@aws-sdk/client-network-firewall 3.76.0 → 3.80.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +7 -7
- package/dist-cjs/NetworkFirewall.js +15 -0
- package/dist-cjs/commands/UpdateFirewallEncryptionConfigurationCommand.js +36 -0
- package/dist-cjs/commands/index.js +1 -0
- package/dist-cjs/models/models_0.js +37 -3
- package/dist-cjs/pagination/ListFirewallPoliciesPaginator.js +2 -1
- package/dist-cjs/pagination/ListFirewallsPaginator.js +2 -1
- package/dist-cjs/pagination/ListRuleGroupsPaginator.js +2 -1
- package/dist-cjs/pagination/ListTagsForResourcePaginator.js +2 -1
- package/dist-cjs/protocols/Aws_json1_0.js +161 -2
- package/dist-es/NetworkFirewall.js +15 -0
- package/dist-es/commands/UpdateFirewallEncryptionConfigurationCommand.js +39 -0
- package/dist-es/commands/index.js +1 -0
- package/dist-es/models/models_0.js +26 -0
- package/dist-es/pagination/ListFirewallPoliciesPaginator.js +3 -2
- package/dist-es/pagination/ListFirewallsPaginator.js +3 -2
- package/dist-es/pagination/ListRuleGroupsPaginator.js +3 -2
- package/dist-es/pagination/ListTagsForResourcePaginator.js +3 -2
- package/dist-es/protocols/Aws_json1_0.js +169 -10
- package/dist-types/NetworkFirewall.d.ts +27 -20
- package/dist-types/NetworkFirewallClient.d.ts +10 -9
- package/dist-types/commands/AssociateSubnetsCommand.d.ts +1 -1
- package/dist-types/commands/CreateFirewallCommand.d.ts +3 -3
- package/dist-types/commands/CreateFirewallPolicyCommand.d.ts +1 -1
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -2
- package/dist-types/commands/PutResourcePolicyCommand.d.ts +2 -2
- package/dist-types/commands/TagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UntagResourceCommand.d.ts +2 -2
- package/dist-types/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +35 -0
- package/dist-types/commands/index.d.ts +1 -0
- package/dist-types/models/models_0.d.ts +193 -24
- package/dist-types/protocols/Aws_json1_0.d.ts +3 -0
- package/dist-types/ts3.4/NetworkFirewall.d.ts +5 -0
- package/dist-types/ts3.4/NetworkFirewallClient.d.ts +3 -2
- package/dist-types/ts3.4/commands/UpdateFirewallEncryptionConfigurationCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/index.d.ts +1 -0
- package/dist-types/ts3.4/models/models_0.d.ts +92 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +3 -0
- package/package.json +25 -25
|
@@ -5,7 +5,7 @@ import { NetworkFirewallServiceException as __BaseException } from "./NetworkFir
|
|
|
5
5
|
* <code>PublishMetrics</code>
|
|
6
6
|
* <a>CustomAction</a>. A CloudWatch custom metric dimension is a name/value pair that's
|
|
7
7
|
* part of the identity of a metric. </p>
|
|
8
|
-
* <p>
|
|
8
|
+
* <p>Network Firewall sets the dimension name to <code>CustomAction</code> and you provide the
|
|
9
9
|
* dimension value. </p>
|
|
10
10
|
* <p>For more information about CloudWatch custom metric dimensions, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/publishingMetrics.html#usingDimensions">Publishing Custom Metrics</a> in the <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html">Amazon CloudWatch User
|
|
11
11
|
* Guide</a>.</p>
|
|
@@ -228,7 +228,7 @@ export declare class ThrottlingException extends __BaseException {
|
|
|
228
228
|
}
|
|
229
229
|
/**
|
|
230
230
|
* <p>The ID for a subnet that you want to associate with the firewall. This is used with
|
|
231
|
-
* <a>CreateFirewall</a> and <a>AssociateSubnets</a>.
