@propulsionworks/cloudformation 0.1.19 → 0.1.21
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/exports/resources.generated/aws-appconfig-configurationprofile.d.ts +3 -3
- package/out/exports/resources.generated/aws-appconfig-deployment.d.ts +5 -0
- package/out/exports/resources.generated/aws-arcregionswitch-plan.d.ts +848 -0
- package/out/exports/resources.generated/aws-athena-datacatalog.d.ts +15 -6
- package/out/exports/resources.generated/aws-athena-workgroup.d.ts +3 -3
- package/out/exports/resources.generated/aws-batch-jobqueue.d.ts +79 -1
- package/out/exports/resources.generated/aws-batch-serviceenvironment.d.ts +66 -0
- package/out/exports/resources.generated/aws-cassandra-table.d.ts +1 -1
- package/out/exports/resources.generated/aws-cloudfront-distribution.d.ts +10 -2
- package/out/exports/resources.generated/aws-codebuild-project.d.ts +17 -0
- package/out/exports/resources.generated/aws-cognito-managedloginbranding.d.ts +7 -0
- package/out/exports/resources.generated/aws-datazone-environmentblueprintconfiguration.d.ts +4 -0
- package/out/exports/resources.generated/aws-datazone-project.d.ts +9 -2
- package/out/exports/resources.generated/aws-datazone-projectprofile.d.ts +26 -2
- package/out/exports/resources.generated/aws-deadline-fleet.d.ts +13 -0
- package/out/exports/resources.generated/aws-deadline-monitor.d.ts +6 -1
- package/out/exports/resources.generated/aws-docdb-dbcluster.d.ts +5 -1
- package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +0 -4
- package/out/exports/resources.generated/aws-ec2-ipam.d.ts +6 -1
- package/out/exports/resources.generated/aws-ec2-launchtemplate.d.ts +4 -53
- package/out/exports/resources.generated/aws-ec2-natgateway.d.ts +1 -1
- package/out/exports/resources.generated/aws-ec2-transitgatewayconnectpeer.d.ts +74 -0
- package/out/exports/resources.generated/aws-ecr-repository.d.ts +27 -1
- package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +23 -1
- package/out/exports/resources.generated/aws-ecs-service.d.ts +1 -1
- package/out/exports/resources.generated/aws-eks-cluster.d.ts +5 -0
- package/out/exports/resources.generated/aws-elasticloadbalancingv2-loadbalancer.d.ts +1 -0
- package/out/exports/resources.generated/aws-entityresolution-idmappingworkflow.d.ts +12 -8
- package/out/exports/resources.generated/aws-entityresolution-idnamespace.d.ts +8 -8
- package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +61 -15
- package/out/exports/resources.generated/aws-evs-environment.d.ts +1 -9
- package/out/exports/resources.generated/aws-glue-job.d.ts +1 -1
- package/out/exports/resources.generated/aws-iotsitewise-assetmodel.d.ts +46 -2
- package/out/exports/resources.generated/aws-iotsitewise-computationmodel.d.ts +158 -0
- package/out/exports/resources.generated/aws-iotsitewise-gateway.d.ts +1 -1
- package/out/exports/resources.generated/aws-kinesisfirehose-deliverystream.d.ts +1 -1
- package/out/exports/resources.generated/aws-lambda-url.d.ts +1 -1
- package/out/exports/resources.generated/aws-lightsail-domain.d.ts +26 -11
- package/out/exports/resources.generated/aws-logs-destination.d.ts +6 -1
- package/out/exports/resources.generated/aws-logs-loggroup.d.ts +4 -0
- package/out/exports/resources.generated/aws-medialive-channel.d.ts +3 -0
- package/out/exports/resources.generated/aws-mediapackagev2-channel.d.ts +7 -0
- package/out/exports/resources.generated/aws-mediapackagev2-originendpoint.d.ts +18 -0
- package/out/exports/resources.generated/aws-mediapackagev2-originendpointpolicy.d.ts +23 -0
- package/out/exports/resources.generated/aws-networkfirewall-firewall.d.ts +36 -6
- package/out/exports/resources.generated/aws-networkfirewall-firewallpolicy.d.ts +16 -9
- package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +8 -8
- package/out/exports/resources.generated/aws-networkfirewall-rulegroup.d.ts +36 -22
- package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +3 -3
- package/out/exports/resources.generated/aws-opensearchserverless-securityconfig.d.ts +1 -1
- package/out/exports/resources.generated/aws-opsworks-app.d.ts +4 -4
- package/out/exports/resources.generated/aws-opsworks-elasticloadbalancerattachment.d.ts +1 -1
- package/out/exports/resources.generated/aws-opsworks-instance.d.ts +14 -14
- package/out/exports/resources.generated/aws-opsworks-layer.d.ts +8 -8
- package/out/exports/resources.generated/aws-opsworks-stack.d.ts +25 -25
- package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +2 -4
- package/out/exports/resources.generated/aws-pcs-cluster.d.ts +4 -0
- package/out/exports/resources.generated/aws-qbusiness-webexperience.d.ts +1 -1
- package/out/exports/resources.generated/aws-quicksight-topic.d.ts +15 -0
- package/out/exports/resources.generated/aws-rds-dbcluster.d.ts +5 -0
