@aws-sdk/client-network-firewall 3.76.0 → 3.78.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +12 -0
- package/README.md +7 -7
- package/dist-cjs/NetworkFirewall.js +15 -0
- package/dist-cjs/commands/UpdateFirewallEncryptionConfigurationCommand.js +36 -0
- package/dist-cjs/commands/index.js +1 -0
- package/dist-cjs/models/models_0.js +26 -3
- package/dist-cjs/pagination/ListFirewallPoliciesPaginator.js +2 -1
- package/dist-cjs/pagination/ListFirewallsPaginator.js +2 -1
- package/dist-cjs/pagination/ListRuleGroupsPaginator.js +2 -1
- package/dist-cjs/pagination/ListTagsForResourcePaginator.js +2 -1
- package/dist-cjs/protocols/Aws_json1_0.js +125 -2
- package/dist-es/NetworkFirewall.js +15 -0
- package/dist-es/commands/UpdateFirewallEncryptionConfigurationCommand.js +39 -0
- package/dist-es/commands/index.js +1 -0
- package/dist-es/models/models_0.js +17 -0
- package/dist-es/pagination/ListFirewallPoliciesPaginator.js +3 -2
- package/dist-es/pagination/ListFirewallsPaginator.js +3 -2
- package/dist-es/pagination/ListRuleGroupsPaginator.js +3 -2
- package/dist-es/pagination/ListTagsForResourcePaginator.js +3 -2
- package/dist-es/protocols/Aws_json1_0.js +136 -6
- package/dist-types/NetworkFirewall.d.ts +27 -20
- package/dist-types/NetworkFirewallClient.d.ts +10 -9
- package/dist-types/commands/AssociateSubnetsCommand.d.ts +1 -1
- package/dist-types/commands/CreateFirewallCommand.d.ts +3 -3
- package/dist-types/commands/CreateFirewallPolicyCommand.d.ts +1 -1
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -2
- package/dist-types/commands/PutResourcePolicyCommand.d.ts +2 -2
- package/dist-types/commands/TagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UntagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +35 -0
- package/dist-types/commands/index.d.ts +1 -0
- package/dist-types/models/models_0.d.ts +131 -24
- package/dist-types/protocols/Aws_json1_0.d.ts +3 -0
- package/dist-types/ts3.4/NetworkFirewall.d.ts +5 -0
- package/dist-types/ts3.4/NetworkFirewallClient.d.ts +3 -2
- package/dist-types/ts3.4/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/dist-types/ts3.4/models/models_0.d.ts +59 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +3 -0
- package/package.json +25 -25
|
@@ -10,8 +10,8 @@ export interface TagResourceCommandOutput extends TagResourceResponse, __Metadat
|
|
|
10
10
|
* <p>Adds the specified tags to the specified resource. Tags are key:value pairs that you can
|
|
11
11
|
* use to categorize and manage your resources, for purposes like billing. For example, you
|
|
12
12
|
* might set the tag key to "customer" and the value to the customer name or ID. You can
|
|
13
|
-
* specify one or more tags to add to each
|
|
14
|
-
* <p>You can tag the
|
|
13
|
+
* specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.</p>
|
|
14
|
+
* <p>You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall
|
|
15
15
|
* policies, and rule groups. </p>
|
|
16
16
|
* @example
|
|
17
17
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -10,9 +10,9 @@ export interface UntagResourceCommandOutput extends UntagResourceResponse, __Met
|
|
|
10
10
|
* <p>Removes the tags with the specified keys from the specified resource. Tags are key:value
|
|
11
11
|
* pairs that you can use to categorize and manage your resources, for purposes like billing.