|
|
231
|
+
* <a>CreateFirewall</a> and <a>AssociateSubnets</a>. Network Firewall
|
|
232
232
|
* creates an instance of the associated firewall in each subnet that you specify, to filter
|
|
233
233
|
* traffic in the subnet's Availability Zone.</p>
|
|
234
234
|
*/
|
|
@@ -299,7 +299,7 @@ export declare namespace AssociateSubnetsResponse {
|
|
|
299
299
|
const filterSensitiveLog: (obj: AssociateSubnetsResponse) => any;
|
|
300
300
|
}
|
|
301
301
|
/**
|
|
302
|
-
* <p>
|
|
302
|
+
* <p>Amazon Web Services doesn't currently have enough available capacity to fulfill your request. Try your
|
|
303
303
|
* request later. </p>
|
|
304
304
|
*/
|
|
305
305
|
export declare class InsufficientCapacityException extends __BaseException {
|
|
@@ -319,7 +319,7 @@ export declare enum AttachmentStatus {
|
|
|
319
319
|
}
|
|
320
320
|
/**
|
|
321
321
|
* <p>The configuration and status for a single subnet that you've specified for use by the
|
|
322
|
-
*
|
|
322
|
+
* Network Firewall firewall. This is part of the <a>FirewallStatus</a>.</p>
|
|
323
323
|
*/
|
|
324
324
|
export interface Attachment {
|
|
325
325
|
/**
|
|
@@ -353,11 +353,34 @@ export declare enum ConfigurationSyncState {
|
|
|
353
353
|
IN_SYNC = "IN_SYNC",
|
|
354
354
|
PENDING = "PENDING"
|
|
355
355
|
}
|
|
356
|
+
export declare enum EncryptionType {
|
|
357
|
+
AWS_OWNED_KMS_KEY = "AWS_OWNED_KMS_KEY",
|
|
358
|
+
CUSTOMER_KMS = "CUSTOMER_KMS"
|
|
359
|
+
}
|
|
356
360
|
/**
|
|
357
|
-
* <p>A
|
|
361
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
362
|
+
*/
|
|
363
|
+
export interface EncryptionConfiguration {
|
|
364
|
+
/**
|
|
365
|
+
* <p>The ID of the Amazon Web Services Key Management Service (KMS) customer managed key. You can use any of the key identifiers that KMS supports, unless you're using a key that's managed by another account. If you're using a key managed by another account, then specify the key ARN. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id">Key ID</a> in the <i>Amazon Web Services KMS Developer Guide</i>.</p>
|
|
366
|
+
*/
|
|
367
|
+
KeyId?: string;
|
|
368
|
+
/**
|
|
369
|
+
* <p>The type of Amazon Web Services KMS key to use for encryption of your Network Firewall resources.</p>
|
|
370
|
+
*/
|
|
371
|
+
Type: EncryptionType | string | undefined;
|
|
372
|
+
}
|
|
373
|
+
export declare namespace EncryptionConfiguration {
|
|
374
|
+
/**
|
|
375
|
+
* @internal
|
|
376
|
+
*/
|
|
377
|
+
const filterSensitiveLog: (obj: EncryptionConfiguration) => any;
|
|
378
|
+
}
|
|
379
|
+
/**
|
|
380
|
+
* <p>A key:value pair associated with an Amazon Web Services resource. The key:value pair can be anything you
|
|
358
381
|
* define. Typically, the tag key represents a category (such as "environment") and the tag
|
|
359
382
|
* value represents a specific value within that category (such as "test," "development," or
|
|
360
|
-
* "production"). You can add up to 50 tags to each
|
|
383
|
+
* "production"). You can add up to 50 tags to each Amazon Web Services resource. </p>
|
|
361
384
|
*/
|
|
362
385
|
export interface Tag {
|
|
363
386
|
/**
|
|
@@ -425,6 +448,10 @@ export interface CreateFirewallRequest {
|
|
|
425
448
|
* <p>The key:value pairs to associate with the resource.</p>
|
|
426
449
|
*/
|
|
427
450
|
Tags?: Tag[];
|
|
451
|
+
/**
|
|
452
|
+
* <p>A complex type that contains settings for encryption of your firewall resources.</p>
|
|
453
|
+
*/
|
|
454
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
428
455
|
}
|
|
429
456
|
export declare namespace CreateFirewallRequest {
|
|
430
457
|
/**
|
|
@@ -433,7 +460,7 @@ export declare namespace CreateFirewallRequest {
|
|
|
433
460
|
const filterSensitiveLog: (obj: CreateFirewallRequest) => any;
|
|
434
461
|
}
|
|
435
462
|
/**
|
|
436
|
-
* <p>The firewall defines the configuration settings for an
|
|
463
|
+
* <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
|
|
437
464
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
438
465
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
439
466
|
* objects by calling <a>DescribeFirewall</a>.</p>
|
|
@@ -493,6 +520,10 @@ export interface Firewall {
|
|
|
493
520
|
* <p></p>
|
|
494
521
|
*/
|
|
495
522
|
Tags?: Tag[];
|
|
523
|
+
/**
|
|
524
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall.</p>
|
|
525
|
+
*/
|
|
526
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
496
527
|
}
|
|
497
528
|
export declare namespace Firewall {
|
|
498
529
|
/**
|
|
@@ -534,7 +565,7 @@ export declare namespace PerObjectStatus {
|
|
|
534
565
|
/**
|
|
535
566
|
* <p>The status of the firewall endpoint and firewall policy configuration for a single VPC
|
|
536
567
|
* subnet. </p>
|
|
537
|
-
* <p>For each VPC subnet that you associate with a firewall,
|
|
568
|
+
* <p>For each VPC subnet that you associate with a firewall, Network Firewall does the
|
|
538
569
|
* following: </p>
|
|
539
570
|
* <ul>
|
|
540
571
|
* <li>
|
|
@@ -655,7 +686,7 @@ export interface StatefulEngineOptions {
|
|
|
655
686
|
* <p>Indicates how to manage the order of stateful rule evaluation for the policy. <code>DEFAULT_ACTION_ORDER</code> is
|
|
656
687
|
* the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
|
|
657
688
|
* based on certain settings. For more information, see
|
|
658
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>
|
|
689
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
|
|
659
690
|
* </p>
|
|
660
691
|
*/
|
|
661
692
|
RuleOrder?: RuleOrder | string;
|
|
@@ -847,7 +878,7 @@ export interface FirewallPolicy {
|
|
|
847
878
|
* </li>
|
|
848
879
|
* </ul>
|
|
849
880
|
* <p>For more information, see
|
|
850
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>
|
|
881
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html">Strict evaluation order</a> in the <i>Network Firewall Developer Guide</i>.