- package/out/exports/resources.generated/aws-rds-dbinstance.d.ts +20 -0
- package/out/exports/resources.generated/aws-rds-dbproxy.d.ts +1 -1
- package/out/exports/resources.generated/aws-s3-accesspoint.d.ts +6 -1
- package/out/exports/resources.generated/aws-s3express-accesspoint.d.ts +5 -1
- package/out/exports/resources.generated/aws-sagemaker-cluster.d.ts +116 -1
- package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +5 -1
- package/out/exports/resources.generated/aws-sagemaker-processingjob.d.ts +634 -0
- package/out/exports/resources.generated/aws-sagemaker-space.d.ts +3 -0
- package/out/exports/resources.generated/aws-sagemaker-userprofile.d.ts +4 -0
- package/out/exports/resources.generated/aws-ses-configurationset.d.ts +1 -1
- package/out/exports/resources.generated/aws-ses-dedicatedippool.d.ts +1 -1
- package/out/exports/resources.generated/aws-ses-emailidentity.d.ts +1 -1
- package/out/exports/resources.generated/aws-ssm-patchbaseline.d.ts +5 -1
- package/out/exports/resources.generated/aws-verifiedpermissions-policystore.d.ts +3 -5
- package/out/exports/resources.generated/aws-wisdom-messagetemplate.d.ts +2 -2
- package/out/exports/resources.generated/aws-workspacesweb-portal.d.ts +7 -0
- package/out/exports/resources.generated/aws-workspacesweb-sessionlogger.d.ts +125 -0
- package/package.json +1 -1
|
@@ -3762,6 +3762,9 @@ export type MediaPackageOutputDestinationSettings = {
|
|
|
3762
3762
|
ChannelName?: string | undefined;
|
|
3763
3763
|
};
|
|
3764
3764
|
/**
|
|
3765
|
+
* The settings for a MediaPackage output.
|
|
3766
|
+
*
|
|
3767
|
+
* The parent of this entity is OutputSettings.
|
|
3765
3768
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-medialive-channel-mediapackageoutputsettings.html}
|
|
3766
3769
|
*/
|
|
3767
3770
|
export type MediaPackageOutputSettings = {
|
|
@@ -98,6 +98,13 @@ export type InputSwitchConfiguration = {
|
|
|
98
98
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-channel-inputswitchconfiguration.html#cfn-mediapackagev2-channel-inputswitchconfiguration-mqcsinputswitching}
|
|
99
99
|
*/
|
|
100
100
|
MQCSInputSwitching?: boolean | undefined;
|
|
101
|
+
/**
|
|
102
|
+
* For CMAF inputs, indicates which input MediaPackage should prefer when both inputs have equal MQCS scores. Select `1` to prefer the first ingest endpoint, or `2` to prefer the second ingest endpoint. If you don't specify a preferred input, MediaPackage uses its default switching behavior when MQCS scores are equal.
|
|
103
|
+
* @min 1
|
|
104
|
+
* @max 2
|
|
105
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-channel-inputswitchconfiguration.html#cfn-mediapackagev2-channel-inputswitchconfiguration-preferredinput}
|
|
106
|
+
*/
|
|
107
|
+
PreferredInput?: number | undefined;
|
|
101
108
|
};
|
|
102
109
|
/**
|
|
103
110
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-channel-inputtype.html}
|
|
@@ -455,6 +455,24 @@ export type DrmSystem = "CLEAR_KEY_AES_128" | "FAIRPLAY" | "PLAYREADY" | "WIDEVI
|
|
|
455
455
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpoint-encryption.html}
|
|
456
456
|
*/
|
|
457
457
|
export type Encryption = {
|
|
458
|
+
/**
|
|
459
|
+
* Excludes SEIG and SGPD boxes from segment metadata in CMAF containers.
|
|
460
|
+
*
|
|
461
|
+
* When set to `true` , MediaPackage omits these DRM metadata boxes from CMAF segments, which can improve compatibility with certain devices and players that don't support these boxes.
|
|
462
|
+
*
|
|
463
|
+
* Important considerations:
|
|
464
|
+
*
|
|
465
|
+
* - This setting only affects CMAF container formats
|
|
466
|
+
* - Key rotation can still be handled through media playlist signaling
|
|
467
|
+
* - PSSH and TENC boxes remain unaffected
|
|
468
|
+
* - Default behavior is preserved when this setting is disabled
|
|
469
|
+
*
|
|
470
|
+
* Valid values: `true` | `false`
|
|
471
|
+
*
|
|
472
|
+
* Default: `false`
|
|
473
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpoint-encryption.html#cfn-mediapackagev2-originendpoint-encryption-cmafexcludesegmentdrmmetadata}
|
|
474
|
+
*/
|
|
475
|
+
CmafExcludeSegmentDrmMetadata?: boolean | undefined;
|
|
458
476
|
/**
|
|
459
477
|
* A 128-bit, 16-byte hex value represented by a 32-character string, used in conjunction with the key for encrypting content. If you don't specify a value, then MediaPackage creates the constant initialization vector (IV).
|
|
460
478
|
* @minLength 32
|
|
@@ -9,6 +9,11 @@ export type MediaPackageV2OriginEndpointPolicy = ResourceDefinition<"AWS::MediaP
|
|
|
9
9
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-mediapackagev2-originendpointpolicy.html}
|
|
10
10
|
*/
|
|
11
11
|
export type MediaPackageV2OriginEndpointPolicyProps = {
|
|
12
|
+
/**
|
|
13
|
+
* The settings to enable CDN authorization headers in MediaPackage.
