@propulsionworks/cloudformation 0.1.20 → 0.1.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/out/exports/resources.generated/aws-appconfig-configurationprofile.d.ts +3 -3
  2. package/out/exports/resources.generated/aws-appconfig-deployment.d.ts +5 -0
  3. package/out/exports/resources.generated/aws-arcregionswitch-plan.d.ts +132 -0
  4. package/out/exports/resources.generated/aws-athena-datacatalog.d.ts +15 -6
  5. package/out/exports/resources.generated/aws-athena-workgroup.d.ts +3 -3
  6. package/out/exports/resources.generated/aws-batch-jobqueue.d.ts +7 -0
  7. package/out/exports/resources.generated/aws-batch-serviceenvironment.d.ts +1 -1
  8. package/out/exports/resources.generated/aws-codebuild-project.d.ts +17 -0
  9. package/out/exports/resources.generated/aws-deadline-fleet.d.ts +13 -0
  10. package/out/exports/resources.generated/aws-deadline-monitor.d.ts +6 -1
  11. package/out/exports/resources.generated/aws-docdb-dbcluster.d.ts +5 -1
  12. package/out/exports/resources.generated/aws-ec2-launchtemplate.d.ts +4 -53
  13. package/out/exports/resources.generated/aws-ec2-natgateway.d.ts +1 -1
  14. package/out/exports/resources.generated/aws-ec2-transitgatewayconnectpeer.d.ts +5 -4
  15. package/out/exports/resources.generated/aws-ecr-repository.d.ts +2 -0
  16. package/out/exports/resources.generated/aws-ecr-repositorycreationtemplate.d.ts +2 -2
  17. package/out/exports/resources.generated/aws-ecs-service.d.ts +1 -1
  18. package/out/exports/resources.generated/aws-eks-cluster.d.ts +5 -0
  19. package/out/exports/resources.generated/aws-elasticloadbalancingv2-loadbalancer.d.ts +1 -0
  20. package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +16 -0
  21. package/out/exports/resources.generated/aws-evs-environment.d.ts +1 -9
  22. package/out/exports/resources.generated/aws-iotsitewise-assetmodel.d.ts +46 -2
  23. package/out/exports/resources.generated/aws-kinesisfirehose-deliverystream.d.ts +1 -1
  24. package/out/exports/resources.generated/aws-lambda-url.d.ts +1 -1
  25. package/out/exports/resources.generated/aws-lambda-version.d.ts +1 -1
  26. package/out/exports/resources.generated/aws-logs-destination.d.ts +1 -1
  27. package/out/exports/resources.generated/aws-mediapackagev2-originendpoint.d.ts +18 -0
  28. package/out/exports/resources.generated/aws-networkfirewall-firewall.d.ts +36 -6
  29. package/out/exports/resources.generated/aws-networkfirewall-firewallpolicy.d.ts +16 -9
  30. package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +8 -8
  31. package/out/exports/resources.generated/aws-networkfirewall-rulegroup.d.ts +36 -22
  32. package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +3 -3
  33. package/out/exports/resources.generated/aws-opsworks-app.d.ts +4 -4
  34. package/out/exports/resources.generated/aws-opsworks-elasticloadbalancerattachment.d.ts +1 -1
  35. package/out/exports/resources.generated/aws-opsworks-instance.d.ts +14 -14
  36. package/out/exports/resources.generated/aws-opsworks-layer.d.ts +8 -8
  37. package/out/exports/resources.generated/aws-opsworks-stack.d.ts +25 -25
  38. package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +2 -2
  39. package/out/exports/resources.generated/aws-pcs-cluster.d.ts +4 -0
  40. package/out/exports/resources.generated/aws-qbusiness-webexperience.d.ts +1 -1
  41. package/out/exports/resources.generated/aws-rds-dbcluster.d.ts +5 -0
  42. package/out/exports/resources.generated/aws-rds-dbinstance.d.ts +4 -29
  43. package/out/exports/resources.generated/aws-rds-dbproxy.d.ts +1 -1
  44. package/out/exports/resources.generated/aws-s3-accesspoint.d.ts +1 -1
  45. package/out/exports/resources.generated/aws-sagemaker-cluster.d.ts +11 -2
  46. package/out/exports/resources.generated/aws-sagemaker-processingjob.d.ts +72 -46
  47. package/out/exports/resources.generated/aws-verifiedpermissions-policystore.d.ts +3 -5
  48. package/out/exports/resources.generated/aws-workspacesweb-portal.d.ts +7 -0
  49. package/out/exports/resources.generated/aws-workspacesweb-sessionlogger.d.ts +125 -0
  50. package/package.json +1 -1
@@ -2,20 +2,22 @@ import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
3
  * Creates an asset model from specified property and hierarchy definitions. You create assets from asset models. With asset models, you can easily create assets of the same type that have standardized definitions. Each asset created from a model inherits the asset model's property and hierarchy definitions. For more information, see [Defining asset models](https://docs.aws.amazon.com/iot-sitewise/latest/userguide/define-models.html) in the *AWS IoT SiteWise User Guide* .