|
|
851
882
|
* </p>
|
|
852
883
|
*/
|
|
853
884
|
StatefulDefaultActions?: string[];
|
|
@@ -889,6 +920,10 @@ export interface CreateFirewallPolicyRequest {
|
|
|
889
920
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
890
921
|
*/
|
|
891
922
|
DryRun?: boolean;
|
|
923
|
+
/**
|
|
924
|
+
* <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
|
|
925
|
+
*/
|
|
926
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
892
927
|
}
|
|
893
928
|
export declare namespace CreateFirewallPolicyRequest {
|
|
894
929
|
/**
|
|
@@ -947,6 +982,14 @@ export interface FirewallPolicyResponse {
|
|
|
947
982
|
* <p>The number of firewalls that are associated with this firewall policy.</p>
|
|
948
983
|
*/
|
|
949
984
|
NumberOfAssociations?: number;
|
|
985
|
+
/**
|
|
986
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall policy.</p>
|
|
987
|
+
*/
|
|
988
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
989
|
+
/**
|
|
990
|
+
* <p>The last time that the firewall policy was changed.</p>
|
|
991
|
+
*/
|
|
992
|
+
LastModifiedTime?: Date;
|
|
950
993
|
}
|
|
951
994
|
export declare namespace FirewallPolicyResponse {
|
|
952
995
|
/**
|
|
@@ -982,7 +1025,7 @@ export declare enum TargetType {
|
|
|
982
1025
|
/**
|
|
983
1026
|
* <p>Stateful inspection criteria for a domain list rule group. </p>
|
|
984
1027
|
* <p>For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.</p>
|
|
985
|
-
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in
|
|
1028
|
+
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
986
1029
|
*/
|
|
987
1030
|
export interface RulesSourceList {
|
|
988
1031
|
/**
|
|
@@ -1043,13 +1086,13 @@ export declare enum StatefulRuleProtocol {
|
|
|
1043
1086
|
UDP = "UDP"
|
|
1044
1087
|
}
|
|
1045
1088
|
/**
|
|
1046
|
-
* <p>The basic rule criteria for
|
|
1089
|
+
* <p>The basic rule criteria for Network Firewall to use to inspect packet headers in stateful
|
|
1047
1090
|
* traffic flow inspection. Traffic flows that match the criteria are a match for the
|
|
1048
1091
|
* corresponding <a>StatefulRule</a>. </p>
|
|
1049
1092
|
*/
|
|
1050
1093
|
export interface Header {
|
|
1051
1094
|
/**
|
|
1052
|
-
* <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on
|
|
1095
|
+
* <p>The protocol to inspect for. To specify all, you can use <code>IP</code>, because all traffic on Amazon Web Services and on the internet is IP.</p>
|
|
1053
1096
|
*/
|
|
1054
1097
|
Protocol: StatefulRuleProtocol | string | undefined;
|
|
1055
1098
|
/**
|
|
@@ -1292,7 +1335,7 @@ export declare namespace MatchAttributes {
|
|
|
1292
1335
|
const filterSensitiveLog: (obj: MatchAttributes) => any;
|
|
1293
1336
|
}
|
|
1294
1337
|
/**
|
|
1295
|
-
* <p>The inspection criteria and action for a single stateless rule.
|
|
1338
|
+
* <p>The inspection criteria and action for a single stateless rule. Network Firewall inspects each packet for the specified matching
|
|
1296
1339
|
* criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on
|
|
1297
1340
|
* the packet.</p>
|
|
1298
1341
|
*/
|
|
@@ -1505,7 +1548,7 @@ export interface StatefulRuleOptions {
|
|
|
1505
1548
|
* <p>Indicates how to manage the order of the rule evaluation for the rule group. <code>DEFAULT_ACTION_ORDER</code> is
|
|
1506
1549
|
* the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them
|
|
1507
1550
|
* based on certain settings. For more information, see
|
|
1508
|
-
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>
|
|
1551
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html">Evaluation order for stateful rules</a> in the <i>Network Firewall Developer Guide</i>.
|
|
1509
1552
|
* </p>
|
|
1510
1553
|
*/
|
|
1511
1554
|
RuleOrder?: RuleOrder | string;
|
|
@@ -1518,7 +1561,7 @@ export declare namespace StatefulRuleOptions {
|
|
|
1518
1561
|
}
|
|
1519
1562
|
/**
|
|
1520
1563
|
* <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
|
|
1521
|
-
* <p>
|
|
1564
|
+
* <p>Network Firewall uses a rule group to inspect and control network traffic.
