oci-networkfirewall 2.89.4 → 2.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (166) hide show
  1. package/lib/client.d.ts +137 -80
  2. package/lib/client.js +481 -80
  3. package/lib/client.js.map +1 -1
  4. package/lib/model/create-tunnel-inspection-rule-details.d.ts +39 -0
  5. package/lib/model/create-tunnel-inspection-rule-details.js +74 -0
  6. package/lib/model/create-tunnel-inspection-rule-details.js.map +1 -0
  7. package/lib/model/create-vxlan-inspection-rule-details.d.ts +27 -0
  8. package/lib/model/create-vxlan-inspection-rule-details.js +68 -0
  9. package/lib/model/create-vxlan-inspection-rule-details.js.map +1 -0
  10. package/lib/model/index.d.ts +26 -0
  11. package/lib/model/index.js +29 -3
  12. package/lib/model/index.js.map +1 -1
  13. package/lib/model/inspect-action-type.d.ts +32 -0
  14. package/lib/model/inspect-action-type.js +43 -0
  15. package/lib/model/inspect-action-type.js.map +1 -0
  16. package/lib/model/tunnel-inspection-protocol.d.ts +30 -0
  17. package/lib/model/tunnel-inspection-protocol.js +41 -0
  18. package/lib/model/tunnel-inspection-protocol.js.map +1 -0
  19. package/lib/model/tunnel-inspection-rule-summary-collection.d.ts +26 -0
  20. package/lib/model/tunnel-inspection-rule-summary-collection.js +61 -0
  21. package/lib/model/tunnel-inspection-rule-summary-collection.js.map +1 -0
  22. package/lib/model/tunnel-inspection-rule-summary.d.ts +46 -0
  23. package/lib/model/tunnel-inspection-rule-summary.js +68 -0
  24. package/lib/model/tunnel-inspection-rule-summary.js.map +1 -0
  25. package/lib/model/tunnel-inspection-rule.d.ts +47 -0
  26. package/lib/model/tunnel-inspection-rule.js +74 -0
  27. package/lib/model/tunnel-inspection-rule.js.map +1 -0
  28. package/lib/model/update-tunnel-inspection-rule-details.d.ts +35 -0
  29. package/lib/model/update-tunnel-inspection-rule-details.js +74 -0
  30. package/lib/model/update-tunnel-inspection-rule-details.js.map +1 -0
  31. package/lib/model/update-vxlan-inspection-rule-details.d.ts +27 -0
  32. package/lib/model/update-vxlan-inspection-rule-details.js +68 -0
  33. package/lib/model/update-vxlan-inspection-rule-details.js.map +1 -0
  34. package/lib/model/vxlan-inspection-rule-match-criteria.d.ts +31 -0
  35. package/lib/model/vxlan-inspection-rule-match-criteria.js +29 -0
  36. package/lib/model/vxlan-inspection-rule-match-criteria.js.map +1 -0
  37. package/lib/model/vxlan-inspection-rule-profile.d.ts +26 -0
  38. package/lib/model/vxlan-inspection-rule-profile.js +29 -0
  39. package/lib/model/vxlan-inspection-rule-profile.js.map +1 -0
  40. package/lib/model/vxlan-inspection-rule-summary.d.ts +27 -0
  41. package/lib/model/vxlan-inspection-rule-summary.js +68 -0
  42. package/lib/model/vxlan-inspection-rule-summary.js.map +1 -0
  43. package/lib/model/vxlan-inspection-rule.d.ts +27 -0
  44. package/lib/model/vxlan-inspection-rule.js +68 -0
  45. package/lib/model/vxlan-inspection-rule.js.map +1 -0
  46. package/lib/request/apply-network-firewall-policy-request.d.ts +1 -1
  47. package/lib/request/bulk-upload-address-lists-request.d.ts +1 -1
  48. package/lib/request/bulk-upload-application-groups-request.d.ts +1 -1
  49. package/lib/request/bulk-upload-applications-request.d.ts +1 -1
  50. package/lib/request/bulk-upload-decryption-profiles-request.d.ts +1 -1
  51. package/lib/request/bulk-upload-decryption-rules-request.d.ts +1 -1
  52. package/lib/request/bulk-upload-mapped-secrets-request.d.ts +1 -1
  53. package/lib/request/bulk-upload-security-rules-request.d.ts +1 -1
  54. package/lib/request/bulk-upload-service-lists-request.d.ts +1 -1
  55. package/lib/request/bulk-upload-services-request.d.ts +1 -1
  56. package/lib/request/bulk-upload-tunnel-inspection-rules-request.d.ts +50 -0
  57. package/lib/request/bulk-upload-tunnel-inspection-rules-request.js +15 -0
  58. package/lib/request/bulk-upload-tunnel-inspection-rules-request.js.map +1 -0
  59. package/lib/request/bulk-upload-url-lists-request.d.ts +1 -1
  60. package/lib/request/cancel-work-request-request.d.ts +1 -1
  61. package/lib/request/change-network-firewall-compartment-request.d.ts +1 -1
  62. package/lib/request/change-network-firewall-policy-compartment-request.d.ts +1 -1