|
|
12
12
|
* For example, you might set the tag key to "customer" and the value to the customer name or
|
|
13
|
-
* ID. You can specify one or more tags to add to each
|
|
13
|
+
* ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a
|
|
14
14
|
* resource.</p>
|
|
15
|
-
* <p>You can manage tags for the
|
|
15
|
+
* <p>You can manage tags for the Amazon Web Services resources that you manage through Network Firewall:
|
|
16
16
|
* firewalls, firewall policies, and rule groups. </p>
|
|
17
17
|
* @example
|
|
18
18
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
2
|
+
import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types";
|
|
3
|
+
import { UpdateFirewallEncryptionConfigurationRequest, UpdateFirewallEncryptionConfigurationResponse } from "../models/models_0";
|
|
4
|
+
import { NetworkFirewallClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../NetworkFirewallClient";
|
|
5
|
+
export interface UpdateFirewallEncryptionConfigurationCommandInput extends UpdateFirewallEncryptionConfigurationRequest {
|
|
6
|
+
}
|
|
7
|
+
export interface UpdateFirewallEncryptionConfigurationCommandOutput extends UpdateFirewallEncryptionConfigurationResponse, __MetadataBearer {
|
|
8
|
+
}
|
|
9
|
+
/**
|
|
10
|
+
* <p>A complex type that contains settings for encryption of your firewall resources.</p>
|
|
11
|
+
* @example
|
|
12
|
+
* Use a bare-bones client and the command you need to make an API call.
|
|
13
|
+
* ```javascript
|
|
14
|
+
* import { NetworkFirewallClient, UpdateFirewallEncryptionConfigurationCommand } from "@aws-sdk/client-network-firewall"; // ES Modules import
|
|
15
|
+
* // const { NetworkFirewallClient, UpdateFirewallEncryptionConfigurationCommand } = require("@aws-sdk/client-network-firewall"); // CommonJS import
|
|
16
|
+
* const client = new NetworkFirewallClient(config);
|
|
17
|
+
* const command = new UpdateFirewallEncryptionConfigurationCommand(input);
|
|
18
|
+
* const response = await client.send(command);
|
|
19
|
+
* ```
|
|
20
|
+
*
|
|
21
|
+
* @see {@link UpdateFirewallEncryptionConfigurationCommandInput} for command's `input` shape.
|
|
22
|
+
* @see {@link UpdateFirewallEncryptionConfigurationCommandOutput} for command's `response` shape.
|
|
23
|
+
* @see {@link NetworkFirewallClientResolvedConfig | config} for NetworkFirewallClient's `config` shape.
|
|
24
|
+
*
|
|
25
|
+
*/
|
|
26
|
+
export declare class UpdateFirewallEncryptionConfigurationCommand extends $Command<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput, NetworkFirewallClientResolvedConfig> {
|
|
27
|
+
readonly input: UpdateFirewallEncryptionConfigurationCommandInput;
|
|
28
|
+
constructor(input: UpdateFirewallEncryptionConfigurationCommandInput);
|
|
29
|
+
/**
|
|
30
|
+
* @internal
|
|
31
|
+
*/
|
|
32
|
+
resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: NetworkFirewallClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
33
|
+
private serialize;
|
|
34
|
+
private deserialize;
|
|
35
|
+
}
|
|
@@ -23,6 +23,7 @@ export * from "./TagResourceCommand";
|
|
|
23
23
|
export * from "./UntagResourceCommand";
|
|
24
24
|
export * from "./UpdateFirewallDeleteProtectionCommand";
|
|
25
25
|
export * from "./UpdateFirewallDescriptionCommand";
|
|
26
|
+
export * from "./UpdateFirewallEncryptionConfigurationCommand";
|
|
26
27
|
export * from "./UpdateFirewallPolicyChangeProtectionCommand";
|
|
27
28
|
export * from "./UpdateFirewallPolicyCommand";
|
|
28
29
|
export * from "./UpdateLoggingConfigurationCommand";
|
|
@@ -5,7 +5,7 @@ import { NetworkFirewallServiceException as __BaseException } from "./NetworkFir
|
|
|
5
5
|
* <code>PublishMetrics</code>
|
|
6
6
|
* <a>CustomAction</a>. A CloudWatch custom metric dimension is a name/value pair that's
|
|
7
7
|
* part of the identity of a metric. </p>
|
|
8
|
-
* <p>
|
|
8
|
+
* <p>Network Firewall sets the dimension name to <code>CustomAction</code> and you provide the
|
|
9
9
|
* dimension value. </p>
|
|
10
10
|
* <p>For more information about CloudWatch custom metric dimensions, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/publishingMetrics.html#usingDimensions">Publishing Custom Metrics</a> in the <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html">Amazon CloudWatch User
|
|
11
11
|
* Guide</a>.</p>
|
|
@@ -228,7 +228,7 @@ export declare class ThrottlingException extends __BaseException {
|
|
|
228
228
|
}
|
|
229
229
|
/**
|
|
230
230
|
* <p>The ID for a subnet that you want to associate with the firewall. This is used with
|
|
231
|
-
* <a>CreateFirewall</a> and <a>AssociateSubnets</a>.
