aws-cdk-lib 2.195.0__py3-none-any.whl → 2.224.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +1806 -417
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.195.0.jsii.tgz → aws-cdk-lib@2.224.0.jsii.tgz} +0 -0
- aws_cdk/alexa_ask/__init__.py +12 -2
- aws_cdk/aws_accessanalyzer/__init__.py +323 -6
- aws_cdk/aws_acmpca/__init__.py +53 -10
- aws_cdk/aws_aiops/__init__.py +1019 -0
- aws_cdk/aws_amazonmq/__init__.py +357 -313
- aws_cdk/aws_amplify/__init__.py +173 -17
- aws_cdk/aws_amplifyuibuilder/__init__.py +35 -6
- aws_cdk/aws_apigateway/__init__.py +1245 -215
- aws_cdk/aws_apigatewayv2/__init__.py +3890 -476
- aws_cdk/aws_apigatewayv2_integrations/__init__.py +94 -16
- aws_cdk/aws_appconfig/__init__.py +618 -91
- aws_cdk/aws_appflow/__init__.py +151 -6
- aws_cdk/aws_appintegrations/__init__.py +546 -6
- aws_cdk/aws_applicationautoscaling/__init__.py +75 -10
- aws_cdk/aws_applicationinsights/__init__.py +13 -2
- aws_cdk/aws_applicationsignals/__init__.py +374 -6
- aws_cdk/aws_appmesh/__init__.py +136 -26
- aws_cdk/aws_apprunner/__init__.py +66 -18
- aws_cdk/aws_appstream/__init__.py +309 -55
- aws_cdk/aws_appsync/__init__.py +350 -94
- aws_cdk/aws_apptest/__init__.py +71 -2
- aws_cdk/aws_aps/__init__.py +2188 -94
- aws_cdk/aws_arcregionswitch/__init__.py +5095 -0
- aws_cdk/aws_arczonalshift/__init__.py +39 -12
- aws_cdk/aws_athena/__init__.py +365 -29
- aws_cdk/aws_auditmanager/__init__.py +71 -2
- aws_cdk/aws_autoscaling/__init__.py +165 -60
- aws_cdk/aws_autoscaling_common/__init__.py +3 -0
- aws_cdk/aws_autoscalingplans/__init__.py +13 -2
- aws_cdk/aws_b2bi/__init__.py +1819 -99
- aws_cdk/aws_backup/__init__.py +370 -42
- aws_cdk/aws_backupgateway/__init__.py +13 -2
- aws_cdk/aws_batch/__init__.py +1462 -163
- aws_cdk/aws_bcmdataexports/__init__.py +21 -2
- aws_cdk/aws_bedrock/__init__.py +7867 -727
- aws_cdk/aws_bedrockagentcore/__init__.py +10425 -0
- aws_cdk/aws_billingconductor/__init__.py +197 -11
- aws_cdk/aws_budgets/__init__.py +611 -4
- aws_cdk/aws_cassandra/__init__.py +247 -6
- aws_cdk/aws_ce/__init__.py +35 -6
- aws_cdk/aws_certificatemanager/__init__.py +258 -32
- aws_cdk/aws_chatbot/__init__.py +76 -6
- aws_cdk/aws_cleanrooms/__init__.py +709 -206
- aws_cdk/aws_cleanroomsml/__init__.py +13 -2
- aws_cdk/aws_cloud9/__init__.py +13 -2
- aws_cdk/aws_cloudformation/__init__.py +362 -189
- aws_cdk/aws_cloudfront/__init__.py +2188 -674
- aws_cdk/aws_cloudfront/experimental/__init__.py +114 -16
- aws_cdk/aws_cloudfront_origins/__init__.py +615 -74
- aws_cdk/aws_cloudtrail/__init__.py +311 -21
- aws_cdk/aws_cloudwatch/__init__.py +3093 -1038
- aws_cdk/aws_cloudwatch_actions/__init__.py +75 -1
- aws_cdk/aws_codeartifact/__init__.py +35 -6
- aws_cdk/aws_codebuild/__init__.py +1303 -135
- aws_cdk/aws_codecommit/__init__.py +29 -9
- aws_cdk/aws_codeconnections/__init__.py +13 -2
- aws_cdk/aws_codedeploy/__init__.py +130 -6
- aws_cdk/aws_codeguruprofiler/__init__.py +80 -2
- aws_cdk/aws_codegurureviewer/__init__.py +13 -2
- aws_cdk/aws_codepipeline/__init__.py +177 -71
- aws_cdk/aws_codepipeline_actions/__init__.py +753 -4
- aws_cdk/aws_codestar/__init__.py +13 -2
- aws_cdk/aws_codestarconnections/__init__.py +35 -6
- aws_cdk/aws_codestarnotifications/__init__.py +22 -2
- aws_cdk/aws_cognito/__init__.py +905 -92
- aws_cdk/aws_cognito_identitypool/__init__.py +23 -12
- aws_cdk/aws_comprehend/__init__.py +24 -4
- aws_cdk/aws_config/__init__.py +227 -30
- aws_cdk/aws_connect/__init__.py +2736 -191
- aws_cdk/aws_connectcampaigns/__init__.py +13 -2
- aws_cdk/aws_connectcampaignsv2/__init__.py +268 -6
- aws_cdk/aws_controltower/__init__.py +35 -6
- aws_cdk/aws_cur/__init__.py +100 -4
- aws_cdk/aws_customerprofiles/__init__.py +617 -27
- aws_cdk/aws_databrew/__init__.py +68 -12
- aws_cdk/aws_datapipeline/__init__.py +42 -2
- aws_cdk/aws_datasync/__init__.py +1514 -977
- aws_cdk/aws_datazone/__init__.py +7426 -1763
- aws_cdk/aws_dax/__init__.py +83 -6
- aws_cdk/aws_deadline/__init__.py +511 -36
- aws_cdk/aws_detective/__init__.py +35 -6
- aws_cdk/aws_devicefarm/__init__.py +68 -12
- aws_cdk/aws_devopsguru/__init__.py +37 -6
- aws_cdk/aws_directoryservice/__init__.py +53 -4
- aws_cdk/aws_dlm/__init__.py +13 -2
- aws_cdk/aws_dms/__init__.py +184 -27
- aws_cdk/aws_docdb/__init__.py +350 -49
- aws_cdk/aws_docdbelastic/__init__.py +13 -2
- aws_cdk/aws_dsql/__init__.py +386 -16
- aws_cdk/aws_dynamodb/__init__.py +1479 -170
- aws_cdk/aws_ec2/__init__.py +10465 -1335
- aws_cdk/aws_ecr/__init__.py +637 -43
- aws_cdk/aws_ecr_assets/__init__.py +10 -0
- aws_cdk/aws_ecs/__init__.py +6629 -490
- aws_cdk/aws_ecs_patterns/__init__.py +124 -12
- aws_cdk/aws_efs/__init__.py +276 -24
- aws_cdk/aws_eks/__init__.py +1132 -227
- aws_cdk/aws_elasticache/__init__.py +378 -25
- aws_cdk/aws_elasticbeanstalk/__init__.py +75 -8
- aws_cdk/aws_elasticloadbalancing/__init__.py +22 -2
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +1796 -123
- aws_cdk/aws_elasticsearch/__init__.py +291 -9
- aws_cdk/aws_emr/__init__.py +219 -18
- aws_cdk/aws_emrcontainers/__init__.py +71 -2
- aws_cdk/aws_emrserverless/__init__.py +188 -3
- aws_cdk/aws_entityresolution/__init__.py +585 -58
- aws_cdk/aws_events/__init__.py +1007 -126
- aws_cdk/aws_events_targets/__init__.py +398 -65
- aws_cdk/aws_eventschemas/__init__.py +46 -8
- aws_cdk/aws_evidently/__init__.py +57 -10
- aws_cdk/aws_evs/__init__.py +2244 -0
- aws_cdk/aws_finspace/__init__.py +71 -2
- aws_cdk/aws_fis/__init__.py +26 -4
- aws_cdk/aws_fms/__init__.py +35 -6
- aws_cdk/aws_forecast/__init__.py +24 -4
- aws_cdk/aws_frauddetector/__init__.py +79 -14
- aws_cdk/aws_fsx/__init__.py +1349 -127
- aws_cdk/aws_gamelift/__init__.py +755 -94
- aws_cdk/aws_gameliftstreams/__init__.py +44 -22
- aws_cdk/aws_globalaccelerator/__init__.py +73 -14
- aws_cdk/aws_glue/__init__.py +1455 -378
- aws_cdk/aws_grafana/__init__.py +13 -2
- aws_cdk/aws_greengrass/__init__.py +654 -32
- aws_cdk/aws_greengrassv2/__init__.py +53 -4
- aws_cdk/aws_groundstation/__init__.py +122 -6
- aws_cdk/aws_guardduty/__init__.py +1613 -123
- aws_cdk/aws_healthimaging/__init__.py +71 -2
- aws_cdk/aws_healthlake/__init__.py +42 -2
- aws_cdk/aws_iam/__init__.py +921 -141
- aws_cdk/aws_identitystore/__init__.py +24 -4
- aws_cdk/aws_imagebuilder/__init__.py +1454 -199
- aws_cdk/aws_inspector/__init__.py +44 -6
- aws_cdk/aws_inspectorv2/__init__.py +2285 -243
- aws_cdk/aws_internetmonitor/__init__.py +71 -2
- aws_cdk/aws_invoicing/__init__.py +13 -2
- aws_cdk/aws_iot/__init__.py +1760 -64
- aws_cdk/aws_iotanalytics/__init__.py +162 -8
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +106 -40
- aws_cdk/aws_iotevents/__init__.py +122 -6