4
4
  *
5
- * You can create two types of asset models, `ASSET_MODEL` or `COMPONENT_MODEL` .
5
+ * You can create three types of asset models, `ASSET_MODEL` , `COMPONENT_MODEL` , or an `INTERFACE` .
6
6
  *
7
7
  * - *ASSET_MODEL* – (default) An asset model that you can use to create assets. Can't be included as a component in another asset model.
8
8
  * - *COMPONENT_MODEL* – A reusable component that you can include in the composite models of other asset models. You can't create assets directly from this type of asset model.
9
+ * - *INTERFACE* – An interface is a type of model that defines a standard structure that can be applied to different asset models.
9
10
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotsitewise-assetmodel.html}
10
11
  */
11
12
  export type IoTSiteWiseAssetModel = ResourceDefinitionWithAttributes<"AWS::IoTSiteWise::AssetModel", IoTSiteWiseAssetModelProps, IoTSiteWiseAssetModelAttribs>;
12
13
  /**
13
14
  * Creates an asset model from specified property and hierarchy definitions. You create assets from asset models. With asset models, you can easily create assets of the same type that have standardized definitions. Each asset created from a model inherits the asset model's property and hierarchy definitions. For more information, see [Defining asset models](https://docs.aws.amazon.com/iot-sitewise/latest/userguide/define-models.html) in the *AWS IoT SiteWise User Guide* .
14
15
  *
15
- * You can create two types of asset models, `ASSET_MODEL` or `COMPONENT_MODEL` .
16
+ * You can create three types of asset models, `ASSET_MODEL` , `COMPONENT_MODEL` , or an `INTERFACE` .
16
17
  *
17
18
  * - *ASSET_MODEL* – (default) An asset model that you can use to create assets. Can't be included as a component in another asset model.
18
19
  * - *COMPONENT_MODEL* – A reusable component that you can include in the composite models of other asset models. You can't create assets directly from this type of asset model.
20
+ * - *INTERFACE* – An interface is a type of model that defines a standard structure that can be applied to different asset models.
19
21
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotsitewise-assetmodel.html}
20
22
  */
21
23
  export type IoTSiteWiseAssetModelProps = {
@@ -66,6 +68,11 @@ export type IoTSiteWiseAssetModelProps = {
66
68
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotsitewise-assetmodel.html#cfn-iotsitewise-assetmodel-assetmodeltype}
67
69
  */
68
70
  AssetModelType?: string | undefined;
71
+ /**
72
+ * a list of asset model and interface relationships
73
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotsitewise-assetmodel.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationships}
74
+ */
75
+ EnforcedAssetModelInterfaceRelationships?: EnforcedAssetModelInterfaceRelationship[] | undefined;
69
76
  /**
70
77
  * A list of key-value pairs that contain metadata for the asset. For more information, see [Tagging your AWS IoT SiteWise resources](https://docs.aws.amazon.com/iot-sitewise/latest/userguide/tag-resources.html) in the *AWS IoT SiteWise User Guide* .
71
78
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iotsitewise-assetmodel.html#cfn-iotsitewise-assetmodel-tags}
@@ -256,6 +263,43 @@ export type DataType = "STRING" | "INTEGER" | "DOUBLE" | "BOOLEAN" | "STRUCT";
256
263
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-datatypespec.html}
257
264
  */
258
265
  export type DataTypeSpec = "AWS/ALARM_STATE";
266
+ /**
267
+ * Contains information about enforced interface property and asset model property
268
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping.html}
269
+ */
270
+ export type EnforcedAssetModelInterfacePropertyMapping = {
271
+ /**
272
+ * The external ID of the enforced asset model property
273
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping-assetmodelpropertyexternalid}
274
+ */
275
+ AssetModelPropertyExternalId?: string | undefined;
276
+ /**
277
+ * The logical ID of the enforced asset model property
278
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping-assetmodelpropertylogicalid}
279
+ */
280
+ AssetModelPropertyLogicalId?: string | undefined;
281
+ /**
282
+ * The external ID of the enforced interface property
283
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacepropertymapping-interfaceassetmodelpropertyexternalid}
284
+ */
285
+ InterfaceAssetModelPropertyExternalId: string;
286
+ };
287
+ /**
288
+ * Contains information about enforced interface hierarchy and asset model hierarchy
289
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationship.html}
290
+ */
291
+ export type EnforcedAssetModelInterfaceRelationship = {
292
+ /**
293
+ * The ID of the interface that is enforced to the asset model
294
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationship.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationship-interfaceassetmodelid}
295
+ */
296
+ InterfaceAssetModelId?: string | undefined;
297
+ /**
298
+ * Contains information about enforced interface property and asset model property
299
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationship.html#cfn-iotsitewise-assetmodel-enforcedassetmodelinterfacerelationship-propertymappings}
300
+ */
301
+ PropertyMappings?: EnforcedAssetModelInterfacePropertyMapping[] | undefined;
302
+ };
259
303
  /**
260
304
  * Contains expression variable information.