|
|
231
|
+
* <a>CreateFirewall</a> and <a>AssociateSubnets</a>. Network Firewall
|
|
232
232
|
* creates an instance of the associated firewall in each subnet that you specify, to filter
|
|
233
233
|
* traffic in the subnet's Availability Zone.</p>
|
|
234
234
|
*/
|
|
@@ -299,7 +299,7 @@ export declare namespace AssociateSubnetsResponse {
|
|
|
299
299
|
const filterSensitiveLog: (obj: AssociateSubnetsResponse) => any;
|
|
300
300
|
}
|
|
301
301
|
/**
|
|
302
|
-
* <p>
|
|
302
|
+
* <p>Amazon Web Services doesn't currently have enough available capacity to fulfill your request. Try your
|
|
303
303
|
* request later. </p>
|
|
304
304
|
*/
|
|
305
305
|
export declare class InsufficientCapacityException extends __BaseException {
|
|
@@ -319,7 +319,7 @@ export declare enum AttachmentStatus {
|
|
|
319
319
|
}
|
|
320
320
|
/**
|
|
321
321
|
* <p>The configuration and status for a single subnet that you've specified for use by the
|
|
322
|
-
*
|
|
322
|
+
* Network Firewall firewall. This is part of the <a>FirewallStatus</a>.</p>
|
|
323
323
|
*/
|
|
324
324
|
export interface Attachment {
|
|
325
325
|
/**
|
|
@@ -353,11 +353,34 @@ export declare enum ConfigurationSyncState {
|
|
|
353
353
|
IN_SYNC = "IN_SYNC",
|
|
354
354
|
PENDING = "PENDING"
|
|
355
355
|
}
|
|
356
|
+
export declare enum EncryptionType {
|
|
357
|
+
AWS_OWNED_KMS_KEY = "AWS_OWNED_KMS_KEY",
|
|
358
|
+
CUSTOMER_KMS = "CUSTOMER_KMS"
|
|
359
|
+
}
|
|
360
|
+
/**
|
|
361
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
362
|
+
*/
|
|
363
|
+
export interface EncryptionConfiguration {
|
|
364
|
+
/**
|
|
365
|
+
* <p>The ID of the Amazon Web Services Key Management Service (KMS) customer managed key. You can use any of the key identifiers that KMS supports, unless you're using a key that's managed by another account. If you're using a key managed by another account, then specify the key ARN. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id">Key ID</a> in the <i>Amazon Web Services KMS Developer Guide</i>.</p>
|
|
366
|
+
*/
|
|
367
|
+
KeyId?: string;
|
|
368
|
+
/**
|
|
369
|
+
* <p>The type of Amazon Web Services KMS key to use for encryption of your Network Firewall resources.</p>
|
|
370
|
+
*/
|
|
371
|
+
Type?: EncryptionType | string;
|
|
372
|
+
}
|
|
373
|
+
export declare namespace EncryptionConfiguration {
|
|
374
|
+
/**
|
|
375
|
+
* @internal
|
|
376
|
+
*/
|
|
377
|
+
const filterSensitiveLog: (obj: EncryptionConfiguration) => any;
|
|
378
|
+
}
|
|
356
379
|
/**
|
|
357
|
-
* <p>A key:value pair associated with an
|
|
380
|
+
* <p>A key:value pair associated with an Amazon Web Services resource. The key:value pair can be anything you
|
|
358
381
|
* define. Typically, the tag key represents a category (such as "environment") and the tag
|
|
359
382
|
* value represents a specific value within that category (such as "test," "development," or
|
|
360
|
-
* "production"). You can add up to 50 tags to each
|
|
383
|
+
* "production"). You can add up to 50 tags to each Amazon Web Services resource. </p>
|
|
361
384
|
*/
|
|
362
385
|
export interface Tag {
|
|
363
386
|
/**
|
|
@@ -425,6 +448,10 @@ export interface CreateFirewallRequest {
|
|
|
425
448
|
* <p>The key:value pairs to associate with the resource.</p>
|
|
426
449
|
*/
|
|
427
450
|
Tags?: Tag[];
|
|
451
|
+
/**
|
|
452
|
+
* <p>A complex type that contains settings for encryption of your firewall resources.</p>
|
|
453
|
+
*/
|
|
454
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
428
455
|
}
|
|
429
456
|
export declare namespace CreateFirewallRequest {
|
|
430
457
|
/**
|
|
@@ -433,7 +460,7 @@ export declare namespace CreateFirewallRequest {
|
|
|
433
460
|
const filterSensitiveLog: (obj: CreateFirewallRequest) => any;
|
|
434
461
|
}
|
|
435
462
|
/**
|
|
436
|
-
* <p>The firewall defines the configuration settings for an
|
|
463
|
+
* <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
|
|
437
464
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
438
465
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
439
466
|
* objects by calling <a>DescribeFirewall</a>.</p>
|
|
@@ -493,6 +520,10 @@ export interface Firewall {
|
|
|
493
520
|
* <p></p>
|
|