  63. package/lib/request/clone-network-firewall-policy-request.d.ts +1 -1
  64. package/lib/request/create-address-list-request.d.ts +1 -1
  65. package/lib/request/create-application-group-request.d.ts +1 -1
  66. package/lib/request/create-application-request.d.ts +1 -1
  67. package/lib/request/create-decryption-profile-request.d.ts +1 -1
  68. package/lib/request/create-decryption-rule-request.d.ts +1 -1
  69. package/lib/request/create-mapped-secret-request.d.ts +1 -1
  70. package/lib/request/create-network-firewall-policy-request.d.ts +1 -1
  71. package/lib/request/create-network-firewall-request.d.ts +1 -1
  72. package/lib/request/create-security-rule-request.d.ts +1 -1
  73. package/lib/request/create-service-list-request.d.ts +1 -1
  74. package/lib/request/create-service-request.d.ts +1 -1
  75. package/lib/request/create-tunnel-inspection-rule-request.d.ts +40 -0
  76. package/lib/request/create-tunnel-inspection-rule-request.js +15 -0
  77. package/lib/request/create-tunnel-inspection-rule-request.js.map +1 -0
  78. package/lib/request/create-url-list-request.d.ts +1 -1
  79. package/lib/request/delete-address-list-request.d.ts +1 -1
  80. package/lib/request/delete-application-group-request.d.ts +1 -1
  81. package/lib/request/delete-application-request.d.ts +1 -1
  82. package/lib/request/delete-decryption-profile-request.d.ts +1 -1
  83. package/lib/request/delete-decryption-rule-request.d.ts +1 -1
  84. package/lib/request/delete-mapped-secret-request.d.ts +1 -1
  85. package/lib/request/delete-network-firewall-policy-request.d.ts +1 -1
  86. package/lib/request/delete-network-firewall-request.d.ts +1 -1
  87. package/lib/request/delete-security-rule-request.d.ts +1 -1
  88. package/lib/request/delete-service-list-request.d.ts +1 -1
  89. package/lib/request/delete-service-request.d.ts +1 -1
  90. package/lib/request/delete-tunnel-inspection-rule-request.d.ts +39 -0
  91. package/lib/request/delete-tunnel-inspection-rule-request.js +15 -0
  92. package/lib/request/delete-tunnel-inspection-rule-request.js.map +1 -0
  93. package/lib/request/delete-url-list-request.d.ts +1 -1
  94. package/lib/request/get-address-list-request.d.ts +1 -1
  95. package/lib/request/get-application-group-request.d.ts +1 -1
  96. package/lib/request/get-application-request.d.ts +1 -1
  97. package/lib/request/get-decryption-profile-request.d.ts +1 -1
  98. package/lib/request/get-decryption-rule-request.d.ts +1 -1
  99. package/lib/request/get-mapped-secret-request.d.ts +1 -1
  100. package/lib/request/get-network-firewall-policy-request.d.ts +1 -1
  101. package/lib/request/get-network-firewall-request.d.ts +1 -1
  102. package/lib/request/get-security-rule-request.d.ts +1 -1
  103. package/lib/request/get-service-list-request.d.ts +1 -1
  104. package/lib/request/get-service-request.d.ts +1 -1
  105. package/lib/request/get-tunnel-inspection-rule-request.d.ts +30 -0
  106. package/lib/request/get-tunnel-inspection-rule-request.js +15 -0
  107. package/lib/request/get-tunnel-inspection-rule-request.js.map +1 -0
  108. package/lib/request/get-url-list-request.d.ts +1 -1
  109. package/lib/request/get-work-request-request.d.ts +1 -1
  110. package/lib/request/index.d.ts +12 -0
  111. package/lib/request/index.js +3 -1
  112. package/lib/request/index.js.map +1 -1
  113. package/lib/request/list-address-lists-request.d.ts +1 -1
  114. package/lib/request/list-application-groups-request.d.ts +1 -1
  115. package/lib/request/list-applications-request.d.ts +1 -1
  116. package/lib/request/list-decryption-profiles-request.d.ts +1 -1
  117. package/lib/request/list-decryption-rules-request.d.ts +1 -1
  118. package/lib/request/list-mapped-secrets-request.d.ts +1 -1
  119. package/lib/request/list-network-firewall-policies-request.d.ts +1 -1
  120. package/lib/request/list-network-firewalls-request.d.ts +1 -1
  121. package/lib/request/list-security-rules-request.d.ts +1 -1
  122. package/lib/request/list-service-lists-request.d.ts +1 -1
  123. package/lib/request/list-services-request.d.ts +1 -1
  124. package/lib/request/list-tunnel-inspection-rules-request.d.ts +58 -0
  125. package/lib/request/list-tunnel-inspection-rules-request.js +24 -0