- aws_cdk/aws_iotfleethub/__init__.py +71 -2
- aws_cdk/aws_iotfleetwise/__init__.py +195 -14
- aws_cdk/aws_iotsitewise/__init__.py +1837 -89
- aws_cdk/aws_iotthingsgraph/__init__.py +13 -2
- aws_cdk/aws_iottwinmaker/__init__.py +115 -10
- aws_cdk/aws_iotwireless/__init__.py +649 -22
- aws_cdk/aws_ivs/__init__.py +561 -57
- aws_cdk/aws_ivschat/__init__.py +24 -4
- aws_cdk/aws_kafkaconnect/__init__.py +35 -6
- aws_cdk/aws_kendra/__init__.py +120 -28
- aws_cdk/aws_kendraranking/__init__.py +13 -2
- aws_cdk/aws_kinesis/__init__.py +641 -23
- aws_cdk/aws_kinesisanalytics/__init__.py +467 -96
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +207 -19
- aws_cdk/aws_kinesisfirehose/__init__.py +3087 -295
- aws_cdk/aws_kinesisvideo/__init__.py +24 -4
- aws_cdk/aws_kms/__init__.py +204 -45
- aws_cdk/aws_lakeformation/__init__.py +80 -15
- aws_cdk/aws_lambda/__init__.py +2236 -297
- aws_cdk/aws_lambda_event_sources/__init__.py +638 -1
- aws_cdk/aws_lambda_nodejs/__init__.py +63 -24
- aws_cdk/aws_launchwizard/__init__.py +13 -2
- aws_cdk/aws_lex/__init__.py +2162 -212
- aws_cdk/aws_licensemanager/__init__.py +24 -4
- aws_cdk/aws_lightsail/__init__.py +2958 -1322
- aws_cdk/aws_location/__init__.py +618 -14
- aws_cdk/aws_logs/__init__.py +6014 -923
- aws_cdk/aws_lookoutequipment/__init__.py +13 -2
- aws_cdk/aws_lookoutmetrics/__init__.py +38 -6
- aws_cdk/aws_lookoutvision/__init__.py +71 -2
- aws_cdk/aws_m2/__init__.py +94 -19
- aws_cdk/aws_macie/__init__.py +49 -11
- aws_cdk/aws_managedblockchain/__init__.py +180 -6
- aws_cdk/aws_mediaconnect/__init__.py +101 -18
- aws_cdk/aws_mediaconvert/__init__.py +35 -6
- aws_cdk/aws_medialive/__init__.py +1938 -532
- aws_cdk/aws_mediapackage/__init__.py +59 -12
- aws_cdk/aws_mediapackagev2/__init__.py +1616 -233
- aws_cdk/aws_mediastore/__init__.py +13 -2
- aws_cdk/aws_mediatailor/__init__.py +583 -12
- aws_cdk/aws_memorydb/__init__.py +271 -12
- aws_cdk/aws_mpa/__init__.py +1495 -0
- aws_cdk/aws_msk/__init__.py +108 -22
- aws_cdk/aws_mwaa/__init__.py +121 -9
- aws_cdk/aws_neptune/__init__.py +290 -78
- aws_cdk/aws_neptunegraph/__init__.py +24 -4
- aws_cdk/aws_networkfirewall/__init__.py +1184 -164
- aws_cdk/aws_networkmanager/__init__.py +349 -33
- aws_cdk/aws_nimblestudio/__init__.py +283 -408
- aws_cdk/aws_notifications/__init__.py +317 -12
- aws_cdk/aws_notificationscontacts/__init__.py +13 -2
- aws_cdk/aws_oam/__init__.py +24 -4
- aws_cdk/aws_observabilityadmin/__init__.py +2561 -0
- aws_cdk/aws_odb/__init__.py +5872 -0
- aws_cdk/aws_omics/__init__.py +2967 -162
- aws_cdk/aws_opensearchserverless/__init__.py +312 -37
- aws_cdk/aws_opensearchservice/__init__.py +501 -19
- aws_cdk/aws_opsworks/__init__.py +235 -139
- aws_cdk/aws_opsworkscm/__init__.py +16 -52
- aws_cdk/aws_organizations/__init__.py +70 -10
- aws_cdk/aws_osis/__init__.py +167 -2
- aws_cdk/aws_panorama/__init__.py +181 -9
- aws_cdk/aws_paymentcryptography/__init__.py +24 -4
- aws_cdk/aws_pcaconnectorad/__init__.py +59 -10
- aws_cdk/aws_pcaconnectorscep/__init__.py +24 -4
- aws_cdk/aws_pcs/__init__.py +516 -64
- aws_cdk/aws_personalize/__init__.py +46 -8
- aws_cdk/aws_pinpoint/__init__.py +329 -38
- aws_cdk/aws_pinpointemail/__init__.py +48 -8
- aws_cdk/aws_pipes/__init__.py +12 -2
- aws_cdk/aws_proton/__init__.py +37 -6
- aws_cdk/aws_qbusiness/__init__.py +635 -34
- aws_cdk/aws_qldb/__init__.py +24 -4
- aws_cdk/aws_quicksight/__init__.py +7900 -1160
- aws_cdk/aws_ram/__init__.py +24 -4
- aws_cdk/aws_rbin/__init__.py +12 -2
- aws_cdk/aws_rds/__init__.py +3721 -573
- aws_cdk/aws_redshift/__init__.py +143 -20
- aws_cdk/aws_redshiftserverless/__init__.py +699 -11
- aws_cdk/aws_refactorspaces/__init__.py +64 -14
- aws_cdk/aws_rekognition/__init__.py +93 -6
- aws_cdk/aws_resiliencehub/__init__.py +24 -4
- aws_cdk/aws_resourceexplorer2/__init__.py +35 -6
- aws_cdk/aws_resourcegroups/__init__.py +82 -4
- aws_cdk/aws_robomaker/__init__.py +72 -12
- aws_cdk/aws_rolesanywhere/__init__.py +194 -19
- aws_cdk/aws_route53/__init__.py +3965 -1436
- aws_cdk/aws_route53_targets/__init__.py +3 -0
- aws_cdk/aws_route53profiles/__init__.py +37 -6
- aws_cdk/aws_route53recoverycontrol/__init__.py +46 -8
- aws_cdk/aws_route53recoveryreadiness/__init__.py +104 -8
- aws_cdk/aws_route53resolver/__init__.py +189 -40
- aws_cdk/aws_rtbfabric/__init__.py +3498 -0
- aws_cdk/aws_rum/__init__.py +13 -2
- aws_cdk/aws_s3/__init__.py +1742 -221
- aws_cdk/aws_s3_assets/__init__.py +11 -11
- aws_cdk/aws_s3_deployment/__init__.py +153 -11
- aws_cdk/aws_s3_notifications/__init__.py +7 -7
- aws_cdk/aws_s3express/__init__.py +1053 -6
- aws_cdk/aws_s3objectlambda/__init__.py +68 -16
- aws_cdk/aws_s3outposts/__init__.py +46 -8
- aws_cdk/aws_s3tables/__init__.py +2000 -323
- aws_cdk/aws_s3vectors/__init__.py +1378 -0
- aws_cdk/aws_sagemaker/__init__.py +6848 -373
- aws_cdk/aws_sam/__init__.py +79 -14
- aws_cdk/aws_scheduler/__init__.py +249 -4
- aws_cdk/aws_sdb/__init__.py +12 -2
- aws_cdk/aws_secretsmanager/__init__.py +194 -14
- aws_cdk/aws_securityhub/__init__.py +3121 -176
- aws_cdk/aws_securitylake/__init__.py +46 -8
- aws_cdk/aws_servicecatalog/__init__.py +429 -246
- aws_cdk/aws_servicecatalogappregistry/__init__.py +164 -8
- aws_cdk/aws_servicediscovery/__init__.py +188 -47
- aws_cdk/aws_ses/__init__.py +2265 -369
- aws_cdk/aws_shield/__init__.py +46 -8
- aws_cdk/aws_signer/__init__.py +33 -4
- aws_cdk/aws_simspaceweaver/__init__.py +42 -2
- aws_cdk/aws_smsvoice/__init__.py +4716 -0
- aws_cdk/aws_sns/__init__.py +263 -29
- aws_cdk/aws_sns_subscriptions/__init__.py +265 -2
- aws_cdk/aws_sqs/__init__.py +223 -14
- aws_cdk/aws_ssm/__init__.py +413 -58
- aws_cdk/aws_ssmcontacts/__init__.py +98 -9
- aws_cdk/aws_ssmguiconnect/__init__.py +20 -9
- aws_cdk/aws_ssmincidents/__init__.py +24 -4
- aws_cdk/aws_ssmquicksetup/__init__.py +393 -8
- aws_cdk/aws_sso/__init__.py +70 -12
- aws_cdk/aws_stepfunctions/__init__.py +823 -94
- aws_cdk/aws_stepfunctions_tasks/__init__.py +2323 -150
- aws_cdk/aws_supportapp/__init__.py +39 -6
- aws_cdk/aws_synthetics/__init__.py +1088 -126
- aws_cdk/aws_systemsmanagersap/__init__.py +13 -2
- aws_cdk/aws_timestream/__init__.py +104 -8
- aws_cdk/aws_transfer/__init__.py +784 -87
- aws_cdk/aws_verifiedpermissions/__init__.py +306 -13
- aws_cdk/aws_voiceid/__init__.py +54 -5
- aws_cdk/aws_vpclattice/__init__.py +589 -231
- aws_cdk/aws_waf/__init__.py +79 -14
- aws_cdk/aws_wafregional/__init__.py +123 -22
- aws_cdk/aws_wafv2/__init__.py +1183 -64
- aws_cdk/aws_wisdom/__init__.py +1403 -90
- aws_cdk/aws_workspaces/__init__.py +134 -6
- aws_cdk/aws_workspacesinstances/__init__.py +3940 -0
- aws_cdk/aws_workspacesthinclient/__init__.py +79 -10