261
305
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iotsitewise-assetmodel-expressionvariable.html}
@@ -702,7 +702,7 @@ export type Deserializer = {
702
702
  OpenXJsonSerDe?: OpenXJsonSerDe | undefined;
703
703
  };
704
704
  /**
705
- * Describes the configuration of a destination in Apache Iceberg Tables.
705
+ * Describes the configuration of a destination in Apache Iceberg Tables. This section is only needed for tables where you want to update or delete data.
706
706
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-kinesisfirehose-deliverystream-destinationtableconfiguration.html}
707
707
  */
708
708
  export type DestinationTableConfiguration = {
@@ -23,7 +23,7 @@ export type LambdaUrlProps = {
23
23
  * Use one of the following options:
24
24
  *
25
25
  * - `BUFFERED` – This is the default option. Lambda invokes your function using the `Invoke` API operation. Invocation results are available when the payload is complete. The maximum payload size is 6 MB.
26
- * - `RESPONSE_STREAM` – Your function streams payload results as they become available. Lambda invokes your function using the `InvokeWithResponseStream` API operation. The maximum response payload size is 20 MB, however, you can [request a quota increase](https://docs.aws.amazon.com/servicequotas/latest/userguide/request-quota-increase.html) .
26
+ * - `RESPONSE_STREAM` – Your function streams payload results as they become available. Lambda invokes your function using the `InvokeWithResponseStream` API operation. The maximum response payload size is 200 MB.
27
27
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-url.html#cfn-lambda-url-invokemode}
28
28
  */
29
29
  InvokeMode?: "BUFFERED" | "RESPONSE_STREAM" | undefined;
@@ -52,7 +52,7 @@ export type LambdaVersionProps = {
52
52
  export type LambdaVersionAttribs = {
53
53
  /**
54
54
  * The ARN of the function.
55
- * @pattern ^(arn:(aws[a-zA-Z-]*)?:lambda:)?([a-z]{2}((-gov)|(-iso([a-z]?)))?-[a-z]+-\d{1}:)?(\d{12}:)?(function:)?([a-zA-Z0-9-_]+)(:(\$LATEST(\.PUBLISHED)?|[a-zA-Z0-9-_]+))?$
55
+ * @pattern ^(arn:(aws[a-zA-Z-]*)?:lambda:)?([a-z]{2}((-gov)|(-iso([a-z]?)))?-[a-z]+-\d{1}:)?(\d{12}:)?(function:)?([a-zA-Z0-9-_]+)(:(\$LATEST|[a-zA-Z0-9-_]+))?$
56
56
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-version.html#cfn-lambda-version-functionarn}
57
57
  */
58
58
  FunctionArn: string;
@@ -30,7 +30,7 @@ export type LogsDestinationProps = {
30
30
  */
31
31
  RoleArn: string;
32
32
  /**
33
- * An array of key-value pairs to apply to this resource.
33
+ * The tags that have been assigned to this delivery destination.
34
34
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-destination.html#cfn-logs-destination-tags}
35
35
  */
36
36
  Tags?: Tag[] | undefined;
@@ -455,6 +455,24 @@ export type DrmSystem = "CLEAR_KEY_AES_128" | "FAIRPLAY" | "PLAYREADY" | "WIDEVI
455
455
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpoint-encryption.html}
456
456
  */
457
457
  export type Encryption = {
458
+ /**
459
+ * Excludes SEIG and SGPD boxes from segment metadata in CMAF containers.
460
+ *
461
+ * When set to `true` , MediaPackage omits these DRM metadata boxes from CMAF segments, which can improve compatibility with certain devices and players that don't support these boxes.