|
|
14
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-mediapackagev2-originendpointpolicy.html#cfn-mediapackagev2-originendpointpolicy-cdnauthconfiguration}
|
|
15
|
+
*/
|
|
16
|
+
CdnAuthConfiguration?: CdnAuthConfiguration | undefined;
|
|
12
17
|
/**
|
|
13
18
|
* The name of the channel group associated with the origin endpoint policy.
|
|
14
19
|
* @minLength 1
|
|
@@ -39,4 +44,22 @@ export type MediaPackageV2OriginEndpointPolicyProps = {
|
|
|
39
44
|
*/
|
|
40
45
|
Policy: PolicyDocument;
|
|
41
46
|
};
|
|
47
|
+
/**
|
|
48
|
+
* The settings to enable CDN authorization headers in MediaPackage.
|
|
49
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpointpolicy-cdnauthconfiguration.html}
|
|
50
|
+
*/
|
|
51
|
+
export type CdnAuthConfiguration = {
|
|
52
|
+
/**
|
|
53
|
+
* The ARN for the secret in Secrets Manager that your CDN uses for authorization to access the endpoint.
|
|
54
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpointpolicy-cdnauthconfiguration.html#cfn-mediapackagev2-originendpointpolicy-cdnauthconfiguration-cdnidentifiersecretarns}
|
|
55
|
+
*/
|
|
56
|
+
CdnIdentifierSecretArns: string[];
|
|
57
|
+
/**
|
|
58
|
+
* The ARN for the IAM role that gives MediaPackage read access to Secrets Manager and AWS KMS for CDN authorization.
|
|
59
|
+
* @minLength 20
|
|
60
|
+
* @maxLength 2048
|
|
61
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpointpolicy-cdnauthconfiguration.html#cfn-mediapackagev2-originendpointpolicy-cdnauthconfiguration-secretsrolearn}
|
|
62
|
+
*/
|
|
63
|
+
SecretsRoleArn: string;
|
|
64
|
+
};
|
|
42
65
|
//# sourceMappingURL=aws-mediapackagev2-originendpointpolicy.d.ts.map
|
|
@@ -1,18 +1,28 @@
|
|
|
1
1
|
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
2
|
/**
|
|
3
|
-
* Use the
|
|
3
|
+
* Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
|
|
4
4
|
*
|
|
5
5
|
* The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
|
|
6
6
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html}
|
|
7
7
|
*/
|
|
8
8
|
export type NetworkFirewallFirewall = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::Firewall", NetworkFirewallFirewallProps, NetworkFirewallFirewallAttribs>;
|
|
9
9
|
/**
|
|
10
|
-
* Use the
|
|
10
|
+
* Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
|
|
11
11
|
*
|
|
12
12
|
* The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
|
|
13
13
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html}
|
|
14
14
|
*/
|
|
15
15
|
export type NetworkFirewallFirewallProps = {
|
|
16
|
+
/**
|
|
17
|
+
* A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to `TRUE` , you must first disable this protection before adding or removing Availability Zones.
|
|
18
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection}
|
|
19
|
+
*/
|
|
20
|
+
AvailabilityZoneChangeProtection?: boolean | undefined;
|
|
21
|
+
/**
|
|
22
|
+
* The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
23
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings}
|
|
24
|
+
*/
|
|
25
|
+
AvailabilityZoneMappings?: AvailabilityZoneMapping[] | undefined;
|
|
16
26
|
/**
|
|
17
27
|
* A flag indicating whether it is possible to delete the firewall. A setting of `TRUE` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to `TRUE` .
|
|
18
28
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-deleteprotection}
|
|
@@ -63,7 +73,7 @@ export type NetworkFirewallFirewallProps = {
|
|
|
63
73
|
* In addition to these subnets, you can define other endpoints for the firewall in `VpcEndpointAssociation` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
64
74
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings}
|
|
65
75
|
*/
|
|
66
|
-
SubnetMappings
|
|
76
|
+
SubnetMappings?: SubnetMapping[] | undefined;
|
|
67
77
|
/**
|
|
68
78
|
* An array of key-value pairs to apply to this resource.
|
|
69
79
|
*
|
|
@@ -71,6 +81,13 @@ export type NetworkFirewallFirewallProps = {
|
|
|
71
81
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-tags}
|
|
72
82
|
*/
|
|
73
83
|
Tags?: Tag[] | undefined;
|
|
84
|
+
/**
|
|
85
|
+
* The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
|
|
86
|
+
* @maxLength 128
|
|
87
|
+
* @pattern ^tgw-[0-9a-z]+$
|
|
88
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid}
|
|
89
|
+
*/
|
|
90
|
+
TransitGatewayId?: string | undefined;
|
|
74
91
|
/**
|
|
75
92
|
* The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
|
|
76
93
|
* @minLength 1
|
|
@@ -78,7 +95,7 @@ export type NetworkFirewallFirewallProps = {
|
|
|
78
95
|
* @pattern ^vpc-[0-9a-f]+$
|
|
79
96
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid}
|
|
80
97
|
*/
|
|
81
|
-
VpcId
|
|
98
|
+
VpcId?: string | undefined;
|
|
82
99
|
};
|
|
83
100
|
/**
|
|
84
101
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#aws-resource-networkfirewall-firewall-return-values}
|
|
@@ -90,12 +107,12 @@ export type NetworkFirewallFirewallAttribs = {
|
|
|
90
107
|
*/
|
|
91
108
|
EndpointIds: string[];
|
|
92
109
|
/**
|
|
93
|
-
* The Amazon Resource Name (ARN) of the
|
|
110
|
+
* The Amazon Resource Name (ARN) of the firewall.