  126. package/lib/request/list-tunnel-inspection-rules-request.js.map +1 -0
  127. package/lib/request/list-url-lists-request.d.ts +1 -1
  128. package/lib/request/list-work-request-errors-request.d.ts +1 -1
  129. package/lib/request/list-work-request-logs-request.d.ts +1 -1
  130. package/lib/request/list-work-requests-request.d.ts +1 -1
  131. package/lib/request/migrate-network-firewall-policy-request.d.ts +1 -1
  132. package/lib/request/update-address-list-request.d.ts +1 -1
  133. package/lib/request/update-application-group-request.d.ts +1 -1
  134. package/lib/request/update-application-request.d.ts +1 -1
  135. package/lib/request/update-decryption-profile-request.d.ts +1 -1
  136. package/lib/request/update-decryption-rule-request.d.ts +1 -1
  137. package/lib/request/update-mapped-secret-request.d.ts +1 -1
  138. package/lib/request/update-network-firewall-policy-request.d.ts +1 -1
  139. package/lib/request/update-network-firewall-request.d.ts +1 -1
  140. package/lib/request/update-security-rule-request.d.ts +1 -1
  141. package/lib/request/update-service-list-request.d.ts +1 -1
  142. package/lib/request/update-service-request.d.ts +1 -1
  143. package/lib/request/update-tunnel-inspection-rule-request.d.ts +44 -0
  144. package/lib/request/update-tunnel-inspection-rule-request.js +15 -0
  145. package/lib/request/update-tunnel-inspection-rule-request.js.map +1 -0
  146. package/lib/request/update-url-list-request.d.ts +1 -1
  147. package/lib/response/bulk-upload-tunnel-inspection-rules-response.d.ts +25 -0
  148. package/lib/response/bulk-upload-tunnel-inspection-rules-response.js +15 -0
  149. package/lib/response/bulk-upload-tunnel-inspection-rules-response.js.map +1 -0
  150. package/lib/response/create-tunnel-inspection-rule-response.d.ts +30 -0
  151. package/lib/response/create-tunnel-inspection-rule-response.js +15 -0
  152. package/lib/response/create-tunnel-inspection-rule-response.js.map +1 -0
  153. package/lib/response/delete-tunnel-inspection-rule-response.d.ts +20 -0
  154. package/lib/response/delete-tunnel-inspection-rule-response.js +15 -0
  155. package/lib/response/delete-tunnel-inspection-rule-response.js.map +1 -0
  156. package/lib/response/get-tunnel-inspection-rule-response.d.ts +30 -0
  157. package/lib/response/get-tunnel-inspection-rule-response.js +15 -0
  158. package/lib/response/get-tunnel-inspection-rule-response.js.map +1 -0
  159. package/lib/response/index.d.ts +12 -0
  160. package/lib/response/list-tunnel-inspection-rules-response.d.ts +46 -0
  161. package/lib/response/list-tunnel-inspection-rules-response.js +15 -0
  162. package/lib/response/list-tunnel-inspection-rules-response.js.map +1 -0
  163. package/lib/response/update-tunnel-inspection-rule-response.d.ts +30 -0
  164. package/lib/response/update-tunnel-inspection-rule-response.js +15 -0
  165. package/lib/response/update-tunnel-inspection-rule-response.js.map +1 -0
  166. package/package.json +3 -3
@@ -0,0 +1,61 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.TunnelInspectionRuleSummaryCollection = void 0;
35
+ const model = __importStar(require("../model"));
36
+ var TunnelInspectionRuleSummaryCollection;
37
+ (function (TunnelInspectionRuleSummaryCollection) {
38
+ function getJsonObj(obj) {
39
+ const jsonObj = Object.assign(Object.assign({}, obj), {
40
+ "items": obj.items
41
+ ? obj.items.map(item => {
42
+ return model.TunnelInspectionRuleSummary.getJsonObj(item);
43
+ })
44
+ : undefined
45
+ });
46
+ return jsonObj;
47
+ }
48
+ TunnelInspectionRuleSummaryCollection.getJsonObj = getJsonObj;
49
+ function getDeserializedJsonObj(obj) {
50
+ const jsonObj = Object.assign(Object.assign({}, obj), {
51
+ "items": obj.items
52
+ ? obj.items.map(item => {
53
+ return model.TunnelInspectionRuleSummary.getDeserializedJsonObj(item);
54
+ })
55
+ : undefined
56
+ });
57
+ return jsonObj;
58
+ }
59
+ TunnelInspectionRuleSummaryCollection.getDeserializedJsonObj = getDeserializedJsonObj;
60
+ })(TunnelInspectionRuleSummaryCollection = exports.TunnelInspectionRuleSummaryCollection || (exports.TunnelInspectionRuleSummaryCollection = {}));
61