494
521
|
*/
|
|
495
522
|
Tags?: Tag[];
|
|
523
|
+
/**
|
|
524
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall.</p>
|
|
525
|
+
*/
|
|
526
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
496
527
|
}
|
|
497
528
|
export declare namespace Firewall {
|
|
498
529
|
/**
|
|
@@ -534,7 +565,7 @@ export declare namespace PerObjectStatus {
|
|
|
534
565
|
/**
|
|
535
566
|
* <p>The status of the firewall endpoint and firewall policy configuration for a single VPC
|
|
536
567
|
* subnet. </p>
|
|
537
|
-
* <p>For each VPC subnet that you associate with a firewall,
|
|
568
|
+
* <p>For each VPC subnet that you associate with a firewall, Network Firewall does the
|
|
538
569
|
* following: </p>
|
|
539
570
|
* <ul>
|
|
540
571
|
* <li>
|
|
@@ -655,7 +686,7 @@ export interface StatefulEngineOptions {
|
|
|
655
686
|
* <p>Indicates how to manage the order of stateful rule evaluation for the policy. <code>DEFAULT_ACTION_ORDER</code> is
|
|
656
687
|
* the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
|
|
657
688
|
* based on certain settings. For more information, see
|
|
658
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>
|
|
689
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
|
|
659
690
|
* </p>
|
|
660
691
|
*/
|
|
661
692
|
RuleOrder?: RuleOrder | string;
|
|
@@ -847,7 +878,7 @@ export interface FirewallPolicy {
|
|
|
847
878
|
* </li>
|
|
848
879
|
* </ul>
|
|
849
880
|
* <p>For more information, see
|
|
850
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>
|
|
881
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>Network Firewall Developer Guide</i>.
|
|
851
882
|
* </p>
|
|
852
883
|
*/
|
|
853
884
|
StatefulDefaultActions?: string[];
|
|
@@ -889,6 +920,10 @@ export interface CreateFirewallPolicyRequest {
|
|
|
889
920
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
890
921
|
*/
|
|
891
922
|
DryRun?: boolean;
|
|
923
|
+
/**
|
|
924
|
+
* <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
|
|
925
|
+
*/
|
|
926
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
892
927
|
}
|
|
893
928
|
export declare namespace CreateFirewallPolicyRequest {
|
|
894
929
|
/**
|
|
@@ -947,6 +982,10 @@ export interface FirewallPolicyResponse {
|
|
|
947
982
|
* <p>The number of firewalls that are associated with this firewall policy.</p>
|
|
948
983
|
*/
|
|
949
984
|
NumberOfAssociations?: number;
|
|
985
|
+
/**
|
|
986
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall policy.</p>
|
|
987
|
+
*/
|
|
988
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
950
989
|
}
|
|
951
990
|
export declare namespace FirewallPolicyResponse {
|
|
952
991
|
/**
|
|
@@ -982,7 +1021,7 @@ export declare enum TargetType {
|
|
|
982
1021
|
/**
|
|
983
1022
|
* <p>Stateful inspection criteria for a domain list rule group. </p>
|
|
984
1023
|
* <p>For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.</p>
|
|
985
|
-
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in
|
|
1024
|
+
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
986
1025
|
*/
|
|
987
1026
|
export interface RulesSourceList {
|
|
988
1027
|
/**
|
|
@@ -1043,13 +1082,13 @@ export declare enum StatefulRuleProtocol {
|
|
|
1043
1082
|
UDP = "UDP"
|
|
1044
1083
|
}
|
|
1045
1084
|
/**
|
|
1046
|
-
* <p>The basic rule criteria for
|
|
1085
|
+
* <p>The basic rule criteria for Network Firewall to use to inspect packet headers in stateful
|
|
1047
1086
|
* traffic flow inspection. Traffic flows that match the criteria are a match for the
|
|
1048
1087
|
* corresponding <a>StatefulRule</a>. </p>
|
|
1049
1088
|
*/
|
|
1050
1089
|
export interface Header {
|
|
1051
1090
|
/**
|
|
1052
|
-
* <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on
|
|
1091
|
+
* <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on Amazon Web Services and on the internet is IP.</p>
|
|
1053
1092
|
*/
|
|
1054
1093
|
Protocol: StatefulRuleProtocol | string | undefined;
|
|
1055
1094
|
/**
|
|
@@ -1292,7 +1331,7 @@ export declare namespace MatchAttributes {
|
|
|
1292
1331
|
const filterSensitiveLog: (obj: MatchAttributes) => any;
|
|
1293
1332
|
}
|
|
1294
1333
|
/**
|
|
1295
|
-
* <p>The inspection criteria and action for a single stateless rule.