- aws_cdk/aws_workspacesweb/__init__.py +1057 -141
- aws_cdk/aws_xray/__init__.py +48 -8
- aws_cdk/cloud_assembly_schema/__init__.py +368 -48
- aws_cdk/custom_resources/__init__.py +58 -12
- aws_cdk/cx_api/__init__.py +125 -21
- aws_cdk/interfaces/__init__.py +739 -0
- aws_cdk/interfaces/alexa_ask/__init__.py +146 -0
- aws_cdk/interfaces/aws_accessanalyzer/__init__.py +146 -0
- aws_cdk/interfaces/aws_acmpca/__init__.py +501 -0
- aws_cdk/interfaces/aws_aiops/__init__.py +146 -0
- aws_cdk/interfaces/aws_amazonmq/__init__.py +386 -0
- aws_cdk/interfaces/aws_amplify/__init__.py +352 -0
- aws_cdk/interfaces/aws_amplifyuibuilder/__init__.py +454 -0
- aws_cdk/interfaces/aws_apigateway/__init__.py +2486 -0
- aws_cdk/interfaces/aws_apigatewayv2/__init__.py +1651 -0
- aws_cdk/interfaces/aws_appconfig/__init__.py +1020 -0
- aws_cdk/interfaces/aws_appflow/__init__.py +404 -0
- aws_cdk/interfaces/aws_appintegrations/__init__.py +396 -0
- aws_cdk/interfaces/aws_applicationautoscaling/__init__.py +307 -0
- aws_cdk/interfaces/aws_applicationinsights/__init__.py +148 -0
- aws_cdk/interfaces/aws_applicationsignals/__init__.py +358 -0
- aws_cdk/interfaces/aws_appmesh/__init__.py +888 -0
- aws_cdk/interfaces/aws_apprunner/__init__.py +564 -0
- aws_cdk/interfaces/aws_appstream/__init__.py +1482 -0
- aws_cdk/interfaces/aws_appsync/__init__.py +1326 -0
- aws_cdk/interfaces/aws_apptest/__init__.py +163 -0
- aws_cdk/interfaces/aws_aps/__init__.py +558 -0
- aws_cdk/interfaces/aws_arcregionswitch/__init__.py +146 -0
- aws_cdk/interfaces/aws_arczonalshift/__init__.py +273 -0
- aws_cdk/interfaces/aws_athena/__init__.py +575 -0
- aws_cdk/interfaces/aws_auditmanager/__init__.py +163 -0
- aws_cdk/interfaces/aws_autoscaling/__init__.py +705 -0
- aws_cdk/interfaces/aws_autoscalingplans/__init__.py +148 -0
- aws_cdk/interfaces/aws_b2bi/__init__.py +524 -0
- aws_cdk/interfaces/aws_backup/__init__.py +955 -0
- aws_cdk/interfaces/aws_backupgateway/__init__.py +146 -0
- aws_cdk/interfaces/aws_batch/__init__.py +681 -0
- aws_cdk/interfaces/aws_bcmdataexports/__init__.py +146 -0
- aws_cdk/interfaces/aws_bedrock/__init__.py +1942 -0
- aws_cdk/interfaces/aws_bedrockagentcore/__init__.py +934 -0
- aws_cdk/interfaces/aws_billing/__init__.py +146 -0
- aws_cdk/interfaces/aws_billingconductor/__init__.py +463 -0
- aws_cdk/interfaces/aws_budgets/__init__.py +261 -0
- aws_cdk/interfaces/aws_cassandra/__init__.py +381 -0
- aws_cdk/interfaces/aws_ce/__init__.py +352 -0
- aws_cdk/interfaces/aws_certificatemanager/__init__.py +251 -0
- aws_cdk/interfaces/aws_chatbot/__init__.py +366 -0
- aws_cdk/interfaces/aws_cleanrooms/__init__.py +1103 -0
- aws_cdk/interfaces/aws_cleanroomsml/__init__.py +148 -0
- aws_cdk/interfaces/aws_cloud9/__init__.py +166 -0
- aws_cdk/interfaces/aws_cloudformation/__init__.py +1919 -0
- aws_cdk/interfaces/aws_cloudfront/__init__.py +1998 -0
- aws_cdk/interfaces/aws_cloudtrail/__init__.py +570 -0
- aws_cdk/interfaces/aws_cloudwatch/__init__.py +733 -0
- aws_cdk/interfaces/aws_codeartifact/__init__.py +352 -0
- aws_cdk/interfaces/aws_codebuild/__init__.py +487 -0
- aws_cdk/interfaces/aws_codecommit/__init__.py +163 -0
- aws_cdk/interfaces/aws_codeconnections/__init__.py +146 -0
- aws_cdk/interfaces/aws_codedeploy/__init__.py +352 -0
- aws_cdk/interfaces/aws_codeguruprofiler/__init__.py +168 -0
- aws_cdk/interfaces/aws_codegurureviewer/__init__.py +148 -0
- aws_cdk/interfaces/aws_codepipeline/__init__.py +388 -0
- aws_cdk/interfaces/aws_codestar/__init__.py +146 -0
- aws_cdk/interfaces/aws_codestarconnections/__init__.py +370 -0
- aws_cdk/interfaces/aws_codestarnotifications/__init__.py +148 -0
- aws_cdk/interfaces/aws_cognito/__init__.py +1929 -0
- aws_cdk/interfaces/aws_comprehend/__init__.py +251 -0
- aws_cdk/interfaces/aws_config/__init__.py +1165 -0
- aws_cdk/interfaces/aws_connect/__init__.py +2949 -0
- aws_cdk/interfaces/aws_connectcampaigns/__init__.py +146 -0
- aws_cdk/interfaces/aws_connectcampaignsv2/__init__.py +146 -0
- aws_cdk/interfaces/aws_controltower/__init__.py +394 -0
- aws_cdk/interfaces/aws_cur/__init__.py +146 -0
- aws_cdk/interfaces/aws_customerprofiles/__init__.py +915 -0
- aws_cdk/interfaces/aws_databrew/__init__.py +661 -0
- aws_cdk/interfaces/aws_datapipeline/__init__.py +146 -0
- aws_cdk/interfaces/aws_datasync/__init__.py +1384 -0
- aws_cdk/interfaces/aws_datazone/__init__.py +2238 -0
- aws_cdk/interfaces/aws_dax/__init__.py +364 -0
- aws_cdk/interfaces/aws_deadline/__init__.py +1303 -0
- aws_cdk/interfaces/aws_detective/__init__.py +364 -0
- aws_cdk/interfaces/aws_devicefarm/__init__.py +663 -0
- aws_cdk/interfaces/aws_devopsguru/__init__.py +362 -0
- aws_cdk/interfaces/aws_directoryservice/__init__.py +251 -0
- aws_cdk/interfaces/aws_dlm/__init__.py +166 -0
- aws_cdk/interfaces/aws_dms/__init__.py +1176 -0
- aws_cdk/interfaces/aws_docdb/__init__.py +560 -0
- aws_cdk/interfaces/aws_docdbelastic/__init__.py +146 -0
- aws_cdk/interfaces/aws_dsql/__init__.py +146 -0
- aws_cdk/interfaces/aws_dynamodb/__init__.py +278 -0
- aws_cdk/interfaces/aws_ec2/__init__.py +11963 -0
- aws_cdk/interfaces/aws_ecr/__init__.py +814 -0
- aws_cdk/interfaces/aws_ecs/__init__.py +845 -0
- aws_cdk/interfaces/aws_efs/__init__.py +392 -0
- aws_cdk/interfaces/aws_eks/__init__.py +948 -0
- aws_cdk/interfaces/aws_elasticache/__init__.py +1108 -0
- aws_cdk/interfaces/aws_elasticbeanstalk/__init__.py +503 -0
- aws_cdk/interfaces/aws_elasticloadbalancing/__init__.py +148 -0
- aws_cdk/interfaces/aws_elasticloadbalancingv2/__init__.py +795 -0
- aws_cdk/interfaces/aws_elasticsearch/__init__.py +158 -0
- aws_cdk/interfaces/aws_emr/__init__.py +913 -0
- aws_cdk/interfaces/aws_emrcontainers/__init__.py +168 -0
- aws_cdk/interfaces/aws_emrserverless/__init__.py +166 -0
- aws_cdk/interfaces/aws_entityresolution/__init__.py +608 -0
- aws_cdk/interfaces/aws_events/__init__.py +872 -0
- aws_cdk/interfaces/aws_eventschemas/__init__.py +455 -0
- aws_cdk/interfaces/aws_evidently/__init__.py +558 -0
- aws_cdk/interfaces/aws_evs/__init__.py +166 -0
- aws_cdk/interfaces/aws_finspace/__init__.py +166 -0
- aws_cdk/interfaces/aws_fis/__init__.py +271 -0
- aws_cdk/interfaces/aws_fms/__init__.py +364 -0
- aws_cdk/interfaces/aws_forecast/__init__.py +249 -0
- aws_cdk/interfaces/aws_frauddetector/__init__.py +764 -0
- aws_cdk/interfaces/aws_fsx/__init__.py +663 -0
- aws_cdk/interfaces/aws_gamelift/__init__.py +1325 -0
- aws_cdk/interfaces/aws_gameliftstreams/__init__.py +249 -0
- aws_cdk/interfaces/aws_globalaccelerator/__init__.py +461 -0
- aws_cdk/interfaces/aws_glue/__init__.py +2377 -0
- aws_cdk/interfaces/aws_grafana/__init__.py +146 -0
- aws_cdk/interfaces/aws_greengrass/__init__.py +1871 -0