|
|
94
111
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-firewallarn}
|
|
95
112
|
*/
|
|
96
113
|
FirewallArn: string;
|
|
97
114
|
/**
|
|
98
|
-
* The name of the
|
|
115
|
+
* The name of the firewallresource.
|
|
99
116
|
* @minLength 36
|
|
100
117
|
* @maxLength 36
|
|
101
118
|
* @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
|
|
@@ -103,6 +120,19 @@ export type NetworkFirewallFirewallAttribs = {
|
|
|
103
120
|
*/
|
|
104
121
|
FirewallId: string;
|
|
105
122
|
};
|
|
123
|
+
/**
|
|
124
|
+
* Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall. Each mapping represents where the firewall can process traffic. You use these mappings when calling `CreateFirewall` , `AssociateAvailabilityZones` , and `DisassociateAvailabilityZones` .
|
|
125
|
+
*
|
|
126
|
+
* To retrieve the current Availability Zone mappings for a firewall, use `DescribeFirewall` .
|
|
127
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html}
|
|
128
|
+
*/
|
|
129
|
+
export type AvailabilityZoneMapping = {
|
|
130
|
+
/**
|
|
131
|
+
* The ID of the Availability Zone where the firewall endpoint is located. For example, `us-east-2a` . The Availability Zone must be in the same Region as the transit gateway.
|
|
132
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone}
|
|
133
|
+
*/
|
|
134
|
+
AvailabilityZone: string;
|
|
135
|
+
};
|
|
106
136
|
/**
|
|
107
137
|
* An analysis type.
|
|
108
138
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-enabledanalysistype.html}
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
2
|
/**
|
|
3
|
-
* Use the
|
|
3
|
+
* Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall. You can use one firewall policy for multiple firewalls.
|
|
4
4
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html}
|
|
5
5
|
*/
|
|
6
6
|
export type NetworkFirewallFirewallPolicy = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::FirewallPolicy", NetworkFirewallFirewallPolicyProps, NetworkFirewallFirewallPolicyAttribs>;
|
|
7
7
|
/**
|
|
8
|
-
* Use the
|
|
8
|
+
* Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall. You can use one firewall policy for multiple firewalls.
|
|
9
9
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html}
|
|
10
10
|
*/
|
|
11
11
|
export type NetworkFirewallFirewallPolicyProps = {
|
|
@@ -43,12 +43,12 @@ export type NetworkFirewallFirewallPolicyProps = {
|
|
|
43
43
|
*/
|
|
44
44
|
export type NetworkFirewallFirewallPolicyAttribs = {
|
|
45
45
|
/**
|
|
46
|
-
* The Amazon Resource Name (ARN) of the
|
|
46
|
+
* The Amazon Resource Name (ARN) of the firewall policy.
|
|
47
47
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicyarn}
|
|
48
48
|
*/
|
|
49
49
|
FirewallPolicyArn: string;
|
|
50
50
|
/**
|
|
51
|
-
* The unique ID of the
|
|
51
|
+
* The unique ID of the firewall policy resource.
|
|
52
52
|
* @minLength 36
|
|
53
53
|
* @maxLength 36
|
|
54
54
|
* @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
|
|
@@ -76,8 +76,8 @@ export type ActionDefinition = {
|
|
|
76
76
|
*
|
|
77
77
|
* You can use custom actions in the following places:
|
|
78
78
|
*
|
|
79
|
-
* - In an `
|
|
80
|
-
* - In an
|
|
79
|
+
* - In an `StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
80
|
+
* - In an firewall policy specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
81
81
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-customaction.html}
|
|
82
82
|
*/
|
|
83
83
|
export type CustomAction = {
|
|
@@ -184,7 +184,7 @@ export type FirewallPolicy = {
|
|
|
184
184
|
TLSInspectionConfigurationArn?: string | undefined;
|
|
185
185
|
};
|
|
186
186
|
/**
|
|
187
|
-
* A list of IP addresses and address ranges, in CIDR notation. This is part of a
|
|
187
|
+
* A list of IP addresses and address ranges, in CIDR notation. This is part of a rule variable.
|
|
188
188
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-ipset.html}
|
|
189
189
|
*/
|
|
190
190
|
export type IPSet = {
|
|
@@ -259,13 +259,20 @@ export type StatefulRuleGroupOverride = {
|
|
|
259
259
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html}
|
|
260
260
|
*/
|
|
261
261
|
export type StatefulRuleGroupReference = {
|
|
262
|
+
/**
|
|
263
|
+
* AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
|
|
264
|
+
*
|
|
265
|
+
* > Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
|
|
266
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection}
|
|
267
|
+
*/
|
|
268
|
+
DeepThreatInspection?: boolean | undefined;
|
|
262
269
|
/**
|
|
263
270
|
* The action that allows the policy owner to override the behavior of the rule group within a policy.
|
|
264
271
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-override}
|
|
265
272
|
*/
|
|
266
273
|
Override?: StatefulRuleGroupOverride | undefined;
|
|
267
274
|
/**
|
|
268
|
-
* An integer setting that indicates the order in which to run the stateful rule groups in a single
|
|
275
|
+
* An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the `STRICT_ORDER` rule order in the stateful engine options settings.