462
+ *
463
+ * Important considerations:
464
+ *
465
+ * - This setting only affects CMAF container formats
466
+ * - Key rotation can still be handled through media playlist signaling
467
+ * - PSSH and TENC boxes remain unaffected
468
+ * - Default behavior is preserved when this setting is disabled
469
+ *
470
+ * Valid values: `true` | `false`
471
+ *
472
+ * Default: `false`
473
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-mediapackagev2-originendpoint-encryption.html#cfn-mediapackagev2-originendpoint-encryption-cmafexcludesegmentdrmmetadata}
474
+ */
475
+ CmafExcludeSegmentDrmMetadata?: boolean | undefined;
458
476
  /**
459
477
  * A 128-bit, 16-byte hex value represented by a 32-character string, used in conjunction with the key for encrypting content. If you don't specify a value, then MediaPackage creates the constant initialization vector (IV).
460
478
  * @minLength 32
@@ -1,18 +1,28 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * Use the `Firewall` to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
3
+ * Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
4
4
  *
5
5
  * The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
6
6
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html}
7
7
  */
8
8
  export type NetworkFirewallFirewall = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::Firewall", NetworkFirewallFirewallProps, NetworkFirewallFirewallAttribs>;
9
9
  /**
10
- * Use the `Firewall` to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
10
+ * Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
11
11
  *
12
12
  * The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
13
13
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html}
14
14
  */
15
15
  export type NetworkFirewallFirewallProps = {
16
+ /**
17
+ * A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to `TRUE` , you must first disable this protection before adding or removing Availability Zones.
18
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection}
19
+ */
20
+ AvailabilityZoneChangeProtection?: boolean | undefined;
21
+ /**
22
+ * The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
23
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings}
24
+ */
25
+ AvailabilityZoneMappings?: AvailabilityZoneMapping[] | undefined;
16
26
  /**
17
27
  * A flag indicating whether it is possible to delete the firewall. A setting of `TRUE` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to `TRUE` .
18
28
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-deleteprotection}
@@ -63,7 +73,7 @@ export type NetworkFirewallFirewallProps = {
63
73
  * In addition to these subnets, you can define other endpoints for the firewall in `VpcEndpointAssociation` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
64
74
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings}
65
75
  */
66
- SubnetMappings: SubnetMapping[];
76
+ SubnetMappings?: SubnetMapping[] | undefined;
67
77
  /**
68
78
  * An array of key-value pairs to apply to this resource.
69
79
  *
@@ -71,6 +81,13 @@ export type NetworkFirewallFirewallProps = {
71
81
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-tags}
72
82
  */
73
83
  Tags?: Tag[] | undefined;
84
+ /**
85
+ * The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
86
+ * @maxLength 128
87
+ * @pattern ^tgw-[0-9a-z]+$
88
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid}
89
+ */
90
+ TransitGatewayId?: string | undefined;
74
91
  /**
75
92
  * The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
76
93
  * @minLength 1
@@ -78,7 +95,7 @@ export type NetworkFirewallFirewallProps = {
78
95
  * @pattern ^vpc-[0-9a-f]+$
79
96
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid}
80
97
  */
81
- VpcId: string;
98
+ VpcId?: string | undefined;
82
99
  };
83
100
  /**
84
101
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#aws-resource-networkfirewall-firewall-return-values}
@@ -90,12 +107,12 @@ export type NetworkFirewallFirewallAttribs = {
90
107
  */
91
108
  EndpointIds: string[];
92
109
  /**
93
- * The Amazon Resource Name (ARN) of the `Firewall` .
110
+ * The Amazon Resource Name (ARN) of the firewall.
94
111
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-firewallarn}
95
112
  */
96
113
  FirewallArn: string;
97
114
  /**
98
- * The name of the `Firewall` resource.
115
+ * The name of the firewallresource.
99
116
  * @minLength 36
100
117
  * @maxLength 36
101
118
  * @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
@@ -103,6 +120,19 @@ export type NetworkFirewallFirewallAttribs = {
103
120
  */
104
121
  FirewallId: string;
105
122
  };
123
+ /**
124
+ * Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall. Each mapping represents where the firewall can process traffic. You use these mappings when calling `CreateFirewall` , `AssociateAvailabilityZones` , and `DisassociateAvailabilityZones` .
125
+ *
126
+ * To retrieve the current Availability Zone mappings for a firewall, use `DescribeFirewall` .
127
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html}
128
+ */
129
+ export type AvailabilityZoneMapping = {
130
+ /**
131
+ * The ID of the Availability Zone where the firewall endpoint is located. For example, `us-east-2a` . The Availability Zone must be in the same Region as the transit gateway.