- aws_cdk/interfaces/aws_greengrassv2/__init__.py +251 -0
- aws_cdk/interfaces/aws_groundstation/__init__.py +396 -0
- aws_cdk/interfaces/aws_guardduty/__init__.py +1225 -0
- aws_cdk/interfaces/aws_healthimaging/__init__.py +163 -0
- aws_cdk/interfaces/aws_healthlake/__init__.py +146 -0
- aws_cdk/interfaces/aws_iam/__init__.py +1803 -0
- aws_cdk/interfaces/aws_identitystore/__init__.py +288 -0
- aws_cdk/interfaces/aws_imagebuilder/__init__.py +984 -0
- aws_cdk/interfaces/aws_inspector/__init__.py +354 -0
- aws_cdk/interfaces/aws_inspectorv2/__init__.py +467 -0
- aws_cdk/interfaces/aws_internetmonitor/__init__.py +163 -0
- aws_cdk/interfaces/aws_invoicing/__init__.py +146 -0
- aws_cdk/interfaces/aws_iot/__init__.py +3483 -0
- aws_cdk/interfaces/aws_iotanalytics/__init__.py +455 -0
- aws_cdk/interfaces/aws_iotcoredeviceadvisor/__init__.py +168 -0
- aws_cdk/interfaces/aws_iotevents/__init__.py +352 -0
- aws_cdk/interfaces/aws_iotfleethub/__init__.py +166 -0
- aws_cdk/interfaces/aws_iotfleetwise/__init__.py +892 -0
- aws_cdk/interfaces/aws_iotsitewise/__init__.py +1097 -0
- aws_cdk/interfaces/aws_iotthingsgraph/__init__.py +146 -0
- aws_cdk/interfaces/aws_iottwinmaker/__init__.py +711 -0
- aws_cdk/interfaces/aws_iotwireless/__init__.py +1401 -0
- aws_cdk/interfaces/aws_ivs/__init__.py +1075 -0
- aws_cdk/interfaces/aws_ivschat/__init__.py +251 -0
- aws_cdk/interfaces/aws_kafkaconnect/__init__.py +354 -0
- aws_cdk/interfaces/aws_kendra/__init__.py +428 -0
- aws_cdk/interfaces/aws_kendraranking/__init__.py +166 -0
- aws_cdk/interfaces/aws_kinesis/__init__.py +364 -0
- aws_cdk/interfaces/aws_kinesisanalytics/__init__.py +364 -0
- aws_cdk/interfaces/aws_kinesisanalyticsv2/__init__.py +479 -0
- aws_cdk/interfaces/aws_kinesisfirehose/__init__.py +168 -0
- aws_cdk/interfaces/aws_kinesisvideo/__init__.py +283 -0
- aws_cdk/interfaces/aws_kms/__init__.py +376 -0
- aws_cdk/interfaces/aws_lakeformation/__init__.py +860 -0
- aws_cdk/interfaces/aws_lambda/__init__.py +1141 -0
- aws_cdk/interfaces/aws_launchwizard/__init__.py +146 -0
- aws_cdk/interfaces/aws_lex/__init__.py +513 -0
- aws_cdk/interfaces/aws_licensemanager/__init__.py +249 -0
- aws_cdk/interfaces/aws_lightsail/__init__.py +1744 -0
- aws_cdk/interfaces/aws_location/__init__.py +879 -0
- aws_cdk/interfaces/aws_logs/__init__.py +1667 -0
- aws_cdk/interfaces/aws_lookoutequipment/__init__.py +168 -0
- aws_cdk/interfaces/aws_lookoutmetrics/__init__.py +251 -0
- aws_cdk/interfaces/aws_lookoutvision/__init__.py +163 -0
- aws_cdk/interfaces/aws_m2/__init__.py +352 -0
- aws_cdk/interfaces/aws_macie/__init__.py +512 -0
- aws_cdk/interfaces/aws_managedblockchain/__init__.py +381 -0
- aws_cdk/interfaces/aws_mediaconnect/__init__.py +1028 -0
- aws_cdk/interfaces/aws_mediaconvert/__init__.py +396 -0
- aws_cdk/interfaces/aws_medialive/__init__.py +1755 -0
- aws_cdk/interfaces/aws_mediapackage/__init__.py +644 -0
- aws_cdk/interfaces/aws_mediapackagev2/__init__.py +618 -0
- aws_cdk/interfaces/aws_mediastore/__init__.py +146 -0
- aws_cdk/interfaces/aws_mediatailor/__init__.py +788 -0
- aws_cdk/interfaces/aws_memorydb/__init__.py +685 -0
- aws_cdk/interfaces/aws_mpa/__init__.py +249 -0
- aws_cdk/interfaces/aws_msk/__init__.py +764 -0
- aws_cdk/interfaces/aws_mwaa/__init__.py +166 -0
- aws_cdk/interfaces/aws_neptune/__init__.py +663 -0
- aws_cdk/interfaces/aws_neptunegraph/__init__.py +265 -0
- aws_cdk/interfaces/aws_networkfirewall/__init__.py +669 -0
- aws_cdk/interfaces/aws_networkmanager/__init__.py +1832 -0
- aws_cdk/interfaces/aws_nimblestudio/__init__.py +388 -0
- aws_cdk/interfaces/aws_notifications/__init__.py +868 -0
- aws_cdk/interfaces/aws_notificationscontacts/__init__.py +148 -0
- aws_cdk/interfaces/aws_oam/__init__.py +249 -0
- aws_cdk/interfaces/aws_observabilityadmin/__init__.py +362 -0
- aws_cdk/interfaces/aws_odb/__init__.py +562 -0
- aws_cdk/interfaces/aws_omics/__init__.py +838 -0
- aws_cdk/interfaces/aws_opensearchserverless/__init__.py +859 -0
- aws_cdk/interfaces/aws_opensearchservice/__init__.py +283 -0
- aws_cdk/interfaces/aws_opsworks/__init__.py +772 -0
- aws_cdk/interfaces/aws_opsworkscm/__init__.py +146 -0
- aws_cdk/interfaces/aws_organizations/__init__.py +646 -0
- aws_cdk/interfaces/aws_osis/__init__.py +146 -0
- aws_cdk/interfaces/aws_panorama/__init__.py +420 -0
- aws_cdk/interfaces/aws_paymentcryptography/__init__.py +249 -0
- aws_cdk/interfaces/aws_pcaconnectorad/__init__.py +608 -0
- aws_cdk/interfaces/aws_pcaconnectorscep/__init__.py +249 -0
- aws_cdk/interfaces/aws_pcs/__init__.py +352 -0
- aws_cdk/interfaces/aws_personalize/__init__.py +455 -0
- aws_cdk/interfaces/aws_pinpoint/__init__.py +2125 -0
- aws_cdk/interfaces/aws_pinpointemail/__init__.py +467 -0
- aws_cdk/interfaces/aws_pipes/__init__.py +158 -0
- aws_cdk/interfaces/aws_proton/__init__.py +360 -0
- aws_cdk/interfaces/aws_qbusiness/__init__.py +1122 -0
- aws_cdk/interfaces/aws_qldb/__init__.py +283 -0
- aws_cdk/interfaces/aws_quicksight/__init__.py +1566 -0
- aws_cdk/interfaces/aws_ram/__init__.py +249 -0
- aws_cdk/interfaces/aws_rbin/__init__.py +146 -0
- aws_cdk/interfaces/aws_rds/__init__.py +1780 -0
- aws_cdk/interfaces/aws_redshift/__init__.py +1104 -0
- aws_cdk/interfaces/aws_redshiftserverless/__init__.py +356 -0
- aws_cdk/interfaces/aws_refactorspaces/__init__.py +605 -0
- aws_cdk/interfaces/aws_rekognition/__init__.py +406 -0
- aws_cdk/interfaces/aws_resiliencehub/__init__.py +251 -0
- aws_cdk/interfaces/aws_resourceexplorer2/__init__.py +354 -0
- aws_cdk/interfaces/aws_resourcegroups/__init__.py +261 -0
- aws_cdk/interfaces/aws_robomaker/__init__.py +673 -0
- aws_cdk/interfaces/aws_rolesanywhere/__init__.py +384 -0
- aws_cdk/interfaces/aws_route53/__init__.py +804 -0
- aws_cdk/interfaces/aws_route53profiles/__init__.py +368 -0
- aws_cdk/interfaces/aws_route53recoverycontrol/__init__.py +463 -0
- aws_cdk/interfaces/aws_route53recoveryreadiness/__init__.py +535 -0
- aws_cdk/interfaces/aws_route53resolver/__init__.py +1356 -0
- aws_cdk/interfaces/aws_rtbfabric/__init__.py +352 -0
- aws_cdk/interfaces/aws_rum/__init__.py +146 -0
- aws_cdk/interfaces/aws_s3/__init__.py +1171 -0
- aws_cdk/interfaces/aws_s3express/__init__.py +392 -0
- aws_cdk/interfaces/aws_s3objectlambda/__init__.py +271 -0
- aws_cdk/interfaces/aws_s3outposts/__init__.py +455 -0
- aws_cdk/interfaces/aws_s3tables/__init__.py +575 -0
- aws_cdk/interfaces/aws_s3vectors/__init__.py +354 -0
- aws_cdk/interfaces/aws_sagemaker/__init__.py +3797 -0
- aws_cdk/interfaces/aws_sam/__init__.py +603 -0
- aws_cdk/interfaces/aws_scheduler/__init__.py +286 -0
- aws_cdk/interfaces/aws_sdb/__init__.py +146 -0
