export declare const serializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (input: UpdateFirewallDeleteProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
57
58
  export declare const serializeAws_json1_0UpdateFirewallDescriptionCommand: (input: UpdateFirewallDescriptionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
59
+ export declare const serializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (input: UpdateFirewallEncryptionConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
58
60
  export declare const serializeAws_json1_0UpdateFirewallPolicyCommand: (input: UpdateFirewallPolicyCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
59
61
  export declare const serializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (input: UpdateFirewallPolicyChangeProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
60
62
  export declare const serializeAws_json1_0UpdateLoggingConfigurationCommand: (input: UpdateLoggingConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
@@ -85,6 +87,7 @@ export declare const deserializeAws_json1_0TagResourceCommand: (output: __HttpRe
85
87
  export declare const deserializeAws_json1_0UntagResourceCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UntagResourceCommandOutput>;
86
88
  export declare const deserializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDeleteProtectionCommandOutput>;
87
89
  export declare const deserializeAws_json1_0UpdateFirewallDescriptionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDescriptionCommandOutput>;
90
+ export declare const deserializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
88
91
  export declare const deserializeAws_json1_0UpdateFirewallPolicyCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyCommandOutput>;
89
92
  export declare const deserializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyChangeProtectionCommandOutput>;
90
93
  export declare const deserializeAws_json1_0UpdateLoggingConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateLoggingConfigurationCommandOutput>;
@@ -24,6 +24,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
24
24
  import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
25
25
  import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
26
26
  import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
27
+ import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
27
28
  import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
28
29
  import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
29
30
  import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
@@ -133,6 +134,10 @@ export declare class NetworkFirewall extends NetworkFirewallClient {
133
134
  updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
134
135
  updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
135
136
 
137
+ updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
138
+ updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
139
+ updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
140
+
136
141
  updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallPolicyCommandOutput>;
137
142
  updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
138
143
  updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
@@ -31,13 +31,14 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
31
31
  import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
32
32
  import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
33
33
  import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
34
+ import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
34
35
  import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
35
36
  import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
36
37
  import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
37
38
  import { UpdateRuleGroupCommandInput, UpdateRuleGroupCommandOutput } from "./commands/UpdateRuleGroupCommand";
38
39
  import { UpdateSubnetChangeProtectionCommandInput, UpdateSubnetChangeProtectionCommandOutput } from "./commands/UpdateSubnetChangeProtectionCommand";
39
- export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
40
- export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
40
+ export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallEncryptionConfigurationCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
41
+ export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallEncryptionConfigurationCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
41
42
  export interface ClientDefaults extends Partial<__SmithyResolvedConfiguration<__HttpHandlerOptions>> {
42
43
 
43
44
  requestHandler?: __HttpHandler;
@@ -0,0 +1,17 @@
1
+ import { Command as $Command } from "@aws-sdk/smithy-client";
2
+ import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types";
3
+ import { UpdateFirewallEncryptionConfigurationRequest, UpdateFirewallEncryptionConfigurationResponse } from "../models/models_0";
4
+ import { NetworkFirewallClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../NetworkFirewallClient";
5
+ export interface UpdateFirewallEncryptionConfigurationCommandInput extends UpdateFirewallEncryptionConfigurationRequest {
6
+ }
7
+ export interface UpdateFirewallEncryptionConfigurationCommandOutput extends UpdateFirewallEncryptionConfigurationResponse, __MetadataBearer {
8
+ }
9
+
10
+ export declare class UpdateFirewallEncryptionConfigurationCommand extends $Command<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput, NetworkFirewallClientResolvedConfig> {
11
+ readonly input: UpdateFirewallEncryptionConfigurationCommandInput;
12
+ constructor(input: UpdateFirewallEncryptionConfigurationCommandInput);
13
+
14
+ resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: NetworkFirewallClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput>;
15
+ private serialize;
16
+ private deserialize;
17
+ }
@@ -23,6 +23,7 @@ export * from "./TagResourceCommand";
23
23
  export * from "./UntagResourceCommand";
24
24
  export * from "./UpdateFirewallDeleteProtectionCommand";
25
25
  export * from "./UpdateFirewallDescriptionCommand";
26
+ export * from "./UpdateFirewallEncryptionConfigurationCommand";
26
27
  export * from "./UpdateFirewallPolicyChangeProtectionCommand";
27
28
  export * from "./UpdateFirewallPolicyCommand";
28
29
  export * from "./UpdateLoggingConfigurationCommand";