132
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone}
133
+ */
134
+ AvailabilityZone: string;
135
+ };
106
136
  /**
107
137
  * An analysis type.
108
138
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-enabledanalysistype.html}
@@ -1,11 +1,11 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * Use the `FirewallPolicy` to define the stateless and stateful network traffic filtering behavior for your `Firewall` . You can use one firewall policy for multiple firewalls.
3
+ * Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall. You can use one firewall policy for multiple firewalls.
4
4
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html}
5
5
  */
6
6
  export type NetworkFirewallFirewallPolicy = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::FirewallPolicy", NetworkFirewallFirewallPolicyProps, NetworkFirewallFirewallPolicyAttribs>;
7
7
  /**
8
- * Use the `FirewallPolicy` to define the stateless and stateful network traffic filtering behavior for your `Firewall` . You can use one firewall policy for multiple firewalls.
8
+ * Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall. You can use one firewall policy for multiple firewalls.
9
9
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html}
10
10
  */
11
11
  export type NetworkFirewallFirewallPolicyProps = {
@@ -43,12 +43,12 @@ export type NetworkFirewallFirewallPolicyProps = {
43
43
  */
44
44
  export type NetworkFirewallFirewallPolicyAttribs = {
45
45
  /**
46
- * The Amazon Resource Name (ARN) of the `FirewallPolicy` .
46
+ * The Amazon Resource Name (ARN) of the firewall policy.
47
47
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicyarn}
48
48
  */
49
49
  FirewallPolicyArn: string;
50
50
  /**
51
- * The unique ID of the `FirewallPolicy` resource.
51
+ * The unique ID of the firewall policy resource.
52
52
  * @minLength 36
53
53
  * @maxLength 36
54
54
  * @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
@@ -76,8 +76,8 @@ export type ActionDefinition = {
76
76
  *
77
77
  * You can use custom actions in the following places:
78
78
  *
79
- * - In an `RuleGroup.StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
80
- * - In an `FirewallPolicy` specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
79
+ * - In an `StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
80
+ * - In an firewall policy specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
81
81
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-customaction.html}
82
82
  */
83
83
  export type CustomAction = {
@@ -184,7 +184,7 @@ export type FirewallPolicy = {
184
184
  TLSInspectionConfigurationArn?: string | undefined;
185
185
  };
186
186
  /**
187
- * A list of IP addresses and address ranges, in CIDR notation. This is part of a `RuleVariables` .
187
+ * A list of IP addresses and address ranges, in CIDR notation. This is part of a rule variable.
188
188
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-ipset.html}
189
189
  */
190
190
  export type IPSet = {
@@ -259,13 +259,20 @@ export type StatefulRuleGroupOverride = {
259
259
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html}
260
260
  */
261
261
  export type StatefulRuleGroupReference = {
262
+ /**
263
+ * AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
264
+ *
265
+ * > Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
266
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection}
267
+ */
268
+ DeepThreatInspection?: boolean | undefined;
262
269
  /**
263
270
  * The action that allows the policy owner to override the behavior of the rule group within a policy.
264
271
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-override}
265
272
  */
266
273
  Override?: StatefulRuleGroupOverride | undefined;
267
274
  /**
268
- * An integer setting that indicates the order in which to run the stateful rule groups in a single `FirewallPolicy` . This setting only applies to firewall policies that specify the `STRICT_ORDER` rule order in the stateful engine options settings.
275
+ * An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the `STRICT_ORDER` rule order in the stateful engine options settings.
269
276
  *
270
277
  * Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
271
278
  *
@@ -285,7 +292,7 @@ export type StatefulRuleGroupReference = {
285
292
  */
286
293
  export type StatelessRuleGroupReference = {
287
294
  /**
288
- * An integer setting that indicates the order in which to run the stateless rule groups in a single `FirewallPolicy` . Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
295
+ * An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
289
296
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statelessrulegroupreference-priority}
290
297
  */
291
298
  Priority: number;
@@ -1,10 +1,10 @@
1
1
  import type { ResourceDefinition } from "../main.ts";
2
2
  /**
3
- * Use the `LoggingConfiguration` to define the destinations and logging options for an `Firewall` .
3
+ * Use the logging configuration to define the destinations and logging options for an firewall.
4
4
  *
5
5
  * You must change the logging configuration by changing one `LogDestinationConfig` setting at a time in your `LogDestinationConfigs` .