|
|
1334
|
+
* <p>The inspection criteria and action for a single stateless rule. Network Firewall inspects each packet for the specified matching
|
|
1296
1335
|
* criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on
|
|
1297
1336
|
* the packet.</p>
|
|
1298
1337
|
*/
|
|
@@ -1505,7 +1544,7 @@ export interface StatefulRuleOptions {
|
|
|
1505
1544
|
* <p>Indicates how to manage the order of the rule evaluation for the rule group. <code>DEFAULT_ACTION_ORDER</code> is
|
|
1506
1545
|
* the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
|
|
1507
1546
|
* based on certain settings. For more information, see
|
|
1508
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>
|
|
1547
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
|
|
1509
1548
|
* </p>
|
|
1510
1549
|
*/
|
|
1511
1550
|
RuleOrder?: RuleOrder | string;
|
|
@@ -1518,7 +1557,7 @@ export declare namespace StatefulRuleOptions {
|
|
|
1518
1557
|
}
|
|
1519
1558
|
/**
|
|
1520
1559
|
* <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
|
|
1521
|
-
* <p>
|
|
1560
|
+
* <p>Network Firewall uses a rule group to inspect and control network traffic.
|
|
1522
1561
|
* You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
|
|
1523
1562
|
* traffic flow. </p>
|
|
1524
1563
|
* <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
|
|
@@ -1638,6 +1677,10 @@ export interface CreateRuleGroupRequest {
|
|
|
1638
1677
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
1639
1678
|
*/
|
|
1640
1679
|
DryRun?: boolean;
|
|
1680
|
+
/**
|
|
1681
|
+
* <p>A complex type that contains settings for encryption of your rule group resources.</p>
|
|
1682
|
+
*/
|
|
1683
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1641
1684
|
}
|
|
1642
1685
|
export declare namespace CreateRuleGroupRequest {
|
|
1643
1686
|
/**
|
|
@@ -1699,6 +1742,10 @@ export interface RuleGroupResponse {
|
|
|
1699
1742
|
* <p>The number of firewall policies that use this rule group.</p>
|
|
1700
1743
|
*/
|
|
1701
1744
|
NumberOfAssociations?: number;
|
|
1745
|
+
/**
|
|
1746
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your rule group.</p>
|
|
1747
|
+
*/
|
|
1748
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1702
1749
|
}
|
|
1703
1750
|
export declare namespace RuleGroupResponse {
|
|
1704
1751
|
/**
|
|
@@ -1743,7 +1790,7 @@ export declare namespace DeleteFirewallRequest {
|
|
|
1743
1790
|
}
|
|
1744
1791
|
export interface DeleteFirewallResponse {
|
|
1745
1792
|
/**
|
|
1746
|
-
* <p>The firewall defines the configuration settings for an
|
|
1793
|
+
* <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
|
|
1747
1794
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
1748
1795
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
1749
1796
|
* objects by calling <a>DescribeFirewall</a>.</p>
|
|
@@ -1980,7 +2027,7 @@ export declare enum LogType {
|
|
|
1980
2027
|
FLOW = "FLOW"
|
|
1981
2028
|
}
|
|
1982
2029
|
/**
|
|
1983
|
-
* <p>Defines where
|
|
2030
|
+
* <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
|
|
1984
2031
|
* in <a>LoggingConfiguration</a>. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.</p>
|
|
1985
2032
|
* <p>Network Firewall generates logs for stateful rule groups. You can save alert and flow log
|
|
1986
2033
|
* types. The stateful rules engine records flow logs for all network traffic that it receives.