+ //# sourceMappingURL=tunnel-inspection-rule-summary-collection.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tunnel-inspection-rule-summary-collection.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/tunnel-inspection-rule-summary-collection.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAalC,IAAiB,qCAAqC,CA6BrD;AA7BD,WAAiB,qCAAqC;IACpD,SAAgB,UAAU,CAAC,GAA0C;QACnE,MAAM,OAAO,mCACR,GAAG,GACH;YACD,OAAO,EAAE,GAAG,CAAC,KAAK;gBAChB,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACnB,OAAO,KAAK,CAAC,2BAA2B,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;gBAC5D,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAbe,gDAAU,aAazB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAA0C;QAC/E,MAAM,OAAO,mCACR,GAAG,GACH;YACD,OAAO,EAAE,GAAG,CAAC,KAAK;gBAChB,CAAC,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACnB,OAAO,KAAK,CAAC,2BAA2B,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACxE,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAbe,4DAAsB,yBAarC,CAAA;AACH,CAAC,EA7BgB,qCAAqC,GAArC,6CAAqC,KAArC,6CAAqC,QA6BrD"}
@@ -0,0 +1,46 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Summary for the Tunnel Inspection Rule used in the firewall policy rules.
16
+ * Tunnel Inspection Rule determines whether tunnel inspection is applied on the traffic based on attributes
17
+ * such as Tunnel Inspect protocol, the source and destination IP address.
18
+ *
19
+ */
20
+ export interface TunnelInspectionRuleSummary {
21
+ /**
22
+ * Name for the Tunnel Inspection Rule, must be unique within the policy.
23
+ */
24
+ "name": string;
25
+ /**
26
+ * Types of Inspect Action on the Traffic flow.
27
+ * <p>
28
+ * INSPECT - Inspect the traffic.
29
+ * * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
30
+ *
31
+ */
32
+ "action"?: model.InspectActionType;
33
+ /**
34
+ * The priority order in which this rule should be evaluated Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
35
+ */
36
+ "priorityOrder": number;
37
+ /**
38
+ * OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
39
+ */
40
+ "parentResourceId": string;
41
+ "protocol": string;
42
+ }
43
+ export declare namespace TunnelInspectionRuleSummary {
44
+ function getJsonObj(obj: TunnelInspectionRuleSummary): object;
45
+ function getDeserializedJsonObj(obj: TunnelInspectionRuleSummary): object;
46
+ }
@@ -0,0 +1,68 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.TunnelInspectionRuleSummary = void 0;
35
+ const model = __importStar(require("../model"));
36
+ const common = require("oci-common");
37
+ var TunnelInspectionRuleSummary;
38
+ (function (TunnelInspectionRuleSummary) {
39
+ function getJsonObj(obj) {
40
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
41
+ if (obj && "protocol" in obj && obj.protocol) {
42
+ switch (obj.protocol) {
43
+ case "VXLAN":
44
+ return model.VxlanInspectionRuleSummary.getJsonObj(jsonObj, true);
45
+ default:
46
+ if (common.LOG.logger)
47
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
48
+ }
49
+ }
50
+ return jsonObj;
51
+ }
52
+ TunnelInspectionRuleSummary.getJsonObj = getJsonObj;
53
+ function getDeserializedJsonObj(obj) {
54
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
55
+ if (obj && "protocol" in obj && obj.protocol) {
56
+ switch (obj.protocol) {
57
+ case "VXLAN":
58
+ return model.VxlanInspectionRuleSummary.getDeserializedJsonObj(jsonObj, true);
59
+ default:
60
+ if (common.LOG.logger)
61
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
62
+ }
63
+ }
64
+ return jsonObj;
65
+ }
66
+ TunnelInspectionRuleSummary.getDeserializedJsonObj = getDeserializedJsonObj;
67
+ })(TunnelInspectionRuleSummary = exports.TunnelInspectionRuleSummary || (exports.TunnelInspectionRuleSummary = {}));
68
+ //# sourceMappingURL=tunnel-inspection-rule-summary.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tunnel-inspection-rule-summary.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/tunnel-inspection-rule-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAiCtC,IAAiB,2BAA2B,CAiC3C;AAjCD,WAAiB,2BAA2B;IAC1C,SAAgB,UAAU,CAAC,GAAgC;QACzD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,0BAA0B,CAAC,UAAU,CACL,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,sCAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAgC;QACrE,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,0BAA0B,CAAC,sBAAsB,CACjB,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,kDAAsB,yBAerC,CAAA;AACH,CAAC,EAjCgB,2BAA2B,GAA3B,mCAA2B,KAA3B,mCAA2B,QAiC3C"}