|
|
269
276
|
*
|
|
270
277
|
* Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
271
278
|
*
|
|
@@ -285,7 +292,7 @@ export type StatefulRuleGroupReference = {
|
|
|
285
292
|
*/
|
|
286
293
|
export type StatelessRuleGroupReference = {
|
|
287
294
|
/**
|
|
288
|
-
* An integer setting that indicates the order in which to run the stateless rule groups in a single
|
|
295
|
+
* An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
289
296
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statelessrulegroupreference-priority}
|
|
290
297
|
*/
|
|
291
298
|
Priority: number;
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
import type { ResourceDefinition } from "../main.ts";
|
|
2
2
|
/**
|
|
3
|
-
* Use the
|
|
3
|
+
* Use the logging configuration to define the destinations and logging options for an firewall.
|
|
4
4
|
*
|
|
5
5
|
* You must change the logging configuration by changing one `LogDestinationConfig` setting at a time in your `LogDestinationConfigs` .
|
|
6
6
|
*
|
|
7
|
-
* You can make only one of the following changes to your
|
|
7
|
+
* You can make only one of the following changes to your logging configuration resource:
|
|
8
8
|
*
|
|
9
9
|
* - Create a new log destination object by adding a single `LogDestinationConfig` array element to `LogDestinationConfigs` .
|
|
10
10
|
* - Delete a log destination object by removing a single `LogDestinationConfig` array element from `LogDestinationConfigs` .
|
|
@@ -15,11 +15,11 @@ import type { ResourceDefinition } from "../main.ts";
|
|
|
15
15
|
*/
|
|
16
16
|
export type NetworkFirewallLoggingConfiguration = ResourceDefinition<"AWS::NetworkFirewall::LoggingConfiguration", NetworkFirewallLoggingConfigurationProps>;
|
|
17
17
|
/**
|
|
18
|
-
* Use the
|
|
18
|
+
* Use the logging configuration to define the destinations and logging options for an firewall.
|
|
19
19
|
*
|
|
20
20
|
* You must change the logging configuration by changing one `LogDestinationConfig` setting at a time in your `LogDestinationConfigs` .
|
|
21
21
|
*
|
|
22
|
-
* You can make only one of the following changes to your
|
|
22
|
+
* You can make only one of the following changes to your logging configuration resource:
|
|
23
23
|
*
|
|
24
24
|
* - Create a new log destination object by adding a single `LogDestinationConfig` array element to `LogDestinationConfigs` .
|
|
25
25
|
* - Delete a log destination object by removing a single `LogDestinationConfig` array element from `LogDestinationConfigs` .
|
|
@@ -34,7 +34,7 @@ export type NetworkFirewallLoggingConfigurationProps = {
|
|
|
34
34
|
*/
|
|
35
35
|
EnableMonitoringDashboard?: boolean | undefined;
|
|
36
36
|
/**
|
|
37
|
-
* The Amazon Resource Name (ARN) of the
|
|
37
|
+
* The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
38
38
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-firewallarn}
|
|
39
39
|
*/
|
|
40
40
|
FirewallArn: string;
|
|
@@ -47,13 +47,13 @@ export type NetworkFirewallLoggingConfigurationProps = {
|
|
|
47
47
|
*/
|
|
48
48
|
FirewallName?: string | undefined;
|
|
49
49
|
/**
|
|
50
|
-
* Defines how AWS Network Firewall performs logging for a
|
|
50
|
+
* Defines how AWS Network Firewall performs logging for a firewall.
|
|
51
51
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration}
|
|
52
52
|
*/
|
|
53
53
|
LoggingConfiguration: LoggingConfiguration;
|
|
54
54
|
};
|
|
55
55
|
/**
|
|
56
|
-
* Defines where AWS Network Firewall sends logs for the firewall for one log type. This is used in
|
|
56
|
+
* Defines where AWS Network Firewall sends logs for the firewall for one log type. This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
|
|
57
57
|
*
|
|
58
58
|
* Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to `DROP` or `ALERT` .
|
|
59
59
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-loggingconfiguration-logdestinationconfig.html}
|
|
@@ -92,7 +92,7 @@ export type LogDestinationConfig = {
|
|
|
92
92
|
LogType: "ALERT" | "FLOW" | "TLS";
|
|
93
93
|
};
|
|
94
94
|
/**
|
|
95
|
-
* Defines how AWS Network Firewall performs logging for a
|
|
95
|
+
* Defines how AWS Network Firewall performs logging for a firewall.
|
|
96
96
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-loggingconfiguration-loggingconfiguration.html}
|
|
97
97
|
*/
|
|
98
98
|
export type LoggingConfiguration = {
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
2
2
|
/**
|
|
3
|
-
* Use the
|
|
3
|
+
* Use the [](https://docs.aws.amazon.com/RuleGroup) to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
|
|
4
4
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html}
|
|
5
5
|
*/
|
|
6
6
|
export type NetworkFirewallRuleGroup = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::RuleGroup", NetworkFirewallRuleGroupProps, NetworkFirewallRuleGroupAttribs>;
|
|
7
7
|
/**
|
|
8
|
-
* Use the
|
|
8
|
+
* Use the [](https://docs.aws.amazon.com/RuleGroup) to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
|
|
9
9
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html}
|
|
10
10
|
*/
|
|
11
11
|
export type NetworkFirewallRuleGroupProps = {
|
|
@@ -35,6 +35,16 @@ export type NetworkFirewallRuleGroupProps = {
|
|
|
35
35
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-rulegroupname}
|
|
36
36
|
*/
|
|
37
37
|
RuleGroupName: string;
|
|
38
|
+
/**
|
|
39
|
+
* A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by `DescribeRuleGroupSummary` .