|
|
1522
1565
|
* You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
|
|
1523
1566
|
* traffic flow. </p>
|
|
1524
1567
|
* <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
|
|
@@ -1546,6 +1589,25 @@ export declare namespace RuleGroup {
|
|
|
1546
1589
|
*/
|
|
1547
1590
|
const filterSensitiveLog: (obj: RuleGroup) => any;
|
|
1548
1591
|
}
|
|
1592
|
+
/**
|
|
1593
|
+
* <p>High-level information about the managed rule group that your own rule group is copied from. You can use the the metadata to track version updates made to the originating rule group. You can retrieve all objects for a rule group by calling <a href="https://docs.aws.amazon.com/network-firewall/latest/APIReference/API_DescribeRuleGroup.html">DescribeRuleGroup</a>.</p>
|
|
1594
|
+
*/
|
|
1595
|
+
export interface SourceMetadata {
|
|
1596
|
+
/**
|
|
1597
|
+
* <p>The Amazon Resource Name (ARN) of the rule group that your own rule group is copied from.</p>
|
|
1598
|
+
*/
|
|
1599
|
+
SourceArn?: string;
|
|
1600
|
+
/**
|
|
1601
|
+
* <p>The update token of the Amazon Web Services managed rule group that your own rule group is copied from. To determine the update token for the managed rule group, call <a href="https://docs.aws.amazon.com/network-firewall/latest/APIReference/API_DescribeRuleGroup.html#networkfirewall-DescribeRuleGroup-response-UpdateToken">DescribeRuleGroup</a>.</p>
|
|
1602
|
+
*/
|
|
1603
|
+
SourceUpdateToken?: string;
|
|
1604
|
+
}
|
|
1605
|
+
export declare namespace SourceMetadata {
|
|
1606
|
+
/**
|
|
1607
|
+
* @internal
|
|
1608
|
+
*/
|
|
1609
|
+
const filterSensitiveLog: (obj: SourceMetadata) => any;
|
|
1610
|
+
}
|
|
1549
1611
|
export declare enum RuleGroupType {
|
|
1550
1612
|
STATEFUL = "STATEFUL",
|
|
1551
1613
|
STATELESS = "STATELESS"
|
|
@@ -1638,6 +1700,14 @@ export interface CreateRuleGroupRequest {
|
|
|
1638
1700
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
1639
1701
|
*/
|
|
1640
1702
|
DryRun?: boolean;
|
|
1703
|
+
/**
|
|
1704
|
+
* <p>A complex type that contains settings for encryption of your rule group resources.</p>
|
|
1705
|
+
*/
|
|
1706
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1707
|
+
/**
|
|
1708
|
+
* <p>A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.</p>
|
|
1709
|
+
*/
|
|
1710
|
+
SourceMetadata?: SourceMetadata;
|
|
1641
1711
|
}
|
|
1642
1712
|
export declare namespace CreateRuleGroupRequest {
|
|
1643
1713
|
/**
|
|
@@ -1699,6 +1769,25 @@ export interface RuleGroupResponse {
|
|
|
1699
1769
|
* <p>The number of firewall policies that use this rule group.</p>
|
|
1700
1770
|
*/
|
|
1701
1771
|
NumberOfAssociations?: number;
|
|
1772
|
+
/**
|
|
1773
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your rule group.</p>
|
|
1774
|
+
*/
|
|
1775
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1776
|
+
/**
|
|
1777
|
+
* <p>A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to track the version updates made to the originating rule group.</p>
|
|
1778
|
+
*/
|
|
1779
|
+
SourceMetadata?: SourceMetadata;
|
|
1780
|
+
/**
|
|
1781
|
+
* <p>The Amazon resource name (ARN) of the Amazon Simple Notification Service SNS topic that's
|
|
1782
|
+
* used to record changes to the managed rule group. You can subscribe to the SNS topic to receive
|
|
1783
|
+
* notifications when the managed rule group is modified, such as for new versions and for version
|
|
1784
|
+
* expiration. For more information, see the <a href="https://docs.aws.amazon.com/sns/latest/dg/welcome.html">Amazon Simple Notification Service Developer Guide.</a>.</p>
|
|
1785
|
+
*/
|
|
1786
|
+
SnsTopic?: string;
|
|
1787
|
+
/**
|
|
1788
|
+
* <p>The last time that the rule group was changed.</p>
|
|
1789
|
+
*/
|
|
1790
|
+
LastModifiedTime?: Date;
|
|
1702
1791
|
}
|
|
1703
1792
|
export declare namespace RuleGroupResponse {
|
|
1704
1793
|
/**
|
|
@@ -1743,7 +1832,7 @@ export declare namespace DeleteFirewallRequest {
|
|
|
1743
1832
|
}
|
|
1744
1833
|
export interface DeleteFirewallResponse {
|
|
1745
1834
|
/**
|
|
1746
|
-
* <p>The firewall defines the configuration settings for an
|
|
1835
|
+
* <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
|
|
1747
1836
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
1748
1837
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
1749
1838
|
* objects by calling <a>DescribeFirewall</a>.</p>
|
|
@@ -1980,7 +2069,7 @@ export declare enum LogType {
|
|
|
1980
2069
|
FLOW = "FLOW"
|
|
1981
2070
|
}
|
|
1982
2071
|
/**
|
|
1983
|
-
* <p>Defines where
|
|
2072
|
+
* <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
|
|
1984
2073
|
* in <a>LoggingConfiguration</a>. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.</p>
|
|
1985
2074
|
* <p>Network Firewall generates logs for stateful rule groups. You can save alert and flow log
|
|
1986
2075
|
* types. The stateful rules engine records flow logs for all network traffic that it receives.