6
6
  *
7
- * You can make only one of the following changes to your `LoggingConfiguration` resource:
7
+ * You can make only one of the following changes to your logging configuration resource:
8
8
  *
9
9
  * - Create a new log destination object by adding a single `LogDestinationConfig` array element to `LogDestinationConfigs` .
10
10
  * - Delete a log destination object by removing a single `LogDestinationConfig` array element from `LogDestinationConfigs` .
@@ -15,11 +15,11 @@ import type { ResourceDefinition } from "../main.ts";
15
15
  */
16
16
  export type NetworkFirewallLoggingConfiguration = ResourceDefinition<"AWS::NetworkFirewall::LoggingConfiguration", NetworkFirewallLoggingConfigurationProps>;
17
17
  /**
18
- * Use the `LoggingConfiguration` to define the destinations and logging options for an `Firewall` .
18
+ * Use the logging configuration to define the destinations and logging options for an firewall.
19
19
  *
20
20
  * You must change the logging configuration by changing one `LogDestinationConfig` setting at a time in your `LogDestinationConfigs` .
21
21
  *
22
- * You can make only one of the following changes to your `LoggingConfiguration` resource:
22
+ * You can make only one of the following changes to your logging configuration resource:
23
23
  *
24
24
  * - Create a new log destination object by adding a single `LogDestinationConfig` array element to `LogDestinationConfigs` .
25
25
  * - Delete a log destination object by removing a single `LogDestinationConfig` array element from `LogDestinationConfigs` .
@@ -34,7 +34,7 @@ export type NetworkFirewallLoggingConfigurationProps = {
34
34
  */
35
35
  EnableMonitoringDashboard?: boolean | undefined;
36
36
  /**
37
- * The Amazon Resource Name (ARN) of the `Firewall` that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
37
+ * The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
38
38
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-firewallarn}
39
39
  */
40
40
  FirewallArn: string;
@@ -47,13 +47,13 @@ export type NetworkFirewallLoggingConfigurationProps = {
47
47
  */
48
48
  FirewallName?: string | undefined;
49
49
  /**
50
- * Defines how AWS Network Firewall performs logging for a `Firewall` .
50
+ * Defines how AWS Network Firewall performs logging for a firewall.
51
51
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration}
52
52
  */
53
53
  LoggingConfiguration: LoggingConfiguration;
54
54
  };
55
55
  /**
56
- * Defines where AWS Network Firewall sends logs for the firewall for one log type. This is used in `LoggingConfiguration` . You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
56
+ * Defines where AWS Network Firewall sends logs for the firewall for one log type. This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
57
57
  *
58
58
  * Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to `DROP` or `ALERT` .
59
59
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-loggingconfiguration-logdestinationconfig.html}
@@ -92,7 +92,7 @@ export type LogDestinationConfig = {
92
92
  LogType: "ALERT" | "FLOW" | "TLS";
93
93
  };
94
94
  /**
95
- * Defines how AWS Network Firewall performs logging for a `Firewall` .
95
+ * Defines how AWS Network Firewall performs logging for a firewall.
96
96
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-loggingconfiguration-loggingconfiguration.html}
97
97
  */
98
98
  export type LoggingConfiguration = {
@@ -1,11 +1,11 @@
1
1
  import type { ResourceDefinitionWithAttributes, Tag } from "../main.ts";
2
2
  /**
3
- * Use the `RuleGroup` to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an `FirewallPolicy` to specify the filtering behavior of an `Firewall` .
3
+ * Use the [](https://docs.aws.amazon.com/RuleGroup) to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
4
4
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html}
5
5
  */
6
6
  export type NetworkFirewallRuleGroup = ResourceDefinitionWithAttributes<"AWS::NetworkFirewall::RuleGroup", NetworkFirewallRuleGroupProps, NetworkFirewallRuleGroupAttribs>;
7
7
  /**
8
- * Use the `RuleGroup` to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an `FirewallPolicy` to specify the filtering behavior of an `Firewall` .
8
+ * Use the [](https://docs.aws.amazon.com/RuleGroup) to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
9
9
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html}
10
10
  */
11
11
  export type NetworkFirewallRuleGroupProps = {
@@ -35,6 +35,16 @@ export type NetworkFirewallRuleGroupProps = {
35
35
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-rulegroupname}
36
36
  */
37
37
  RuleGroupName: string;
38
+ /**
39
+ * A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by `DescribeRuleGroupSummary` .
40
+ *
41
+ * - The `RuleOptions` specified in `SummaryConfiguration`
42
+ * - Rule metadata organization preferences
43
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration}
44
+ */
45
+ SummaryConfiguration?: {
46
+ RuleOptions?: SummaryRuleOption[] | undefined;
47
+ } | undefined;
38
48
  /**
39
49
  * An array of key-value pairs to apply to this resource.