|
|
40
|
+
*
|
|
41
|
+
* - The `RuleOptions` specified in `SummaryConfiguration`
|
|
42
|
+
* - Rule metadata organization preferences
|
|
43
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration}
|
|
44
|
+
*/
|
|
45
|
+
SummaryConfiguration?: {
|
|
46
|
+
RuleOptions?: SummaryRuleOption[] | undefined;
|
|
47
|
+
} | undefined;
|
|
38
48
|
/**
|
|
39
49
|
* An array of key-value pairs to apply to this resource.
|
|
40
50
|
*
|
|
@@ -54,12 +64,12 @@ export type NetworkFirewallRuleGroupProps = {
|
|
|
54
64
|
*/
|
|
55
65
|
export type NetworkFirewallRuleGroupAttribs = {
|
|
56
66
|
/**
|
|
57
|
-
* The Amazon Resource Name (ARN) of the
|
|
67
|
+
* The Amazon Resource Name (ARN) of the rule group.
|
|
58
68
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-rulegrouparn}
|
|
59
69
|
*/
|
|
60
70
|
RuleGroupArn: string;
|
|
61
71
|
/**
|
|
62
|
-
* The unique ID of the
|
|
72
|
+
* The unique ID of the rule group resource.
|
|
63
73
|
* @minLength 36
|
|
64
74
|
* @maxLength 36
|
|
65
75
|
* @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
|
|
@@ -81,7 +91,7 @@ export type ActionDefinition = {
|
|
|
81
91
|
PublishMetricAction?: PublishMetricAction | undefined;
|
|
82
92
|
};
|
|
83
93
|
/**
|
|
84
|
-
* A single IP address specification. This is used in the
|
|
94
|
+
* A single IP address specification. This is used in the match attributes source and destination specifications.
|
|
85
95
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-address.html}
|
|
86
96
|
*/
|
|
87
97
|
export type Address = {
|
|
@@ -110,8 +120,8 @@ export type Address = {
|
|
|
110
120
|
*
|
|
111
121
|
* You can use custom actions in the following places:
|
|
112
122
|
*
|
|
113
|
-
* - In
|
|
114
|
-
* - In an
|
|
123
|
+
* - In a `StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
124
|
+
* - In an firewall policy specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
115
125
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-customaction.html}
|
|
116
126
|
*/
|
|
117
127
|
export type CustomAction = {
|
|
@@ -216,7 +226,7 @@ export type Header = {
|
|
|
216
226
|
SourcePort: string;
|
|
217
227
|
};
|
|
218
228
|
/**
|
|
219
|
-
* A list of IP addresses and address ranges, in CIDR notation. This is part of a `
|
|
229
|
+
* A list of IP addresses and address ranges, in CIDR notation. This is part of a `RuleVariables` .
|
|
220
230
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipset.html}
|
|
221
231
|
*/
|
|
222
232
|
export type IPSet = {
|
|
@@ -227,12 +237,12 @@ export type IPSet = {
|
|
|
227
237
|
Definition?: string[] | undefined;
|
|
228
238
|
};
|
|
229
239
|
/**
|
|
230
|
-
* Configures one or more
|
|
240
|
+
* Configures one or more IP set references for a Suricata-compatible rule group. An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see [Using IP set references](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall Developer Guide* .
|
|
231
241
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html}
|
|
232
242
|
*/
|
|
233
243
|
export type IPSetReference = {
|
|
234
244
|
/**
|
|
235
|
-
* The Amazon Resource Name (ARN) of the resource to include in the
|
|
245
|
+
* The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
|
|
236
246
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn}
|
|
237
247
|
*/
|
|
238
248
|
ReferenceArn?: string | undefined;
|
|
@@ -280,7 +290,7 @@ export type MatchAttributes = {
|
|
|
280
290
|
TCPFlags?: TCPFlagField[] | undefined;
|
|
281
291
|
};
|
|
282
292
|
/**
|
|
283
|
-
* A single port range specification. This is used for source and destination port ranges in the stateless
|
|
293
|
+
* A single port range specification. This is used for source and destination port ranges in the stateless match attributes.
|
|
284
294
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-portrange.html}
|
|
285
295
|
*/
|
|
286
296
|
export type PortRange = {
|
|
@@ -317,7 +327,7 @@ export type PublishMetricAction = {
|
|
|
317
327
|
Dimensions: Dimension[];
|
|
318
328
|
};
|
|
319
329
|
/**
|
|
320
|
-
* Configures the
|
|
330
|
+
* Configures the reference sets for a stateful rule group. For more information, see the [Using IP set references in Suricata compatible rule groups](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall User Guide* .
|
|
321
331
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-referencesets.html}
|
|
322
332
|
*/
|
|
323
333
|
export type ReferenceSets = {
|
|
@@ -335,7 +345,7 @@ export type RuleDefinition = {
|
|
|
335
345
|
/**
|
|
336
346
|
* The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions.