|
|
@@ -2042,7 +2131,7 @@ export declare namespace LogDestinationConfig {
|
|
|
2042
2131
|
const filterSensitiveLog: (obj: LogDestinationConfig) => any;
|
|
2043
2132
|
}
|
|
2044
2133
|
/**
|
|
2045
|
-
* <p>Defines how
|
|
2134
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2046
2135
|
*/
|
|
2047
2136
|
export interface LoggingConfiguration {
|
|
2048
2137
|
/**
|
|
@@ -2063,7 +2152,7 @@ export interface DescribeLoggingConfigurationResponse {
|
|
|
2063
2152
|
*/
|
|
2064
2153
|
FirewallArn?: string;
|
|
2065
2154
|
/**
|
|
2066
|
-
* <p>Defines how
|
|
2155
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2067
2156
|
*/
|
|
2068
2157
|
LoggingConfiguration?: LoggingConfiguration;
|
|
2069
2158
|
}
|
|
@@ -2087,7 +2176,7 @@ export declare namespace DescribeResourcePolicyRequest {
|
|
|
2087
2176
|
}
|
|
2088
2177
|
export interface DescribeResourcePolicyResponse {
|
|
2089
2178
|
/**
|
|
2090
|
-
* <p>The
|
|
2179
|
+
* <p>The IAM policy for the resource. </p>
|
|
2091
2180
|
*/
|
|
2092
2181
|
Policy?: string;
|
|
2093
2182
|
}
|
|
@@ -2131,7 +2220,7 @@ export interface DescribeRuleGroupResponse {
|
|
|
2131
2220
|
UpdateToken: string | undefined;
|
|
2132
2221
|
/**
|
|
2133
2222
|
* <p>The object that defines the rules in a rule group. This, along with <a>RuleGroupResponse</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>
|
|
2134
|
-
* <p>
|
|
2223
|
+
* <p>Network Firewall uses a rule group to inspect and control network traffic.
|
|
2135
2224
|
* You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their
|
|
2136
2225
|
* traffic flow. </p>
|
|
2137
2226
|
* <p>To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from
|
|
@@ -2211,6 +2300,10 @@ export interface DescribeRuleGroupMetadataResponse {
|
|
|
2211
2300
|
* <p>Additional options governing how Network Firewall handles the rule group. You can only use these for stateful rule groups.</p>
|
|
2212
2301
|
*/
|
|
2213
2302
|
StatefulRuleOptions?: StatefulRuleOptions;
|
|
2303
|
+
/**
|
|
2304
|
+
* <p>The last time that the rule group was changed.</p>
|
|
2305
|
+
*/
|
|
2306
|
+
LastModifiedTime?: Date;
|
|
2214
2307
|
}
|
|
2215
2308
|
export declare namespace DescribeRuleGroupMetadataResponse {
|
|
2216
2309
|
/**
|
|
@@ -2398,6 +2491,10 @@ export declare namespace ListFirewallsResponse {
|
|
|
2398
2491
|
*/
|
|
2399
2492
|
const filterSensitiveLog: (obj: ListFirewallsResponse) => any;
|
|
2400
2493
|
}
|
|
2494
|
+
export declare enum ResourceManagedType {
|
|
2495
|
+
AWS_MANAGED_DOMAIN_LISTS = "AWS_MANAGED_DOMAIN_LISTS",
|
|
2496
|
+
AWS_MANAGED_THREAT_SIGNATURES = "AWS_MANAGED_THREAT_SIGNATURES"
|
|
2497
|
+
}
|
|
2401
2498
|
export declare enum ResourceManagedStatus {
|
|
2402
2499
|
ACCOUNT = "ACCOUNT",
|
|
2403
2500
|
MANAGED = "MANAGED"
|
|
@@ -2421,6 +2518,14 @@ export interface ListRuleGroupsRequest {
|
|
|
2421
2518
|
* <code>MANAGED</code> returns all available managed rule groups.</p>
|
|
2422
2519
|
*/
|
|
2423
2520
|
Scope?: ResourceManagedStatus | string;
|
|
2521
|
+
/**
|
|
2522
|
+
* <p>Indicates the general category of the Amazon Web Services managed rule group.</p>
|
|
2523
|
+
*/
|
|
2524
|
+
ManagedType?: ResourceManagedType | string;
|
|
2525
|
+
/**
|
|
2526
|
+
* <p>Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.</p>
|
|
2527
|
+
*/
|
|
2528
|
+
Type?: RuleGroupType | string;
|
|
2424
2529
|
}
|
|
2425
2530
|
export declare namespace ListRuleGroupsRequest {
|
|
2426
2531
|
/**
|
|
@@ -2528,7 +2633,7 @@ export interface PutResourcePolicyRequest {
|
|
|
2528
2633
|
*/
|
|
2529
2634
|
ResourceArn: string | undefined;
|
|
2530
2635
|
/**
|
|
2531
|
-
* <p>The
|
|
2636
|
+
* <p>The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with
|
|
2532
2637
|
* and the operations that you want the accounts to be able to perform. </p>
|
|
2533
2638
|
* <p>For a rule group resource, you can specify the following operations in the Actions section of the statement:</p>
|
|
2534
2639
|
* <ul>
|
|
@@ -2748,6 +2853,58 @@ export declare namespace UpdateFirewallDescriptionResponse {
|
|
|
2748
2853
|
*/
|
|
2749
2854
|
const filterSensitiveLog: (obj: UpdateFirewallDescriptionResponse) => any;
|
|
2750
2855
|
}
|
|
2856
|
+
export interface UpdateFirewallEncryptionConfigurationRequest {
|
|
2857
|
+
/**
|
|
2858
|
+
* <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
|
|
2859
|
+
* <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
|
|
2860
|
+
* <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2861
|
+
*/
|
|
2862
|
+
UpdateToken?: string;
|
|
2863
|
+
/**
|
|
2864
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2865
|
+
*/
|
|
2866
|
+
FirewallArn?: string;
|
|
2867
|
+
/**
|
|
2868
|
+
* <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
|
|
2869
|
+
*/
|
|
2870
|
+
FirewallName?: string;
|
|
2871
|
+
/**
|
|
2872
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2873
|
+
*/
|
|
2874
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2875
|
+
}
|
|
2876
|
+