40
50
  *
@@ -54,12 +64,12 @@ export type NetworkFirewallRuleGroupProps = {
54
64
  */
55
65
  export type NetworkFirewallRuleGroupAttribs = {
56
66
  /**
57
- * The Amazon Resource Name (ARN) of the `RuleGroup` .
67
+ * The Amazon Resource Name (ARN) of the rule group.
58
68
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-rulegrouparn}
59
69
  */
60
70
  RuleGroupArn: string;
61
71
  /**
62
- * The unique ID of the `RuleGroup` resource.
72
+ * The unique ID of the rule group resource.
63
73
  * @minLength 36
64
74
  * @maxLength 36
65
75
  * @pattern ^([0-9a-f]{8})-([0-9a-f]{4}-){3}([0-9a-f]{12})$
@@ -81,7 +91,7 @@ export type ActionDefinition = {
81
91
  PublishMetricAction?: PublishMetricAction | undefined;
82
92
  };
83
93
  /**
84
- * A single IP address specification. This is used in the `RuleGroup.MatchAttributes` source and destination specifications.
94
+ * A single IP address specification. This is used in the match attributes source and destination specifications.
85
95
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-address.html}
86
96
  */
87
97
  export type Address = {
@@ -110,8 +120,8 @@ export type Address = {
110
120
  *
111
121
  * You can use custom actions in the following places:
112
122
  *
113
- * - In an `RuleGroup.StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
114
- * - In an `FirewallPolicy` specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
123
+ * - In a `StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
124
+ * - In an firewall policy specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
115
125
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-customaction.html}
116
126
  */
117
127
  export type CustomAction = {
@@ -216,7 +226,7 @@ export type Header = {
216
226
  SourcePort: string;
217
227
  };
218
228
  /**
219
- * A list of IP addresses and address ranges, in CIDR notation. This is part of a `RuleGroup.RuleVariables` .
229
+ * A list of IP addresses and address ranges, in CIDR notation. This is part of a `RuleVariables` .
220
230
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipset.html}
221
231
  */
222
232
  export type IPSet = {
@@ -227,12 +237,12 @@ export type IPSet = {
227
237
  Definition?: string[] | undefined;
228
238
  };
229
239
  /**
230
- * Configures one or more `IPSetReferences` for a Suricata-compatible rule group. An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see [Using IP set references](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall Developer Guide* .
240
+ * Configures one or more IP set references for a Suricata-compatible rule group. An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see [Using IP set references](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall Developer Guide* .
231
241
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html}
232
242
  */
233
243
  export type IPSetReference = {
234
244
  /**
235
- * The Amazon Resource Name (ARN) of the resource to include in the `RuleGroup.IPSetReference` .
245
+ * The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
236
246
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn}
237
247
  */
238
248
  ReferenceArn?: string | undefined;
@@ -280,7 +290,7 @@ export type MatchAttributes = {
280
290
  TCPFlags?: TCPFlagField[] | undefined;
281
291
  };
282
292
  /**
283
- * A single port range specification. This is used for source and destination port ranges in the stateless `RuleGroup.MatchAttributes` .
293
+ * A single port range specification. This is used for source and destination port ranges in the stateless match attributes.
284
294
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-portrange.html}
285
295
  */
286
296
  export type PortRange = {
@@ -317,7 +327,7 @@ export type PublishMetricAction = {
317
327
  Dimensions: Dimension[];
318
328
  };
319
329
  /**
320
- * Configures the `ReferenceSets` for a stateful rule group. For more information, see the [Using IP set references in Suricata compatible rule groups](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall User Guide* .
330
+ * Configures the reference sets for a stateful rule group. For more information, see the [Using IP set references in Suricata compatible rule groups](https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html) in the *Network Firewall User Guide* .
321
331
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-referencesets.html}
322
332
  */
323
333
  export type ReferenceSets = {
@@ -335,7 +345,7 @@ export type RuleDefinition = {
335
345
  /**
336
346
  * The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions.
337
347
  *
338
- * > Network Firewall only forwards a packet for stateful rule inspection if you specify `aws:forward_to_sfe` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify `aws:forward_to_sfe` for the `StatelessDefaultActions` setting for the `FirewallPolicy` .
348
+ * > Network Firewall only forwards a packet for stateful rule inspection if you specify `aws:forward_to_sfe` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify `aws:forward_to_sfe` for the `StatelessDefaultActions` setting for the firewall policy.