|
|
@@ -2042,7 +2089,7 @@ export declare namespace LogDestinationConfig {
|
|
|
2042
2089
|
const filterSensitiveLog: (obj: LogDestinationConfig) => any;
|
|
2043
2090
|
}
|
|
2044
2091
|
/**
|
|
2045
|
-
* <p>Defines how
|
|
2092
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2046
2093
|
*/
|
|
2047
2094
|
export interface LoggingConfiguration {
|
|
2048
2095
|
/**
|
|
@@ -2063,7 +2110,7 @@ export interface DescribeLoggingConfigurationResponse {
|
|
|
2063
2110
|
*/
|
|
2064
2111
|
FirewallArn?: string;
|
|
2065
2112
|
/**
|
|
2066
|
-
* <p>Defines how
|
|
2113
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2067
2114
|
*/
|
|
2068
2115
|
LoggingConfiguration?: LoggingConfiguration;
|
|
2069
2116
|
}
|
|
@@ -2087,7 +2134,7 @@ export declare namespace DescribeResourcePolicyRequest {
|
|
|
2087
2134
|
}
|
|
2088
2135
|
export interface DescribeResourcePolicyResponse {
|
|
2089
2136
|
/**
|
|
2090
|
-
* <p>The
|
|
2137
|
+
* <p>The IAM policy for the resource. </p>
|
|
2091
2138
|
*/
|
|
2092
2139
|
Policy?: string;
|
|
2093
2140
|
}
|
|
@@ -2131,7 +2178,7 @@ export interface DescribeRuleGroupResponse {
|
|
|
2131
2178
|
UpdateToken: string | undefined;
|
|
2132
2179
|
/**
|
|
2133
2180
|
* <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
|
|
2134
|
-
* <p>
|
|
2181
|
+
* <p>Network Firewall uses a rule group to inspect and control network traffic.
|
|
2135
2182
|
* You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
|
|
2136
2183
|
* traffic flow. </p>
|
|
2137
2184
|
* <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
|
|
@@ -2528,7 +2575,7 @@ export interface PutResourcePolicyRequest {
|
|
|
2528
2575
|
*/
|
|
2529
2576
|
ResourceArn: string | undefined;
|
|
2530
2577
|
/**
|
|
2531
|
-
* <p>The
|
|
2578
|
+
* <p>The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with
|
|
2532
2579
|
* and the operations that you want the accounts to be able to perform. </p>
|
|
2533
2580
|
* <p>For a rule group resource, you can specify the following operations in the Actions section of the statement:</p>
|
|
2534
2581
|
* <ul>
|
|
@@ -2748,6 +2795,58 @@ export declare namespace UpdateFirewallDescriptionResponse {
|
|
|
2748
2795
|
*/
|
|
2749
2796
|
const filterSensitiveLog: (obj: UpdateFirewallDescriptionResponse) => any;
|
|
2750
2797
|
}
|
|
2798
|
+
export interface UpdateFirewallEncryptionConfigurationRequest {
|
|
2799
|
+
/**
|
|
2800
|
+
* <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
|
|
2801
|
+
* <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
|
|
2802
|
+
* <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2803
|
+
*/
|
|
2804
|
+
UpdateToken?: string;
|
|
2805
|
+
/**
|
|
2806
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2807
|
+
*/
|
|
2808
|
+
FirewallArn?: string;
|
|
2809
|
+
/**
|
|
2810
|
+
* <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
|
|
2811
|
+
*/
|
|
2812
|
+
FirewallName?: string;
|
|
2813
|
+
/**
|
|
2814
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2815
|
+
*/
|
|
2816
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2817
|
+
}
|
|
2818
|
+
export declare namespace UpdateFirewallEncryptionConfigurationRequest {
|
|
2819
|
+
/**
|
|
2820
|
+
* @internal
|
|
2821
|
+
*/
|
|
2822
|
+
const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationRequest) => any;
|
|
2823
|
+
}
|
|
2824
|
+
export interface UpdateFirewallEncryptionConfigurationResponse {
|
|
2825
|
+
/**
|
|
2826
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2827
|
+
*/
|
|
2828
|
+
FirewallArn?: string;
|
|
2829
|
+
/**
|
|
2830
|
+
* <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
|
|
2831
|
+
*/
|
|
2832
|
+
FirewallName?: string;
|
|
2833
|
+
/**
|
|
2834
|
+
* <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
|
|
2835
|
+
* <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
|
|
2836
|
+
* <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2837
|
+
*/
|
|
2838
|
+
UpdateToken?: string;
|
|
2839
|
+
/**
|
|
2840
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2841
|
+
*/
|
|
2842
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2843
|
+
}
|
|
2844
|
+
export declare namespace UpdateFirewallEncryptionConfigurationResponse {
|
|
2845
|
+
/**
|
|
2846
|
+
* @internal
|
|
2847
|
+
*/
|
|
2848
|
+
const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationResponse) => any;
|
|
2849
|
+
}
|
|
2751
2850
|
export interface UpdateFirewallPolicyRequest {
|
|
2752
2851
|
/**
|
|
2753
2852
|