- aws_cdk/interfaces/aws_secretsmanager/__init__.py +461 -0
- aws_cdk/interfaces/aws_securityhub/__init__.py +1499 -0
- aws_cdk/interfaces/aws_securitylake/__init__.py +474 -0
- aws_cdk/interfaces/aws_servicecatalog/__init__.py +1829 -0
- aws_cdk/interfaces/aws_servicecatalogappregistry/__init__.py +557 -0
- aws_cdk/interfaces/aws_servicediscovery/__init__.py +636 -0
- aws_cdk/interfaces/aws_ses/__init__.py +2018 -0
- aws_cdk/interfaces/aws_shield/__init__.py +455 -0
- aws_cdk/interfaces/aws_signer/__init__.py +266 -0
- aws_cdk/interfaces/aws_simspaceweaver/__init__.py +146 -0
- aws_cdk/interfaces/aws_smsvoice/__init__.py +892 -0
- aws_cdk/interfaces/aws_sns/__init__.py +455 -0
- aws_cdk/interfaces/aws_sqs/__init__.py +364 -0
- aws_cdk/interfaces/aws_ssm/__init__.py +982 -0
- aws_cdk/interfaces/aws_ssmcontacts/__init__.py +455 -0
- aws_cdk/interfaces/aws_ssmguiconnect/__init__.py +146 -0
- aws_cdk/interfaces/aws_ssmincidents/__init__.py +249 -0
- aws_cdk/interfaces/aws_ssmquicksetup/__init__.py +253 -0
- aws_cdk/interfaces/aws_sso/__init__.py +797 -0
- aws_cdk/interfaces/aws_stepfunctions/__init__.py +459 -0
- aws_cdk/interfaces/aws_supportapp/__init__.py +372 -0
- aws_cdk/interfaces/aws_synthetics/__init__.py +249 -0
- aws_cdk/interfaces/aws_systemsmanagersap/__init__.py +148 -0
- aws_cdk/interfaces/aws_timestream/__init__.py +526 -0
- aws_cdk/interfaces/aws_transfer/__init__.py +967 -0
- aws_cdk/interfaces/aws_verifiedpermissions/__init__.py +538 -0
- aws_cdk/interfaces/aws_voiceid/__init__.py +146 -0
- aws_cdk/interfaces/aws_vpclattice/__init__.py +1418 -0
- aws_cdk/interfaces/aws_waf/__init__.py +764 -0
- aws_cdk/interfaces/aws_wafregional/__init__.py +1182 -0
- aws_cdk/interfaces/aws_wafv2/__init__.py +870 -0
- aws_cdk/interfaces/aws_wisdom/__init__.py +1556 -0
- aws_cdk/interfaces/aws_workspaces/__init__.py +352 -0
- aws_cdk/interfaces/aws_workspacesinstances/__init__.py +390 -0
- aws_cdk/interfaces/aws_workspacesthinclient/__init__.py +168 -0
- aws_cdk/interfaces/aws_workspacesweb/__init__.py +1085 -0
- aws_cdk/interfaces/aws_xray/__init__.py +457 -0
- aws_cdk/lambda_layer_awscli/__init__.py +6 -0
- aws_cdk/lambda_layer_node_proxy_agent/__init__.py +6 -0
- aws_cdk/pipelines/__init__.py +202 -52
- aws_cdk/region_info/__init__.py +3 -0
- aws_cdk/triggers/__init__.py +66 -18
- {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/METADATA +418 -18
- aws_cdk_lib-2.224.0.dist-info/RECORD +584 -0
- aws_cdk_lib-2.195.0.dist-info/RECORD +0 -304
- {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/top_level.txt +0 -0
|
@@ -68,15 +68,29 @@ from .. import (
|
|
|
68
68
|
TagManager as _TagManager_0a598cb3,
|
|
69
69
|
TreeInspector as _TreeInspector_488e0dd5,
|
|
70
70
|
)
|
|
71
|
+
from ..interfaces.aws_networkfirewall import (
|
|
72
|
+
FirewallPolicyReference as _FirewallPolicyReference_590b2e0a,
|
|
73
|
+
FirewallReference as _FirewallReference_2bf55714,
|
|
74
|
+
IFirewallPolicyRef as _IFirewallPolicyRef_bd446a4d,
|
|
75
|
+
IFirewallRef as _IFirewallRef_31769805,
|
|
76
|
+
ILoggingConfigurationRef as _ILoggingConfigurationRef_1588c620,
|
|
77
|
+
IRuleGroupRef as _IRuleGroupRef_f1ee71d3,
|
|
78
|
+
ITLSInspectionConfigurationRef as _ITLSInspectionConfigurationRef_6d0a6d9c,
|
|
79
|
+
IVpcEndpointAssociationRef as _IVpcEndpointAssociationRef_bd0818d9,
|
|
80
|
+
LoggingConfigurationReference as _LoggingConfigurationReference_f6c32f6c,
|
|
81
|
+
RuleGroupReference as _RuleGroupReference_b514c132,
|
|
82
|
+
TLSInspectionConfigurationReference as _TLSInspectionConfigurationReference_52bd7dd3,
|
|
83
|
+
VpcEndpointAssociationReference as _VpcEndpointAssociationReference_d627bc37,
|
|
84
|
+
)
|
|
71
85
|
|
|
72
86
|
|
|
73
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
87
|
+
@jsii.implements(_IInspectable_c2943556, _IFirewallRef_31769805, _ITaggable_36806126)
|
|
74
88
|
class CfnFirewall(
|
|
75
89
|
_CfnResource_9df397a6,
|
|
76
90
|
metaclass=jsii.JSIIMeta,
|
|
77
91
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall",
|
|
78
92
|
):
|
|
79
|
-
'''Use the
|
|
93
|
+
'''Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
|
|
80
94
|
|
|
81
95
|
The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
|
|
82
96
|
|
|
@@ -93,24 +107,29 @@ class CfnFirewall(
|
|
|
93
107
|
cfn_firewall = networkfirewall.CfnFirewall(self, "MyCfnFirewall",
|
|
94
108
|
firewall_name="firewallName",
|
|
95
109
|
firewall_policy_arn="firewallPolicyArn",
|
|
96
|
-
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
97
|
-
subnet_id="subnetId",
|
|
98
|
-
|
|
99
|
-
# the properties below are optional
|
|
100
|
-
ip_address_type="ipAddressType"
|
|
101
|
-
)],
|
|
102
|
-
vpc_id="vpcId",
|
|
103
110
|
|
|
104
111
|
# the properties below are optional
|
|
112
|
+
availability_zone_change_protection=False,
|
|
113
|
+
availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
114
|
+
availability_zone="availabilityZone"
|
|
115
|
+
)],
|
|
105
116
|
delete_protection=False,
|
|
106
117
|
description="description",
|
|
107
118
|
enabled_analysis_types=["enabledAnalysisTypes"],
|
|
108
119
|
firewall_policy_change_protection=False,
|
|
109
120
|
subnet_change_protection=False,
|
|
121
|
+
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
122
|
+
subnet_id="subnetId",
|
|
123
|
+
|
|
124
|
+
# the properties below are optional
|
|
125
|
+
ip_address_type="ipAddressType"
|
|
126
|
+
)],
|
|
110
127
|
tags=[CfnTag(
|
|
111
128
|
key="key",
|
|
112
129
|
value="value"
|
|
113
|
-
)]
|
|
130
|
+
)],
|
|
131
|
+
transit_gateway_id="transitGatewayId",
|
|
132
|
+
vpc_id="vpcId"
|
|
114
133
|
)
|
|
115
134
|
'''
|
|
116
135
|
|
|
@@ -121,28 +140,35 @@ class CfnFirewall(
|
|
|
121
140
|
*,
|
|
122
141
|
firewall_name: builtins.str,
|
|
123
142
|
firewall_policy_arn: builtins.str,
|
|
124
|
-
|
|
125
|
-
|
|
143
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
144
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.AvailabilityZoneMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
126
145
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
127
146
|
description: typing.Optional[builtins.str] = None,
|
|
128
147
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
129
148
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
130
149
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
150
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
131
151
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
152
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
153
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
132
154
|
) -> None:
|
|
133
|
-
'''
|
|
155
|
+
'''Create a new ``AWS::NetworkFirewall::Firewall``.