|
|
337
347
|
*
|
|
338
|
-
* > Network Firewall only forwards a packet for stateful rule inspection if you specify `aws:forward_to_sfe` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify `aws:forward_to_sfe` for the `StatelessDefaultActions` setting for the
|
|
348
|
+
* > Network Firewall only forwards a packet for stateful rule inspection if you specify `aws:forward_to_sfe` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify `aws:forward_to_sfe` for the `StatelessDefaultActions` setting for the firewall policy.
|
|
339
349
|
*
|
|
340
350
|
* For every rule, you must specify exactly one of the following standard actions.
|
|
341
351
|
*
|
|
@@ -409,7 +419,7 @@ export type RuleOption = {
|
|
|
409
419
|
*/
|
|
410
420
|
export type RuleOrder = "DEFAULT_ACTION_ORDER" | "STRICT_ORDER";
|
|
411
421
|
/**
|
|
412
|
-
* Settings that are available for use in the rules in the
|
|
422
|
+
* Settings that are available for use in the rules in the rule group where this is defined.
|
|
413
423
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulevariables.html}
|
|
414
424
|
*/
|
|
415
425
|
export type RuleVariables = {
|
|
@@ -439,7 +449,7 @@ export type RulesSource = {
|
|
|
439
449
|
*
|
|
440
450
|
* These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
|
|
441
451
|
*
|
|
442
|
-
* > You can't use the `priority` keyword if the `RuleOrder` option in
|
|
452
|
+
* > You can't use the `priority` keyword if the `RuleOrder` option in StatefulRuleOptions is set to `STRICT_ORDER` .
|
|
443
453
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring}
|
|
444
454
|
*/
|
|
445
455
|
RulesString?: string | undefined;
|
|
@@ -459,7 +469,7 @@ export type RulesSource = {
|
|
|
459
469
|
*
|
|
460
470
|
* For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
|
|
461
471
|
*
|
|
462
|
-
* By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the `HOME_NET` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see `
|
|
472
|
+
* By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the `HOME_NET` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see `RuleVariables` in this guide and [Stateful domain list rule groups in AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html) in the *Network Firewall Developer Guide*
|
|
463
473
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html}
|
|
464
474
|
*/
|
|
465
475
|
export type RulesSourceList = {
|
|
@@ -493,12 +503,12 @@ export type StatefulRule = {
|
|
|
493
503
|
* The actions for a stateful rule are defined as follows:
|
|
494
504
|
*
|
|
495
505
|
* - *PASS* - Permits the packets to go to the intended destination.
|
|
496
|
-
* - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
506
|
+
* - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
497
507
|
* - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. `REJECT` is available only for TCP traffic.
|
|
498
|
-
* - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
508
|
+
* - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
499
509
|
*
|
|
500
510
|
* You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with `ALERT` action, verify in the logs that the rule is filtering as you want, then change the action to `DROP` .
|
|
501
|
-
* - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the
|
|
511
|
+
* - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
|
|
502
512
|
*
|
|
503
513
|
* `REJECT` isn't currently available for use with IMAP and FTP protocols.
|
|
504
514
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statefulrule.html#cfn-networkfirewall-rulegroup-statefulrule-action}
|
|
@@ -527,7 +537,7 @@ export type StatefulRuleOptions = {
|
|
|
527
537
|
RuleOrder?: RuleOrder | undefined;
|
|
528
538
|
};
|
|
529
539
|
/**
|
|
530
|
-
* A single stateless rule. This is used in `
|
|
540
|
+
* A single stateless rule. This is used in `StatelessRulesAndCustomActions` .
|
|
531
541
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrule.html}
|
|
532
542
|
*/
|
|
533
543
|
export type StatelessRule = {
|
|
@@ -554,7 +564,7 @@ export type StatelessRule = {
|
|
|
554
564
|
*/
|
|
555
565
|
export type StatelessRulesAndCustomActions = {
|
|
556
566
|
/**
|
|
557
|
-
* Defines an array of individual custom action definitions that are available for use by the stateless rules in this `StatelessRulesAndCustomActions` specification. You name each custom action that you define, and then you can use it by name in your stateless rule
|
|
567
|
+
* Defines an array of individual custom action definitions that are available for use by the stateless rules in this `StatelessRulesAndCustomActions` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition `Actions` specification.
|
|
558
568
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions}
|
|
559
569
|
*/
|
|
560
570
|
CustomActions?: CustomAction[] | undefined;
|
|
@@ -564,12 +574,16 @@ export type StatelessRulesAndCustomActions = {
|
|
|
564
574
|
*/
|
|
565
575
|
StatelessRules: StatelessRule[];
|
|
566
576
|
};
|
|
577
|
+
/**
|
|
578
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryruleoption.html}
|
|
579
|
+
*/
|
|
580
|
+
export type SummaryRuleOption = "SID" | "MSG" | "METADATA";
|
|
567
581
|
/**
|
|
568
582
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-tcpflag.html}
|
|
569
583
|
*/
|
|
570
584
|
export type TCPFlag = "FIN" | "SYN" | "RST" | "PSH" | "ACK" | "URG" | "ECE" | "CWR";
|
|
571
585
|
/**
|
|
572
|
-
* TCP flags and masks to inspect packets for. This is used in the
|
|
586
|
+
* TCP flags and masks to inspect packets for. This is used in the match attributes specification.
|
|
573
587
|
*
|
|
574
588
|
* For example:
|
|
575
589
|
*
|
|
@@ -13,7 +13,7 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
|
|
|
13
13
|
*
|
|
14
14
|
* You can use AWS Resource Access Manager to share a `Firewall` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see `PutResourcePolicy` in this guide and see [Sharing Network Firewall resources](https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html) in the *AWS Network Firewall Developer Guide* .