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the firewall policy. The token marks the state of the policy resource at the time of the request. </p>
|
|
@@ -2781,6 +2880,10 @@ export interface UpdateFirewallPolicyRequest {
|
|
|
2781
2880
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
2782
2881
|
*/
|
|
2783
2882
|
DryRun?: boolean;
|
|
2883
|
+
/**
|
|
2884
|
+
* <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
|
|
2885
|
+
*/
|
|
2886
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2784
2887
|
}
|
|
2785
2888
|
export declare namespace UpdateFirewallPolicyRequest {
|
|
2786
2889
|
/**
|
|
@@ -2896,7 +2999,7 @@ export interface UpdateLoggingConfigurationResponse {
|
|
|
2896
2999
|
*/
|
|
2897
3000
|
FirewallName?: string;
|
|
2898
3001
|
/**
|
|
2899
|
-
* <p>Defines how
|
|
3002
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2900
3003
|
*/
|
|
2901
3004
|
LoggingConfiguration?: LoggingConfiguration;
|
|
2902
3005
|
}
|
|
@@ -2960,6 +3063,10 @@ export interface UpdateRuleGroupRequest {
|
|
|
2960
3063
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
2961
3064
|
*/
|
|
2962
3065
|
DryRun?: boolean;
|
|
3066
|
+
/**
|
|
3067
|
+
* <p>A complex type that contains settings for encryption of your rule group resources.</p>
|
|
3068
|
+
*/
|
|
3069
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2963
3070
|
}
|
|
2964
3071
|
export declare namespace UpdateRuleGroupRequest {
|
|
2965
3072
|
/**
|
|
@@ -25,6 +25,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "../commands/T
|
|
|
25
25
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "../commands/UntagResourceCommand";
|
|
26
26
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "../commands/UpdateFirewallDeleteProtectionCommand";
|
|
27
27
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "../commands/UpdateFirewallDescriptionCommand";
|
|
28
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "../commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
28
29
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "../commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
29
30
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "../commands/UpdateFirewallPolicyCommand";
|
|
30
31
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "../commands/UpdateLoggingConfigurationCommand";
|
|
@@ -55,6 +56,7 @@ export declare const serializeAws_json1_0TagResourceCommand: (input: TagResource
|
|
|
55
56
|
export declare const serializeAws_json1_0UntagResourceCommand: (input: UntagResourceCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
56
57
|
export declare const serializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (input: UpdateFirewallDeleteProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
57
58
|
export declare const serializeAws_json1_0UpdateFirewallDescriptionCommand: (input: UpdateFirewallDescriptionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
59
|
+
export declare const serializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (input: UpdateFirewallEncryptionConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
58
60
|
export declare const serializeAws_json1_0UpdateFirewallPolicyCommand: (input: UpdateFirewallPolicyCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
59
61
|
export declare const serializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (input: UpdateFirewallPolicyChangeProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
60
62
|
export declare const serializeAws_json1_0UpdateLoggingConfigurationCommand: (input: UpdateLoggingConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
@@ -85,6 +87,7 @@ export declare const deserializeAws_json1_0TagResourceCommand: (output: __HttpRe
|
|
|
85
87
|
export declare const deserializeAws_json1_0UntagResourceCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UntagResourceCommandOutput>;
|
|
86
88
|
export declare const deserializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDeleteProtectionCommandOutput>;
|
|
87
89
|
export declare const deserializeAws_json1_0UpdateFirewallDescriptionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDescriptionCommandOutput>;
|
|
90
|
+
export declare const deserializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
88
91
|
export declare const deserializeAws_json1_0UpdateFirewallPolicyCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyCommandOutput>;
|
|
89
92
|
export declare const deserializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyChangeProtectionCommandOutput>;
|
|
90
93
|