export declare namespace UpdateFirewallEncryptionConfigurationRequest {
|
|
2877
|
+
/**
|
|
2878
|
+
* @internal
|
|
2879
|
+
*/
|
|
2880
|
+
const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationRequest) => any;
|
|
2881
|
+
}
|
|
2882
|
+
export interface UpdateFirewallEncryptionConfigurationResponse {
|
|
2883
|
+
/**
|
|
2884
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2885
|
+
*/
|
|
2886
|
+
FirewallArn?: string;
|
|
2887
|
+
/**
|
|
2888
|
+
* <p>The descriptive name of the firewall. You can't change the name of a firewall after you create it.</p>
|
|
2889
|
+
*/
|
|
2890
|
+
FirewallName?: string;
|
|
2891
|
+
/**
|
|
2892
|
+
* <p>An optional token that you can use for optimistic locking. Network Firewall returns a token to your requests that access the firewall. The token marks the state of the firewall resource at the time of the request. </p>
|
|
2893
|
+
* <p>To make an unconditional change to the firewall, omit the token in your update request. Without the token, Network Firewall performs your updates regardless of whether the firewall has changed since you last retrieved it.</p>
|
|
2894
|
+
* <p>To make a conditional change to the firewall, provide the token in your update request. Network Firewall uses the token to ensure that the firewall hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the firewall again to get a current copy of it with a new token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2895
|
+
*/
|
|
2896
|
+
UpdateToken?: string;
|
|
2897
|
+
/**
|
|
2898
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2899
|
+
*/
|
|
2900
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2901
|
+
}
|
|
2902
|
+
export declare namespace UpdateFirewallEncryptionConfigurationResponse {
|
|
2903
|
+
/**
|
|
2904
|
+
* @internal
|
|
2905
|
+
*/
|
|
2906
|
+
const filterSensitiveLog: (obj: UpdateFirewallEncryptionConfigurationResponse) => any;
|
|
2907
|
+
}
|
|
2751
2908
|
export interface UpdateFirewallPolicyRequest {
|
|
2752
2909
|
/**
|
|
2753
2910
|
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the firewall policy. The token marks the state of the policy resource at the time of the request. </p>
|
|
@@ -2781,6 +2938,10 @@ export interface UpdateFirewallPolicyRequest {
|
|
|
2781
2938
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
2782
2939
|
*/
|
|
2783
2940
|
DryRun?: boolean;
|
|
2941
|
+
/**
|
|
2942
|
+
* <p>A complex type that contains settings for encryption of your firewall policy resources.</p>
|
|
2943
|
+
*/
|
|
2944
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2784
2945
|
}
|
|
2785
2946
|
export declare namespace UpdateFirewallPolicyRequest {
|
|
2786
2947
|
/**
|
|
@@ -2896,7 +3057,7 @@ export interface UpdateLoggingConfigurationResponse {
|
|
|
2896
3057
|
*/
|
|
2897
3058
|
FirewallName?: string;
|
|
2898
3059
|
/**
|
|
2899
|
-
* <p>Defines how
|
|
3060
|
+
* <p>Defines how Network Firewall performs logging for a <a>Firewall</a>. </p>
|
|
2900
3061
|
*/
|
|
2901
3062
|
LoggingConfiguration?: LoggingConfiguration;
|
|
2902
3063
|
}
|
|
@@ -2960,6 +3121,14 @@ export interface UpdateRuleGroupRequest {
|
|
|
2960
3121
|
* <p>If set to <code>FALSE</code>, Network Firewall makes the requested changes to your resources. </p>
|
|
2961
3122
|
*/
|
|
2962
3123
|
DryRun?: boolean;
|
|
3124
|
+
/**
|
|
3125
|
+
* <p>A complex type that contains settings for encryption of your rule group resources.</p>
|
|
3126
|
+
*/
|
|
3127
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
3128
|
+
/**
|
|
3129
|
+
* <p>A complex type that contains metadata about the rule group that your own rule group is copied from. You can use the metadata to keep track of updates made to the originating rule group.</p>
|
|
3130
|
+
*/
|
|
3131
|
+
SourceMetadata?: SourceMetadata;
|
|
2963
3132
|
}
|
|
2964
3133
|
export declare namespace UpdateRuleGroupRequest {
|
|
2965
3134
|
/**
|
|
@@ -25,6 +25,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "../commands/T
|
|
|
25
25
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "../commands/UntagResourceCommand";
|
|
26
26
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "../commands/UpdateFirewallDeleteProtectionCommand";
|
|
27
27
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "../commands/UpdateFirewallDescriptionCommand";
|
|
28
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "../commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
28
29
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "../commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
29
30
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "../commands/UpdateFirewallPolicyCommand";
|
|
30
31
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "../commands/UpdateLoggingConfigurationCommand";
|
|
@@ -55,6 +56,7 @@ export declare const serializeAws_json1_0TagResourceCommand: (input: TagResource
|
|
|
55
56
|
export declare const serializeAws_json1_0UntagResourceCommand: (input: UntagResourceCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