339
349
  *
340
350
  * For every rule, you must specify exactly one of the following standard actions.
341
351
  *
@@ -409,7 +419,7 @@ export type RuleOption = {
409
419
  */
410
420
  export type RuleOrder = "DEFAULT_ACTION_ORDER" | "STRICT_ORDER";
411
421
  /**
412
- * Settings that are available for use in the rules in the `RuleGroup` where this is defined. See `CreateRuleGroup` or `UpdateRuleGroup` for usage.
422
+ * Settings that are available for use in the rules in the rule group where this is defined.
413
423
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulevariables.html}
414
424
  */
415
425
  export type RuleVariables = {
@@ -439,7 +449,7 @@ export type RulesSource = {
439
449
  *
440
450
  * These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
441
451
  *
442
- * > You can't use the `priority` keyword if the `RuleOrder` option in `StatefulRuleOptions` is set to `STRICT_ORDER` .
452
+ * > You can't use the `priority` keyword if the `RuleOrder` option in StatefulRuleOptions is set to `STRICT_ORDER` .
443
453
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring}
444
454
  */
445
455
  RulesString?: string | undefined;
@@ -459,7 +469,7 @@ export type RulesSource = {
459
469
  *
460
470
  * For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
461
471
  *
462
- * By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the `HOME_NET` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see `RuleGroup.RuleVariables` in this guide and [Stateful domain list rule groups in AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html) in the *Network Firewall Developer Guide*
472
+ * By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the `HOME_NET` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see `RuleVariables` in this guide and [Stateful domain list rule groups in AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html) in the *Network Firewall Developer Guide*
463
473
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html}
464
474
  */
465
475
  export type RulesSourceList = {
@@ -493,12 +503,12 @@ export type StatefulRule = {
493
503
  * The actions for a stateful rule are defined as follows:
494
504
  *
495
505
  * - *PASS* - Permits the packets to go to the intended destination.
496
- * - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the `Firewall` `LoggingConfiguration` .
506
+ * - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
497
507
  * - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. `REJECT` is available only for TCP traffic.
498
- * - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the `Firewall` `LoggingConfiguration` .
508
+ * - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
499
509
  *
500
510
  * You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with `ALERT` action, verify in the logs that the rule is filtering as you want, then change the action to `DROP` .
501
- * - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the `Firewall` `LoggingConfiguration` .
511
+ * - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a `RST` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
502
512
  *
503
513
  * `REJECT` isn't currently available for use with IMAP and FTP protocols.
504
514
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statefulrule.html#cfn-networkfirewall-rulegroup-statefulrule-action}
@@ -527,7 +537,7 @@ export type StatefulRuleOptions = {
527
537
  RuleOrder?: RuleOrder | undefined;
528
538
  };
529
539
  /**
530
- * A single stateless rule. This is used in `RuleGroup.StatelessRulesAndCustomActions` .
540
+ * A single stateless rule. This is used in `StatelessRulesAndCustomActions` .
531
541
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrule.html}
532
542
  */
533
543
  export type StatelessRule = {
@@ -554,7 +564,7 @@ export type StatelessRule = {
554
564
  */
555
565
  export type StatelessRulesAndCustomActions = {
556
566
  /**
557
- * Defines an array of individual custom action definitions that are available for use by the stateless rules in this `StatelessRulesAndCustomActions` specification. You name each custom action that you define, and then you can use it by name in your stateless rule `RuleGroup.RuleDefinition` `Actions` specification.
567
+ * Defines an array of individual custom action definitions that are available for use by the stateless rules in this `StatelessRulesAndCustomActions` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition `Actions` specification.
558
568
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions}
559
569
  */
560
570
  CustomActions?: CustomAction[] | undefined;
@@ -564,12 +574,16 @@ export type StatelessRulesAndCustomActions = {
564
574
  */
565
575
  StatelessRules: StatelessRule[];
566
576
  };
577
+ /**
578
+ * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryruleoption.html}
579
+ */
580
+ export type SummaryRuleOption = "SID" | "MSG" | "METADATA";
567
581
  /**
568
582
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-tcpflag.html}
569
583
  */
570
584
  export type TCPFlag = "FIN" | "SYN" | "RST" | "PSH" | "ACK" | "URG" | "ECE" | "CWR";
571
585
  /**
572
- * TCP flags and masks to inspect packets for. This is used in the `RuleGroup.MatchAttributes` specification.
586
+ * TCP flags and masks to inspect packets for. This is used in the match attributes specification.
573
587
  *
574
588
  * For example:
575
589
  *