|
|
156
|
+
|
|
134
157
|
:param scope: Scope in which this resource is defined.
|
|
135
158
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
136
159
|
:param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
|
|
137
160
|
:param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
|
|
138
|
-
:param
|
|
139
|
-
:param
|
|
161
|
+
:param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
162
|
+
:param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
140
163
|
:param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
|
|
141
164
|
:param description: A description of the firewall.
|
|
142
165
|
:param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
|
|
143
166
|
:param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
144
167
|
:param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
168
|
+
:param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
145
169
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
170
|
+
:param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
|
|
171
|
+
:param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
|
|
146
172
|
'''
|
|
147
173
|
if __debug__:
|
|
148
174
|
type_hints = typing.get_type_hints(_typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56)
|
|
@@ -151,14 +177,17 @@ class CfnFirewall(
|
|
|
151
177
|
props = CfnFirewallProps(
|
|
152
178
|
firewall_name=firewall_name,
|
|
153
179
|
firewall_policy_arn=firewall_policy_arn,
|
|
154
|
-
|
|
155
|
-
|
|
180
|
+
availability_zone_change_protection=availability_zone_change_protection,
|
|
181
|
+
availability_zone_mappings=availability_zone_mappings,
|
|
156
182
|
delete_protection=delete_protection,
|
|
157
183
|
description=description,
|
|
158
184
|
enabled_analysis_types=enabled_analysis_types,
|
|
159
185
|
firewall_policy_change_protection=firewall_policy_change_protection,
|
|
160
186
|
subnet_change_protection=subnet_change_protection,
|
|
187
|
+
subnet_mappings=subnet_mappings,
|
|
161
188
|
tags=tags,
|
|
189
|
+
transit_gateway_id=transit_gateway_id,
|
|
190
|
+
vpc_id=vpc_id,
|
|
162
191
|
)
|
|
163
192
|
|
|
164
193
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
@@ -207,7 +236,7 @@ class CfnFirewall(
|
|
|
207
236
|
@builtins.property
|
|
208
237
|
@jsii.member(jsii_name="attrFirewallArn")
|
|
209
238
|
def attr_firewall_arn(self) -> builtins.str:
|
|
210
|
-
'''The Amazon Resource Name (ARN) of the
|
|
239
|
+
'''The Amazon Resource Name (ARN) of the firewall.
|
|
211
240
|
|
|
212
241
|
:cloudformationAttribute: FirewallArn
|
|
213
242
|
'''
|
|
@@ -216,17 +245,34 @@ class CfnFirewall(
|
|
|
216
245
|
@builtins.property
|
|
217
246
|
@jsii.member(jsii_name="attrFirewallId")
|
|
218
247
|
def attr_firewall_id(self) -> builtins.str:
|
|
219
|
-
'''The name of the
|
|
248
|
+
'''The name of the firewallresource.
|
|
220
249
|
|
|
221
250
|
:cloudformationAttribute: FirewallId
|
|
222
251
|
'''
|
|
223
252
|
return typing.cast(builtins.str, jsii.get(self, "attrFirewallId"))
|
|
224
253
|
|
|
254
|
+
@builtins.property
|
|
255
|
+
@jsii.member(jsii_name="attrTransitGatewayAttachmentId")
|
|
256
|
+
def attr_transit_gateway_attachment_id(self) -> builtins.str:
|
|
257
|
+
'''The unique identifier of the transit gateway attachment associated with this firewall.
|
|
258
|
+
|
|
259
|
+
This field is only present for transit gateway-attached firewalls.
|
|
260
|
+
|
|
261
|
+
:cloudformationAttribute: TransitGatewayAttachmentId
|
|
262
|
+
'''
|
|
263
|
+
return typing.cast(builtins.str, jsii.get(self, "attrTransitGatewayAttachmentId"))
|
|
264
|
+
|
|
225
265
|
@builtins.property
|
|
226
266
|
@jsii.member(jsii_name="cfnProperties")
|
|
227
267
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
228
268
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
229
269
|
|
|
270
|
+
@builtins.property
|
|
271
|
+
@jsii.member(jsii_name="firewallRef")
|
|
272
|
+
def firewall_ref(self) -> _FirewallReference_2bf55714:
|
|
273
|
+
'''A reference to a Firewall resource.'''
|
|
274
|
+
return typing.cast(_FirewallReference_2bf55714, jsii.get(self, "firewallRef"))
|
|
275
|
+
|
|
230
276
|
@builtins.property
|
|
231
277
|
@jsii.member(jsii_name="tags")
|
|
232
278
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -260,35 +306,40 @@ class CfnFirewall(
|
|
|
260
306
|
jsii.set(self, "firewallPolicyArn", value) # pyright: ignore[reportArgumentType]
|
|
261
307
|
|
|
262
308
|
@builtins.property
|
|
263
|
-
@jsii.member(jsii_name="
|
|
264
|
-
def
|
|
309
|
+
@jsii.member(jsii_name="availabilityZoneChangeProtection")
|
|
310
|
+
def availability_zone_change_protection(
|
|
265
311
|
self,
|
|
266
|
-
) -> typing.
|
|
267
|
-
'''
|
|
268
|
-
return typing.cast(typing.
|
|
312
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
313
|
+
'''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.'''
|
|
314
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "availabilityZoneChangeProtection"))
|
|
269
315
|
|
|
270
|
-
@
|
|
271
|
-
def
|
|
316
|
+
@availability_zone_change_protection.setter
|
|
317
|
+
def availability_zone_change_protection(
|
|
272
318
|
self,
|
|
273
|
-
value: typing.
|
|
319
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
274
320
|
) -> None:
|
|
275
321
|
if __debug__:
|
|
276
|
-
type_hints = typing.get_type_hints(
|
|
322
|
+
type_hints = typing.get_type_hints(_typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1)
|
|
277
323
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
278
|
-
jsii.set(self, "
|
|
324
|
+
jsii.set(self, "availabilityZoneChangeProtection", value) # pyright: ignore[reportArgumentType]
|
|
279
325
|
|
|
280
326
|
@builtins.property
|
|
281
|
-
@jsii.member(jsii_name="
|
|
282
|
-
def
|
|
283
|
-
|
|
284
|
-
|
|
327
|
+
@jsii.member(jsii_name="availabilityZoneMappings")
|
|
328
|
+
def availability_zone_mappings(
|
|
329
|
+
self,
|
|
330
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]]:
|
|
331
|
+
'''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.'''
|
|
332
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]], jsii.get(self, "availabilityZoneMappings"))
|
|
285
333
|
|
|
286
|
-
@
|
|
287
|
-
def
|
|
334
|
+
@availability_zone_mappings.setter
|
|
335
|
+
def availability_zone_mappings(
|
|
336
|
+
self,
|
|
337
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]],
|
|
338
|
+
) -> None:
|
|
288
339
|
if __debug__:
|
|
289
|
-
type_hints = typing.get_type_hints(
|
|
340
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77)
|
|
290
341
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
291
|
-
jsii.set(self, "
|
|
342
|
+
jsii.set(self, "availabilityZoneMappings", value) # pyright: ignore[reportArgumentType]
|
|
292
343
|
|
|
293
344
|
@builtins.property
|
|
294
345
|
@jsii.member(jsii_name="deleteProtection")
|
|
@@ -373,6 +424,24 @@ class CfnFirewall(
|
|
|
373
424
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
374
425
|
jsii.set(self, "subnetChangeProtection", value) # pyright: ignore[reportArgumentType]
|
|
375
426
|
|
|
427
|
+
@builtins.property
|
|
428
|
+
@jsii.member(jsii_name="subnetMappings")
|
|
429
|
+
def subnet_mappings(
|
|
430
|
+
self,
|
|
431
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]]:
|
|
432
|
+
'''The primary public subnets that Network Firewall is using for the firewall.'''