@@ -0,0 +1,47 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Tunnel Inspection Rule used in the firewall policy rules.
16
+ * Tunnel Inspection Rule determines whether tunnel inspection is applied on the traffic based on attributes
17
+ * such as Tunnel Inspect protocol, the source and destination IP addresses.
18
+ *
19
+ */
20
+ export interface TunnelInspectionRule {
21
+ /**
22
+ * Name for the Tunnel Inspection Rule, must be unique within the policy.
23
+ */
24
+ "name": string;
25
+ /**
26
+ * Types of Inspect Action on the Traffic flow.
27
+ * <p>
28
+ * INSPECT - Inspect the traffic.
29
+ * * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
30
+ *
31
+ */
32
+ "action"?: model.InspectActionType;
33
+ /**
34
+ * The priority order in which this rule should be evaluated Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
35
+ */
36
+ "priorityOrder"?: number;
37
+ "position"?: model.RulePosition;
38
+ /**
39
+ * OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
40
+ */
41
+ "parentResourceId": string;
42
+ "protocol": string;
43
+ }
44
+ export declare namespace TunnelInspectionRule {
45
+ function getJsonObj(obj: TunnelInspectionRule): object;
46
+ function getDeserializedJsonObj(obj: TunnelInspectionRule): object;
47
+ }
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.TunnelInspectionRule = void 0;
35
+ const model = __importStar(require("../model"));
36
+ const common = require("oci-common");
37
+ var TunnelInspectionRule;
38
+ (function (TunnelInspectionRule) {
39
+ function getJsonObj(obj) {
40
+ const jsonObj = Object.assign(Object.assign({}, obj), {
41
+ "position": obj.position ? model.RulePosition.getJsonObj(obj.position) : undefined
42
+ });
43
+ if (obj && "protocol" in obj && obj.protocol) {
44
+ switch (obj.protocol) {
45
+ case "VXLAN":
46
+ return model.VxlanInspectionRule.getJsonObj(jsonObj, true);
47
+ default:
48
+ if (common.LOG.logger)
49
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
50
+ }
51
+ }
52
+ return jsonObj;
53
+ }
54
+ TunnelInspectionRule.getJsonObj = getJsonObj;
55
+ function getDeserializedJsonObj(obj) {
56
+ const jsonObj = Object.assign(Object.assign({}, obj), {
57
+ "position": obj.position
58
+ ? model.RulePosition.getDeserializedJsonObj(obj.position)
59
+ : undefined
60
+ });
61
+ if (obj && "protocol" in obj && obj.protocol) {
62
+ switch (obj.protocol) {
63
+ case "VXLAN":
64
+ return model.VxlanInspectionRule.getDeserializedJsonObj(jsonObj, true);
65
+ default:
66
+ if (common.LOG.logger)
67
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
68
+ }
69
+ }
70
+ return jsonObj;
71
+ }
72
+ TunnelInspectionRule.getDeserializedJsonObj = getDeserializedJsonObj;
73
+ })(TunnelInspectionRule = exports.TunnelInspectionRule || (exports.TunnelInspectionRule = {}));
74
+ //# sourceMappingURL=tunnel-inspection-rule.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tunnel-inspection-rule.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/tunnel-inspection-rule.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAkCtC,IAAiB,oBAAoB,CA6CpC;AA7CD,WAAiB,oBAAoB;IACnC,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,UAAU,EAAE,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS;SACnF,CACF,CAAC;QAEF,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,mBAAmB,CAAC,UAAU,CACL,OAAQ,EAC5C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,+BAAU,aAoBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCACR,GAAG,GACH;YACD,UAAU,EAAE,GAAG,CAAC,QAAQ;gBACtB,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,sBAAsB,CAAC,GAAG,CAAC,QAAQ,CAAC;gBACzD,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,mBAAmB,CAAC,sBAAsB,CACjB,OAAQ,EAC5C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAtBe,2CAAsB,yBAsBrC,CAAA;AACH,CAAC,EA7CgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QA6CpC"}
@@ -0,0 +1,35 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Update Request for creating Tunnel Inspection Rule used in the firewall policy rules.