export declare const deserializeAws_json1_0UpdateLoggingConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateLoggingConfigurationCommandOutput>;
|
|
@@ -24,6 +24,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
|
|
|
24
24
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
|
|
25
25
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
|
|
26
26
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
|
|
27
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
27
28
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
28
29
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
|
|
29
30
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
|
|
@@ -133,6 +134,10 @@ export declare class NetworkFirewall extends NetworkFirewallClient {
|
|
|
133
134
|
updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
|
|
134
135
|
updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
|
|
135
136
|
|
|
137
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
138
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
|
|
139
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
|
|
140
|
+
|
|
136
141
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallPolicyCommandOutput>;
|
|
137
142
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
|
|
138
143
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
|
|
@@ -31,13 +31,14 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
|
|
|
31
31
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
|
|
32
32
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
|
|
33
33
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
|
|
34
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
34
35
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
35
36
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
|
|
36
37
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
|
|
37
38
|
import { UpdateRuleGroupCommandInput, UpdateRuleGroupCommandOutput } from "./commands/UpdateRuleGroupCommand";
|
|
38
39
|
import { UpdateSubnetChangeProtectionCommandInput, UpdateSubnetChangeProtectionCommandOutput } from "./commands/UpdateSubnetChangeProtectionCommand";
|
|
39
|
-
export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
|
|
40
|
-
export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
|
|
40
|
+
export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallEncryptionConfigurationCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
|
|
41
|
+
export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallEncryptionConfigurationCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
|
|
41
42
|
export interface ClientDefaults extends Partial<__SmithyResolvedConfiguration<__HttpHandlerOptions>> {
|
|
42
43
|
|
|
43
44
|
requestHandler?: __HttpHandler;
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
2
|
+
import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types";
|
|
3
|
+
import { UpdateFirewallEncryptionConfigurationRequest, UpdateFirewallEncryptionConfigurationResponse } from "../models/models_0";
|
|
4
|
+
import { NetworkFirewallClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../NetworkFirewallClient";
|
|
5
|
+
export interface UpdateFirewallEncryptionConfigurationCommandInput extends UpdateFirewallEncryptionConfigurationRequest {
|
|
6
|
+
}
|
|
7
|
+
export interface UpdateFirewallEncryptionConfigurationCommandOutput extends UpdateFirewallEncryptionConfigurationResponse, __MetadataBearer {
|
|
8
|
+
}
|
|
9
|
+
|
|
10
|
+
export declare class UpdateFirewallEncryptionConfigurationCommand extends $Command<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput, NetworkFirewallClientResolvedConfig> {
|
|
11
|
+
readonly input: UpdateFirewallEncryptionConfigurationCommandInput;
|
|
12
|
+
constructor(input: UpdateFirewallEncryptionConfigurationCommandInput);
|
|
13
|
+
|
|
14
|
+
resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: NetworkFirewallClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
15
|
+
private serialize;
|
|
16
|
+
private deserialize;
|
|
17
|
+
}
|
|
@@ -23,6 +23,7 @@ export * from "./TagResourceCommand";
|
|
|
23
23
|
export * from "./UntagResourceCommand";
|
|
24
24
|
export * from "./UpdateFirewallDeleteProtectionCommand";
|
|
25
25
|
export * from "./UpdateFirewallDescriptionCommand";
|
|
26
|
+
export * from "./UpdateFirewallEncryptionConfigurationCommand";
|
|
26
27
|
export * from "./UpdateFirewallPolicyChangeProtectionCommand";
|
|
27
28
|
export * from "./UpdateFirewallPolicyCommand";
|
|
28
29
|
export * from "./UpdateLoggingConfigurationCommand";
|