56
57
|
export declare const serializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (input: UpdateFirewallDeleteProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
57
58
|
export declare const serializeAws_json1_0UpdateFirewallDescriptionCommand: (input: UpdateFirewallDescriptionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
59
|
+
export declare const serializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (input: UpdateFirewallEncryptionConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
58
60
|
export declare const serializeAws_json1_0UpdateFirewallPolicyCommand: (input: UpdateFirewallPolicyCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
59
61
|
export declare const serializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (input: UpdateFirewallPolicyChangeProtectionCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
60
62
|
export declare const serializeAws_json1_0UpdateLoggingConfigurationCommand: (input: UpdateLoggingConfigurationCommandInput, context: __SerdeContext) => Promise<__HttpRequest>;
|
|
@@ -85,6 +87,7 @@ export declare const deserializeAws_json1_0TagResourceCommand: (output: __HttpRe
|
|
|
85
87
|
export declare const deserializeAws_json1_0UntagResourceCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UntagResourceCommandOutput>;
|
|
86
88
|
export declare const deserializeAws_json1_0UpdateFirewallDeleteProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDeleteProtectionCommandOutput>;
|
|
87
89
|
export declare const deserializeAws_json1_0UpdateFirewallDescriptionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallDescriptionCommandOutput>;
|
|
90
|
+
export declare const deserializeAws_json1_0UpdateFirewallEncryptionConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
88
91
|
export declare const deserializeAws_json1_0UpdateFirewallPolicyCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyCommandOutput>;
|
|
89
92
|
export declare const deserializeAws_json1_0UpdateFirewallPolicyChangeProtectionCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateFirewallPolicyChangeProtectionCommandOutput>;
|
|
90
93
|
export declare const deserializeAws_json1_0UpdateLoggingConfigurationCommand: (output: __HttpResponse, context: __SerdeContext) => Promise<UpdateLoggingConfigurationCommandOutput>;
|
|
@@ -24,6 +24,7 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
|
|
|
24
24
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
|
|
25
25
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
|
|
26
26
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
|
|
27
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
27
28
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
28
29
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
|
|
29
30
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
|
|
@@ -133,6 +134,10 @@ export declare class NetworkFirewall extends NetworkFirewallClient {
|
|
|
133
134
|
updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
|
|
134
135
|
updateFirewallDescription(args: UpdateFirewallDescriptionCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallDescriptionCommandOutput) => void): void;
|
|
135
136
|
|
|
137
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
138
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
|
|
139
|
+
updateFirewallEncryptionConfiguration(args: UpdateFirewallEncryptionConfigurationCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallEncryptionConfigurationCommandOutput) => void): void;
|
|
140
|
+
|
|
136
141
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options?: __HttpHandlerOptions): Promise<UpdateFirewallPolicyCommandOutput>;
|
|
137
142
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
|
|
138
143
|
updateFirewallPolicy(args: UpdateFirewallPolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateFirewallPolicyCommandOutput) => void): void;
|
|
@@ -31,13 +31,14 @@ import { TagResourceCommandInput, TagResourceCommandOutput } from "./commands/Ta
|
|
|
31
31
|
import { UntagResourceCommandInput, UntagResourceCommandOutput } from "./commands/UntagResourceCommand";
|
|
32
32
|
import { UpdateFirewallDeleteProtectionCommandInput, UpdateFirewallDeleteProtectionCommandOutput } from "./commands/UpdateFirewallDeleteProtectionCommand";
|
|
33
33
|
import { UpdateFirewallDescriptionCommandInput, UpdateFirewallDescriptionCommandOutput } from "./commands/UpdateFirewallDescriptionCommand";
|
|
34
|
+
import { UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput } from "./commands/UpdateFirewallEncryptionConfigurationCommand";
|
|
34
35
|
import { UpdateFirewallPolicyChangeProtectionCommandInput, UpdateFirewallPolicyChangeProtectionCommandOutput } from "./commands/UpdateFirewallPolicyChangeProtectionCommand";
|
|
35
36
|
import { UpdateFirewallPolicyCommandInput, UpdateFirewallPolicyCommandOutput } from "./commands/UpdateFirewallPolicyCommand";
|
|
36
37
|
import { UpdateLoggingConfigurationCommandInput, UpdateLoggingConfigurationCommandOutput } from "./commands/UpdateLoggingConfigurationCommand";