16
+ * Tunnel Inspection Rule determines whether tunnel inspection is applied on the traffic based on attributes
17
+ * such as Tunnel Inspect protocol, the source and destination IP address.
18
+ *
19
+ */
20
+ export interface UpdateTunnelInspectionRuleDetails {
21
+ /**
22
+ * Types of Inspect Action on the Traffic flow.
23
+ * <p>
24
+ * INSPECT - Inspect the traffic.
25
+ * * INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
26
+ *
27
+ */
28
+ "action"?: model.InspectActionType;
29
+ "position"?: model.RulePosition;
30
+ "protocol": string;
31
+ }
32
+ export declare namespace UpdateTunnelInspectionRuleDetails {
33
+ function getJsonObj(obj: UpdateTunnelInspectionRuleDetails): object;
34
+ function getDeserializedJsonObj(obj: UpdateTunnelInspectionRuleDetails): object;
35
+ }
@@ -0,0 +1,74 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.UpdateTunnelInspectionRuleDetails = void 0;
35
+ const model = __importStar(require("../model"));
36
+ const common = require("oci-common");
37
+ var UpdateTunnelInspectionRuleDetails;
38
+ (function (UpdateTunnelInspectionRuleDetails) {
39
+ function getJsonObj(obj) {
40
+ const jsonObj = Object.assign(Object.assign({}, obj), {
41
+ "position": obj.position ? model.RulePosition.getJsonObj(obj.position) : undefined
42
+ });
43
+ if (obj && "protocol" in obj && obj.protocol) {
44
+ switch (obj.protocol) {
45
+ case "VXLAN":
46
+ return model.UpdateVxlanInspectionRuleDetails.getJsonObj(jsonObj, true);
47
+ default:
48
+ if (common.LOG.logger)
49
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
50
+ }
51
+ }
52
+ return jsonObj;
53
+ }
54
+ UpdateTunnelInspectionRuleDetails.getJsonObj = getJsonObj;
55
+ function getDeserializedJsonObj(obj) {
56
+ const jsonObj = Object.assign(Object.assign({}, obj), {
57
+ "position": obj.position
58
+ ? model.RulePosition.getDeserializedJsonObj(obj.position)
59
+ : undefined
60
+ });
61
+ if (obj && "protocol" in obj && obj.protocol) {
62
+ switch (obj.protocol) {
63
+ case "VXLAN":
64
+ return model.UpdateVxlanInspectionRuleDetails.getDeserializedJsonObj(jsonObj, true);
65
+ default:
66
+ if (common.LOG.logger)
67
+ common.LOG.logger.info(`Unknown value for: ${obj.protocol}`);
68
+ }
69
+ }
70
+ return jsonObj;
71
+ }
72
+ UpdateTunnelInspectionRuleDetails.getDeserializedJsonObj = getDeserializedJsonObj;
73
+ })(UpdateTunnelInspectionRuleDetails = exports.UpdateTunnelInspectionRuleDetails || (exports.UpdateTunnelInspectionRuleDetails = {}));
74
+ //# sourceMappingURL=update-tunnel-inspection-rule-details.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"update-tunnel-inspection-rule-details.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/update-tunnel-inspection-rule-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAsBtC,IAAiB,iCAAiC,CA6CjD;AA7CD,WAAiB,iCAAiC;IAChD,SAAgB,UAAU,CAAC,GAAsC;QAC/D,MAAM,OAAO,mCACR,GAAG,GACH;YACD,UAAU,EAAE,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS;SACnF,CACF,CAAC;QAEF,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,gCAAgC,CAAC,UAAU,CACL,OAAQ,EACzD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,4CAAU,aAoBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAsC;QAC3E,MAAM,OAAO,mCACR,GAAG,GACH;YACD,UAAU,EAAE,GAAG,CAAC,QAAQ;gBACtB,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,sBAAsB,CAAC,GAAG,CAAC,QAAQ,CAAC;gBACzD,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,gCAAgC,CAAC,sBAAsB,CACjB,OAAQ,EACzD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAtBe,wDAAsB,yBAsBrC,CAAA;AACH,CAAC,EA7CgB,iCAAiC,GAAjC,yCAAiC,KAAjC,yCAAiC,QA6CjD"}
@@ -0,0 +1,27 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Update Request for creating Vxlan Tunnel Inspection Rule used in the firewall policy rules.