|
|
433
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]], jsii.get(self, "subnetMappings"))
|
|
434
|
+
|
|
435
|
+
@subnet_mappings.setter
|
|
436
|
+
def subnet_mappings(
|
|
437
|
+
self,
|
|
438
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]],
|
|
439
|
+
) -> None:
|
|
440
|
+
if __debug__:
|
|
441
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
|
|
442
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
443
|
+
jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
|
|
444
|
+
|
|
376
445
|
@builtins.property
|
|
377
446
|
@jsii.member(jsii_name="tagsRaw")
|
|
378
447
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -386,6 +455,90 @@ class CfnFirewall(
|
|
|
386
455
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
387
456
|
jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
|
|
388
457
|
|
|
458
|
+
@builtins.property
|
|
459
|
+
@jsii.member(jsii_name="transitGatewayId")
|
|
460
|
+
def transit_gateway_id(self) -> typing.Optional[builtins.str]:
|
|
461
|
+
'''The unique identifier of the transit gateway associated with this firewall.'''
|
|
462
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "transitGatewayId"))
|
|
463
|
+
|
|
464
|
+
@transit_gateway_id.setter
|
|
465
|
+
def transit_gateway_id(self, value: typing.Optional[builtins.str]) -> None:
|
|
466
|
+
if __debug__:
|
|
467
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6)
|
|
468
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
469
|
+
jsii.set(self, "transitGatewayId", value) # pyright: ignore[reportArgumentType]
|
|
470
|
+
|
|
471
|
+
@builtins.property
|
|
472
|
+
@jsii.member(jsii_name="vpcId")
|
|
473
|
+
def vpc_id(self) -> typing.Optional[builtins.str]:
|
|
474
|
+
'''The unique identifier of the VPC where the firewall is in use.'''
|
|
475
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "vpcId"))
|
|
476
|
+
|
|
477
|
+
@vpc_id.setter
|
|
478
|
+
def vpc_id(self, value: typing.Optional[builtins.str]) -> None:
|
|
479
|
+
if __debug__:
|
|
480
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
|
|
481
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
482
|
+
jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
|
|
483
|
+
|
|
484
|
+
@jsii.data_type(
|
|
485
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty",
|
|
486
|
+
jsii_struct_bases=[],
|
|
487
|
+
name_mapping={"availability_zone": "availabilityZone"},
|
|
488
|
+
)
|
|
489
|
+
class AvailabilityZoneMappingProperty:
|
|
490
|
+
def __init__(self, *, availability_zone: builtins.str) -> None:
|
|
491
|
+
'''Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall.
|
|
492
|
+
|
|
493
|
+
Each mapping represents where the firewall can process traffic. You use these mappings when calling ``CreateFirewall`` , ``AssociateAvailabilityZones`` , and ``DisassociateAvailabilityZones`` .
|
|
494
|
+
|
|
495
|
+
To retrieve the current Availability Zone mappings for a firewall, use ``DescribeFirewall`` .
|
|
496
|
+
|
|
497
|
+
:param availability_zone: The ID of the Availability Zone where the firewall endpoint is located. For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
|
|
498
|
+
|
|
499
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html
|
|
500
|
+
:exampleMetadata: fixture=_generated
|
|
501
|
+
|
|
502
|
+
Example::
|
|
503
|
+
|
|
504
|
+
# The code below shows an example of how to instantiate this type.
|
|
505
|
+
# The values are placeholders you should change.
|
|
506
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
507
|
+
|
|
508
|
+
availability_zone_mapping_property = networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
509
|
+
availability_zone="availabilityZone"
|
|
510
|
+
)
|
|
511
|
+
'''
|
|
512
|
+
if __debug__:
|
|
513
|
+
type_hints = typing.get_type_hints(_typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf)
|
|
514
|
+
check_type(argname="argument availability_zone", value=availability_zone, expected_type=type_hints["availability_zone"])
|
|
515
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
516
|
+
"availability_zone": availability_zone,
|
|
517
|
+
}
|
|
518
|
+
|
|
519
|
+
@builtins.property
|
|
520
|
+
def availability_zone(self) -> builtins.str:
|
|
521
|
+
'''The ID of the Availability Zone where the firewall endpoint is located.
|
|
522
|
+
|
|
523
|
+
For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
|
|
524
|
+
|
|
525
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone
|
|
526
|
+
'''
|
|
527
|
+
result = self._values.get("availability_zone")
|
|
528
|
+
assert result is not None, "Required property 'availability_zone' is missing"
|
|
529
|
+
return typing.cast(builtins.str, result)
|
|
530
|
+
|
|
531
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
532
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
533
|
+
|
|
534
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
535
|
+
return not (rhs == self)
|
|
536
|
+
|
|
537
|
+
def __repr__(self) -> str:
|
|
538
|
+
return "AvailabilityZoneMappingProperty(%s)" % ", ".join(
|
|
539
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
540
|
+
)
|
|
541
|
+
|
|
389
542
|
@jsii.data_type(
|
|
390
543
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.SubnetMappingProperty",
|
|
391
544
|
jsii_struct_bases=[],
|
|
@@ -464,13 +617,13 @@ class CfnFirewall(
|
|
|
464
617
|
)
|
|
465
618
|
|
|
466
619
|
|
|
467
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
620
|
+
@jsii.implements(_IInspectable_c2943556, _IFirewallPolicyRef_bd446a4d, _ITaggable_36806126)
|
|
468
621
|
class CfnFirewallPolicy(
|
|
469
622
|
_CfnResource_9df397a6,
|
|
470
623
|
metaclass=jsii.JSIIMeta,
|
|
471
624
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewallPolicy",
|
|
472
625
|
):
|
|
473
|
-
'''Use the
|
|
626
|
+
'''Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall.
|
|
474
627
|
|
|
475
628
|
You can use one firewall policy for multiple firewalls.
|
|
476
629
|
|
|
@@ -490,6 +643,7 @@ class CfnFirewallPolicy(
|
|
|
490
643
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
491
644
|
|
|
492
645
|
# the properties below are optional
|
|
646
|
+
enable_tls_session_holding=False,
|
|
493
647
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
494
648
|
rule_variables={
|
|
495
649
|
"rule_variables_key": {
|
|
@@ -509,6 +663,7 @@ class CfnFirewallPolicy(
|
|
|
509
663
|
resource_arn="resourceArn",
|
|
510
664
|
|
|
511
665
|
# the properties below are optional
|
|
666
|
+
deep_threat_inspection=False,
|
|
512
667
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
513
668
|
action="action"
|
|
514
669
|
),
|
|
@@ -551,7 +706,8 @@ class CfnFirewallPolicy(
|
|
|
551
706
|
description: typing.Optional[builtins.str] = None,
|
|
552
707
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
553
708
|
) -> None:
|
|
554
|
-
'''
|
|
709
|
+
'''Create a new ``AWS::NetworkFirewall::FirewallPolicy``.
|
|
710
|
+
|
|
555
711
|
:param scope: Scope in which this resource is defined.
|
|
556
712
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
557
713
|
:param firewall_policy: The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings.
|
|
@@ -605,7 +761,7 @@ class CfnFirewallPolicy(
|
|
|
605
761
|
@builtins.property
|
|
606
762
|
@jsii.member(jsii_name="attrFirewallPolicyArn")
|
|
607
763
|
def attr_firewall_policy_arn(self) -> builtins.str:
|
|
608
|
-
'''The Amazon Resource Name (ARN) of the
|
|
764
|
+
'''The Amazon Resource Name (ARN) of the firewall policy.
|
|
609
765
|
|
|
610
766
|
:cloudformationAttribute: FirewallPolicyArn
|
|
611
767
|
'''
|
|
@@ -614,7 +770,7 @@ class CfnFirewallPolicy(
|
|
|
614
770
|
@builtins.property
|
|
615
771
|
@jsii.member(jsii_name="attrFirewallPolicyId")
|
|
616
772
|
def attr_firewall_policy_id(self) -> builtins.str:
|
|
617
|
-
'''The unique ID of the
|
|
773
|
+
'''The unique ID of the firewall policy resource.
|
|
618
774
|
|
|
619
775
|
:cloudformationAttribute: FirewallPolicyId
|
|
620
776
|
'''
|
|
@@ -625,6 +781,12 @@ class CfnFirewallPolicy(
|
|
|
625
781
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
626
782
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
627
783
|
|
|
784
|
+
@builtins.property
|
|
785
|
+
@jsii.member(jsii_name="firewallPolicyRef")
|
|
786
|
+
def firewall_policy_ref(self) -> _FirewallPolicyReference_590b2e0a:
|
|
787
|
+
'''A reference to a FirewallPolicy resource.'''
|
|
788
|
+
return typing.cast(_FirewallPolicyReference_590b2e0a, jsii.get(self, "firewallPolicyRef"))
|
|
789
|
+
|
|
628
790
|
@builtins.property
|
|
629
791
|
@jsii.member(jsii_name="tags")
|
|
630
792
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -776,8 +938,8 @@ class CfnFirewallPolicy(
|
|
|
776
938
|
|
|
777
939
|
You can use custom actions in the following places:
|
|
778
940
|
|
|
779
|
-
- In an ``
|
|
780
|
-
- In an
|
|
941
|
+
- In an ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
942
|
+
- In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
781
943
|
|
|
782
944
|
:param action_definition: The custom action associated with the action name.