|
|
37
38
|
import { UpdateRuleGroupCommandInput, UpdateRuleGroupCommandOutput } from "./commands/UpdateRuleGroupCommand";
|
|
38
39
|
import { UpdateSubnetChangeProtectionCommandInput, UpdateSubnetChangeProtectionCommandOutput } from "./commands/UpdateSubnetChangeProtectionCommand";
|
|
39
|
-
export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
|
|
40
|
-
export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
|
|
40
|
+
export declare type ServiceInputTypes = AssociateFirewallPolicyCommandInput | AssociateSubnetsCommandInput | CreateFirewallCommandInput | CreateFirewallPolicyCommandInput | CreateRuleGroupCommandInput | DeleteFirewallCommandInput | DeleteFirewallPolicyCommandInput | DeleteResourcePolicyCommandInput | DeleteRuleGroupCommandInput | DescribeFirewallCommandInput | DescribeFirewallPolicyCommandInput | DescribeLoggingConfigurationCommandInput | DescribeResourcePolicyCommandInput | DescribeRuleGroupCommandInput | DescribeRuleGroupMetadataCommandInput | DisassociateSubnetsCommandInput | ListFirewallPoliciesCommandInput | ListFirewallsCommandInput | ListRuleGroupsCommandInput | ListTagsForResourceCommandInput | PutResourcePolicyCommandInput | TagResourceCommandInput | UntagResourceCommandInput | UpdateFirewallDeleteProtectionCommandInput | UpdateFirewallDescriptionCommandInput | UpdateFirewallEncryptionConfigurationCommandInput | UpdateFirewallPolicyChangeProtectionCommandInput | UpdateFirewallPolicyCommandInput | UpdateLoggingConfigurationCommandInput | UpdateRuleGroupCommandInput | UpdateSubnetChangeProtectionCommandInput;
|
|
41
|
+
export declare type ServiceOutputTypes = AssociateFirewallPolicyCommandOutput | AssociateSubnetsCommandOutput | CreateFirewallCommandOutput | CreateFirewallPolicyCommandOutput | CreateRuleGroupCommandOutput | DeleteFirewallCommandOutput | DeleteFirewallPolicyCommandOutput | DeleteResourcePolicyCommandOutput | DeleteRuleGroupCommandOutput | DescribeFirewallCommandOutput | DescribeFirewallPolicyCommandOutput | DescribeLoggingConfigurationCommandOutput | DescribeResourcePolicyCommandOutput | DescribeRuleGroupCommandOutput | DescribeRuleGroupMetadataCommandOutput | DisassociateSubnetsCommandOutput | ListFirewallPoliciesCommandOutput | ListFirewallsCommandOutput | ListRuleGroupsCommandOutput | ListTagsForResourceCommandOutput | PutResourcePolicyCommandOutput | TagResourceCommandOutput | UntagResourceCommandOutput | UpdateFirewallDeleteProtectionCommandOutput | UpdateFirewallDescriptionCommandOutput | UpdateFirewallEncryptionConfigurationCommandOutput | UpdateFirewallPolicyChangeProtectionCommandOutput | UpdateFirewallPolicyCommandOutput | UpdateLoggingConfigurationCommandOutput | UpdateRuleGroupCommandOutput | UpdateSubnetChangeProtectionCommandOutput;
|
|
41
42
|
export interface ClientDefaults extends Partial<__SmithyResolvedConfiguration<__HttpHandlerOptions>> {
|
|
42
43
|
|
|
43
44
|
requestHandler?: __HttpHandler;
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { Command as $Command } from "@aws-sdk/smithy-client";
|
|
2
|
+
import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@aws-sdk/types";
|
|
3
|
+
import { UpdateFirewallEncryptionConfigurationRequest, UpdateFirewallEncryptionConfigurationResponse } from "../models/models_0";
|
|
4
|
+
import { NetworkFirewallClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../NetworkFirewallClient";
|
|
5
|
+
export interface UpdateFirewallEncryptionConfigurationCommandInput extends UpdateFirewallEncryptionConfigurationRequest {
|
|
6
|
+
}
|
|
7
|
+
export interface UpdateFirewallEncryptionConfigurationCommandOutput extends UpdateFirewallEncryptionConfigurationResponse, __MetadataBearer {
|
|
8
|
+
}
|
|
9
|
+
|
|
10
|
+
export declare class UpdateFirewallEncryptionConfigurationCommand extends $Command<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput, NetworkFirewallClientResolvedConfig> {
|
|
11
|
+
readonly input: UpdateFirewallEncryptionConfigurationCommandInput;
|
|
12
|
+
constructor(input: UpdateFirewallEncryptionConfigurationCommandInput);
|
|
13
|
+
|
|
14
|
+
resolveMiddleware(clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>, configuration: NetworkFirewallClientResolvedConfig, options?: __HttpHandlerOptions): Handler<UpdateFirewallEncryptionConfigurationCommandInput, UpdateFirewallEncryptionConfigurationCommandOutput>;
|
|
15
|
+
private serialize;
|
|
16
|
+
private deserialize;
|
|
17
|
+
}
|
|
@@ -23,6 +23,7 @@ export * from "./TagResourceCommand";
|
|
|
23
23
|
export * from "./UntagResourceCommand";
|
|
24
24
|
export * from "./UpdateFirewallDeleteProtectionCommand";
|
|
25
25
|
export * from "./UpdateFirewallDescriptionCommand";
|
|
26
|
+
export * from "./UpdateFirewallEncryptionConfigurationCommand";
|
|
26
27
|
export * from "./UpdateFirewallPolicyChangeProtectionCommand";
|
|
27
28
|
export * from "./UpdateFirewallPolicyCommand";
|
|
28
29
|
export * from "./UpdateLoggingConfigurationCommand";
|