16
+ *
17
+ */
18
+ export interface UpdateVxlanInspectionRuleDetails extends model.UpdateTunnelInspectionRuleDetails {
19
+ "condition": model.VxlanInspectionRuleMatchCriteria;
20
+ "profile"?: model.VxlanInspectionRuleProfile;
21
+ "protocol": string;
22
+ }
23
+ export declare namespace UpdateVxlanInspectionRuleDetails {
24
+ function getJsonObj(obj: UpdateVxlanInspectionRuleDetails, isParentJsonObj?: boolean): object;
25
+ const protocol = "VXLAN";
26
+ function getDeserializedJsonObj(obj: UpdateVxlanInspectionRuleDetails, isParentJsonObj?: boolean): object;
27
+ }
@@ -0,0 +1,68 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.UpdateVxlanInspectionRuleDetails = void 0;
35
+ const model = __importStar(require("../model"));
36
+ var UpdateVxlanInspectionRuleDetails;
37
+ (function (UpdateVxlanInspectionRuleDetails) {
38
+ function getJsonObj(obj, isParentJsonObj) {
39
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
40
+ ? obj
41
+ : model.UpdateTunnelInspectionRuleDetails.getJsonObj(obj))), {
42
+ "condition": obj.condition
43
+ ? model.VxlanInspectionRuleMatchCriteria.getJsonObj(obj.condition)
44
+ : undefined,
45
+ "profile": obj.profile
46
+ ? model.VxlanInspectionRuleProfile.getJsonObj(obj.profile)
47
+ : undefined
48
+ });
49
+ return jsonObj;
50
+ }
51
+ UpdateVxlanInspectionRuleDetails.getJsonObj = getJsonObj;
52
+ UpdateVxlanInspectionRuleDetails.protocol = "VXLAN";
53
+ function getDeserializedJsonObj(obj, isParentJsonObj) {
54
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
55
+ ? obj
56
+ : model.UpdateTunnelInspectionRuleDetails.getDeserializedJsonObj(obj))), {
57
+ "condition": obj.condition
58
+ ? model.VxlanInspectionRuleMatchCriteria.getDeserializedJsonObj(obj.condition)
59
+ : undefined,
60
+ "profile": obj.profile
61
+ ? model.VxlanInspectionRuleProfile.getDeserializedJsonObj(obj.profile)
62
+ : undefined
63
+ });
64
+ return jsonObj;
65
+ }
66
+ UpdateVxlanInspectionRuleDetails.getDeserializedJsonObj = getDeserializedJsonObj;
67
+ })(UpdateVxlanInspectionRuleDetails = exports.UpdateVxlanInspectionRuleDetails || (exports.UpdateVxlanInspectionRuleDetails = {}));
68
+ //# sourceMappingURL=update-vxlan-inspection-rule-details.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"update-vxlan-inspection-rule-details.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/update-vxlan-inspection-rule-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAclC,IAAiB,gCAAgC,CA8ChD;AA9CD,WAAiB,gCAAgC;IAC/C,SAAgB,UAAU,CACxB,GAAqC,EACrC,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,iCAAiC,CAAC,UAAU,CACjD,GAAG,CACiC,CAAC,GACxC;YACD,WAAW,EAAE,GAAG,CAAC,SAAS;gBACxB,CAAC,CAAC,KAAK,CAAC,gCAAgC,CAAC,UAAU,CAAC,GAAG,CAAC,SAAS,CAAC;gBAClE,CAAC,CAAC,SAAS;YACb,SAAS,EAAE,GAAG,CAAC,OAAO;gBACpB,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,UAAU,CAAC,GAAG,CAAC,OAAO,CAAC;gBAC1D,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IArBe,2CAAU,aAqBzB,CAAA;IACY,yCAAQ,GAAG,OAAO,CAAC;IAChC,SAAgB,sBAAsB,CACpC,GAAqC,EACrC,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,iCAAiC,CAAC,sBAAsB,CAC7D,GAAG,CACiC,CAAC,GACxC;YACD,WAAW,EAAE,GAAG,CAAC,SAAS;gBACxB,CAAC,CAAC,KAAK,CAAC,gCAAgC,CAAC,sBAAsB,CAAC,GAAG,CAAC,SAAS,CAAC;gBAC9E,CAAC,CAAC,SAAS;YACb,SAAS,EAAE,GAAG,CAAC,OAAO;gBACpB,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,sBAAsB,CAAC,GAAG,CAAC,OAAO,CAAC;gBACtE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IArBe,uDAAsB,yBAqBrC,CAAA;AACH,CAAC,EA9CgB,gCAAgC,GAAhC,wCAAgC,KAAhC,wCAAgC,QA8ChD"}
@@ -0,0 +1,31 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ /**
14
+ * Criteria to evaluate against incoming network traffic.