|
|
15
15
|
*
|
|
16
|
-
* The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding
|
|
16
|
+
* The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling `DescribeVpcEndpointAssociation` .
|
|
17
17
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html}
|
|
18
18
|
*/
|
|
19
19
|
export type NetworkFirewallVpcEndpointAssociation = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::VpcEndpointAssociation", NetworkFirewallVpcEndpointAssociationProps, NetworkFirewallVpcEndpointAssociationAttribs>;
|
|
@@ -31,7 +31,7 @@ export type NetworkFirewallVpcEndpointAssociation = ResourceDefinitionWithAttrib
|
|
|
31
31
|
*
|
|
32
32
|
* You can use AWS Resource Access Manager to share a `Firewall` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see `PutResourcePolicy` in this guide and see [Sharing Network Firewall resources](https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html) in the *AWS Network Firewall Developer Guide* .
|
|
33
33
|
*
|
|
34
|
-
* The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding
|
|
34
|
+
* The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling `DescribeVpcEndpointAssociation` .
|
|
35
35
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html}
|
|
36
36
|
*/
|
|
37
37
|
export type NetworkFirewallVpcEndpointAssociationProps = {
|
|
@@ -66,7 +66,7 @@ export type NetworkFirewallVpcEndpointAssociationProps = {
|
|
|
66
66
|
*/
|
|
67
67
|
export type NetworkFirewallVpcEndpointAssociationAttribs = {
|
|
68
68
|
/**
|
|
69
|
-
*
|
|
69
|
+
* The unique ID of the firewall endpoint for the subnet that you attached to the firewall.For example: "vpce-111122223333"
|
|
70
70
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-endpointid}
|
|
71
71
|
*/
|
|
72
72
|
EndpointId: string;
|
|
@@ -110,7 +110,7 @@ export type SamlConfigOptions = {
|
|
|
110
110
|
*/
|
|
111
111
|
Metadata: string;
|
|
112
112
|
/**
|
|
113
|
-
* Custom entity
|
|
113
|
+
* Custom entity ID attribute to override the default entity ID for this SAML integration.
|
|
114
114
|
* @minLength 1
|
|
115
115
|
* @maxLength 1024
|
|
116
116
|
* @pattern ^aws:opensearch:[0-9]{12}:*
|
|
@@ -69,7 +69,7 @@ export type OpsWorksAppProps = {
|
|
|
69
69
|
*/
|
|
70
70
|
StackId: string;
|
|
71
71
|
/**
|
|
72
|
-
* The app type. Each supported type is associated with a particular layer. For example, PHP applications are associated with a PHP layer.
|
|
72
|
+
* The app type. Each supported type is associated with a particular layer. For example, PHP applications are associated with a PHP layer. OpsWorks Stacks deploys an application to those instances that are members of the corresponding layer. If your app isn't one of the standard types, or you prefer to implement your own Deploy recipes, specify `other` .
|
|
73
73
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-opsworks-app.html#cfn-opsworks-app-type}
|
|
74
74
|
*/
|
|
75
75
|
Type: string;
|
|
@@ -135,19 +135,19 @@ export type Source = {
|
|
|
135
135
|
*
|
|
136
136
|
* For more information on how to safely handle IAM credentials, see [](https://docs.aws.amazon.com/general/latest/gr/aws-access-keys-best-practices.html) .
|
|
137
137
|
*
|
|
138
|
-
* In responses,
|
|
138
|
+
* In responses, OpsWorks Stacks returns `*****FILTERED*****` instead of the actual value.
|
|
139
139
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-opsworks-app-source.html#cfn-opsworks-app-source-password}
|
|
140
140
|
*/
|
|
141
141
|
Password?: string | undefined;
|
|
142
142
|
/**
|
|
143
|
-
* The application's version.
|
|
143
|
+
* The application's version. OpsWorks Stacks enables you to easily deploy new versions of an application. One of the simplest approaches is to have branches or revisions in your repository that represent different versions that can potentially be deployed.
|
|
144
144
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-opsworks-app-source.html#cfn-opsworks-app-source-revision}
|
|
145
145
|
*/
|
|
146
146
|
Revision?: string | undefined;
|
|
147
147
|
/**
|
|
148
148
|
* In requests, the repository's SSH key.
|
|
149
149
|
*
|
|
150
|
-
* In responses,
|
|
150
|
+
* In responses, OpsWorks Stacks returns `*****FILTERED*****` instead of the actual value.
|
|
151
151
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-opsworks-app-source.html#cfn-opsworks-app-source-sshkey}
|
|
152
152
|
*/
|
|
153
153
|
SshKey?: string | undefined;
|
|
@@ -15,7 +15,7 @@ export type OpsWorksElasticLoadBalancerAttachmentProps = {
|
|
|
15
15
|
*/
|
|
16
16
|
ElasticLoadBalancerName: string;
|
|
17
17
|
/**
|
|
18
|
-
* The
|
|
18
|
+
* The OpsWorks layer ID to which the Elastic Load Balancing load balancer is attached.
|
|
19
19
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-opsworks-elasticloadbalancerattachment.html#cfn-opsworks-elasticloadbalancerattachment-layerid}
|
|
20
20
|
*/
|
|
21
21
|
LayerId: string;
|