15
+ * A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
16
+ *
17
+ */
18
+ export interface VxlanInspectionRuleMatchCriteria {
19
+ /**
20
+ * An array of address list names to be evaluated against the traffic source address.
21
+ */
22
+ "sourceAddress"?: Array<string>;
23
+ /**
24
+ * An array of address list names to be evaluated against the traffic destination address.
25
+ */
26
+ "destinationAddress"?: Array<string>;
27
+ }
28
+ export declare namespace VxlanInspectionRuleMatchCriteria {
29
+ function getJsonObj(obj: VxlanInspectionRuleMatchCriteria): object;
30
+ function getDeserializedJsonObj(obj: VxlanInspectionRuleMatchCriteria): object;
31
+ }
@@ -0,0 +1,29 @@
1
+ "use strict";
2
+ /**
3
+ * Network Firewall API
4
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
5
+ * OpenAPI spec version: 20230501
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.VxlanInspectionRuleMatchCriteria = void 0;
16
+ var VxlanInspectionRuleMatchCriteria;
17
+ (function (VxlanInspectionRuleMatchCriteria) {
18
+ function getJsonObj(obj) {
19
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
20
+ return jsonObj;
21
+ }
22
+ VxlanInspectionRuleMatchCriteria.getJsonObj = getJsonObj;
23
+ function getDeserializedJsonObj(obj) {
24
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
25
+ return jsonObj;
26
+ }
27
+ VxlanInspectionRuleMatchCriteria.getDeserializedJsonObj = getDeserializedJsonObj;
28
+ })(VxlanInspectionRuleMatchCriteria = exports.VxlanInspectionRuleMatchCriteria || (exports.VxlanInspectionRuleMatchCriteria = {}));
29
+ //# sourceMappingURL=vxlan-inspection-rule-match-criteria.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"vxlan-inspection-rule-match-criteria.js","sourceRoot":"","sources":["../../../../../lib/networkfirewall/lib/model/vxlan-inspection-rule-match-criteria.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AAqBH,IAAiB,gCAAgC,CAWhD;AAXD,WAAiB,gCAAgC;IAC/C,SAAgB,UAAU,CAAC,GAAqC;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,2CAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAqC;QAC1E,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,uDAAsB,yBAIrC,CAAA;AACH,CAAC,EAXgB,gCAAgC,GAAhC,wCAAgC,KAAhC,wCAAgC,QAWhD"}
@@ -0,0 +1,26 @@
1
+ /**
2
+ * Network Firewall API
3
+ * Use the Network Firewall API to create network firewalls and configure policies that regulates network traffic in and across VCNs.
4
+ * OpenAPI spec version: 20230501
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ /**
14
+ * Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
15
+ *
16
+ */
17
+ export interface VxlanInspectionRuleProfile {
18
+ /**
19
+ * Return scanned VXLAN tunnel traffic to source.
20
+ */
21
+ "mustReturnTrafficToSource"?: boolean;
22
+ }
23
+ export declare namespace VxlanInspectionRuleProfile {
24
+ function getJsonObj(obj: VxlanInspectionRuleProfile): object;
25
+ function getDeserializedJsonObj(obj: VxlanInspectionRuleProfile): object;
26
+ }