|
|
783
945
|
:param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
|
|
@@ -910,6 +1072,7 @@ class CfnFirewallPolicy(
|
|
|
910
1072
|
name_mapping={
|
|
911
1073
|
"stateless_default_actions": "statelessDefaultActions",
|
|
912
1074
|
"stateless_fragment_default_actions": "statelessFragmentDefaultActions",
|
|
1075
|
+
"enable_tls_session_holding": "enableTlsSessionHolding",
|
|
913
1076
|
"policy_variables": "policyVariables",
|
|
914
1077
|
"stateful_default_actions": "statefulDefaultActions",
|
|
915
1078
|
"stateful_engine_options": "statefulEngineOptions",
|
|
@@ -925,6 +1088,7 @@ class CfnFirewallPolicy(
|
|
|
925
1088
|
*,
|
|
926
1089
|
stateless_default_actions: typing.Sequence[builtins.str],
|
|
927
1090
|
stateless_fragment_default_actions: typing.Sequence[builtins.str],
|
|
1091
|
+
enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
928
1092
|
policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.PolicyVariablesProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
929
1093
|
stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
930
1094
|
stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulEngineOptionsProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -937,6 +1101,7 @@ class CfnFirewallPolicy(
|
|
|
937
1101
|
|
|
938
1102
|
:param stateless_default_actions: The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
|
|
939
1103
|
:param stateless_fragment_default_actions: The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. If you want non-matching fragmented packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
|
|
1104
|
+
:param enable_tls_session_holding: When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules. Requires an associated TLS Inspection configuration.
|
|
940
1105
|
:param policy_variables: Contains variables that you can use to override default Suricata settings in your firewall policy.
|
|
941
1106
|
:param stateful_default_actions: The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order. Valid values of the stateful default action: - aws:drop_strict - aws:drop_established - aws:alert_strict - aws:alert_established For more information, see `Strict evaluation order <https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
942
1107
|
:param stateful_engine_options: Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
|
|
@@ -959,6 +1124,7 @@ class CfnFirewallPolicy(
|
|
|
959
1124
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
960
1125
|
|
|
961
1126
|
# the properties below are optional
|
|
1127
|
+
enable_tls_session_holding=False,
|
|
962
1128
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
963
1129
|
rule_variables={
|
|
964
1130
|
"rule_variables_key": {
|
|
@@ -978,6 +1144,7 @@ class CfnFirewallPolicy(
|
|
|
978
1144
|
resource_arn="resourceArn",
|
|
979
1145
|
|
|
980
1146
|
# the properties below are optional
|
|
1147
|
+
deep_threat_inspection=False,
|
|
981
1148
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
982
1149
|
action="action"
|
|
983
1150
|
),
|
|
@@ -1004,6 +1171,7 @@ class CfnFirewallPolicy(
|
|
|
1004
1171
|
type_hints = typing.get_type_hints(_typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2db29fc18)
|
|
1005
1172
|
check_type(argname="argument stateless_default_actions", value=stateless_default_actions, expected_type=type_hints["stateless_default_actions"])
|
|
1006
1173
|
check_type(argname="argument stateless_fragment_default_actions", value=stateless_fragment_default_actions, expected_type=type_hints["stateless_fragment_default_actions"])
|
|
1174
|
+
check_type(argname="argument enable_tls_session_holding", value=enable_tls_session_holding, expected_type=type_hints["enable_tls_session_holding"])
|
|
1007
1175
|
check_type(argname="argument policy_variables", value=policy_variables, expected_type=type_hints["policy_variables"])
|
|
1008
1176
|
check_type(argname="argument stateful_default_actions", value=stateful_default_actions, expected_type=type_hints["stateful_default_actions"])
|
|
1009
1177
|
check_type(argname="argument stateful_engine_options", value=stateful_engine_options, expected_type=type_hints["stateful_engine_options"])
|
|
@@ -1015,6 +1183,8 @@ class CfnFirewallPolicy(
|
|
|
1015
1183
|
"stateless_default_actions": stateless_default_actions,
|
|
1016
1184
|
"stateless_fragment_default_actions": stateless_fragment_default_actions,
|
|
1017
1185
|
}
|
|
1186
|
+
if enable_tls_session_holding is not None:
|
|
1187
|
+
self._values["enable_tls_session_holding"] = enable_tls_session_holding
|
|
1018
1188
|
if policy_variables is not None:
|
|
1019
1189
|
self._values["policy_variables"] = policy_variables
|
|
1020
1190
|
if stateful_default_actions is not None:
|
|
@@ -1062,6 +1232,19 @@ class CfnFirewallPolicy(
|
|
|
1062
1232
|
assert result is not None, "Required property 'stateless_fragment_default_actions' is missing"
|
|
1063
1233
|
return typing.cast(typing.List[builtins.str], result)
|
|
1064
1234
|
|
|
1235
|
+
@builtins.property
|
|
1236
|
+
def enable_tls_session_holding(
|
|
1237
|
+
self,
|
|
1238
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
1239
|
+
'''When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules.
|
|
1240
|
+
|
|
1241
|
+
Requires an associated TLS Inspection configuration.
|
|
1242
|
+
|
|
1243
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicy-enabletlssessionholding
|
|
1244
|
+
'''
|
|
1245
|
+
result = self._values.get("enable_tls_session_holding")
|
|
1246
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
1247
|
+
|
|
1065
1248
|
@builtins.property
|
|
1066
1249
|
def policy_variables(
|
|
1067
1250
|
self,
|
|
@@ -1241,7 +1424,7 @@ class CfnFirewallPolicy(
|
|
|
1241
1424
|
) -> None:
|
|
1242
1425
|
'''A list of IP addresses and address ranges, in CIDR notation.
|
|
1243
1426
|
|
|
1244
|
-
This is part of a
|
|
1427
|
+
This is part of a rule variable.
|
|
1245
1428
|
|
|
1246
1429
|
:param definition: The list of IP addresses and address ranges, in CIDR notation.
|
|
1247
1430
|
|
|
@@ -1568,6 +1751,7 @@ class CfnFirewallPolicy(
|
|
|
1568
1751
|
jsii_struct_bases=[],
|
|
1569
1752
|
name_mapping={
|
|
1570
1753
|
"resource_arn": "resourceArn",
|
|
1754
|
+
"deep_threat_inspection": "deepThreatInspection",
|
|
1571
1755
|
"override": "override",
|
|
1572
1756
|
"priority": "priority",
|
|
1573
1757
|
},
|
|
@@ -1577,14 +1761,16 @@ class CfnFirewallPolicy(
|
|
|
1577
1761
|
self,
|
|
1578
1762
|
*,
|
|
1579
1763
|
resource_arn: builtins.str,
|
|
1764
|
+
deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1580
1765
|
override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulRuleGroupOverrideProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1581
1766
|
priority: typing.Optional[jsii.Number] = None,
|
|
1582
1767
|
) -> None:
|
|
1583
1768
|
'''Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.
|
|
1584
1769
|
|
|
1585
1770
|
:param resource_arn: The Amazon Resource Name (ARN) of the stateful rule group.
|
|
1771
|
+
:param deep_threat_inspection: AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. .. epigraph:: Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
|
|
1586
1772
|
:param override: The action that allows the policy owner to override the behavior of the rule group within a policy.
|
|
1587
|
-
:param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single
|
|
1773
|
+
:param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
|
|
1588
1774
|
|
|
1589
1775
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html
|
|
1590
1776
|
:exampleMetadata: fixture=_generated
|
|
@@ -1599,6 +1785,7 @@ class CfnFirewallPolicy(
|
|
|
1599
1785
|
resource_arn="resourceArn",
|
|
1600
1786
|
|
|
1601
1787
|
# the properties below are optional
|
|
1788
|
+
deep_threat_inspection=False,
|
|
1602
1789
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
1603
1790
|
action="action"
|
|
1604
1791
|
),
|
|
@@ -1608,11 +1795,14 @@ class CfnFirewallPolicy(
|
|
|
1608
1795
|
if __debug__:
|
|
1609
1796
|
type_hints = typing.get_type_hints(_typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8)
|
|
1610
1797
|
check_type(argname="argument resource_arn", value=resource_arn, expected_type=type_hints["resource_arn"])
|
|
1798
|
+
check_type(argname="argument deep_threat_inspection", value=deep_threat_inspection, expected_type=type_hints["deep_threat_inspection"])
|
|
1611
1799
|
check_type(argname="argument override", value=override, expected_type=type_hints["override"])
|
|
1612
1800
|
check_type(argname="argument priority", value=priority, expected_type=type_hints["priority"])
|
|
1613
1801
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
1614
1802
|
"resource_arn": resource_arn,
|
|
1615
1803
|
}
|
|
1804
|
+
if deep_threat_inspection is not None:
|
|
1805
|
+
self._values["deep_threat_inspection"] = deep_threat_inspection
|
|
1616
1806
|
if override is not None:
|
|
1617
1807
|
self._values["override"] = override
|
|
1618
1808
|
if priority is not None:
|
|
@@ -1628,6 +1818,22 @@ class CfnFirewallPolicy(
|
|
|
1628
1818
|
assert result is not None, "Required property 'resource_arn' is missing"
|
|
1629
1819
|
return typing.cast(builtins.str, result)
|
|
1630
1820
|
|
|
1821
|
+
@builtins.property
|
|
1822
|
+
def deep_threat_inspection(
|
|
1823
|
+
self,
|
|
1824
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
1825
|
+
'''AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability.
|
|
1826
|
+
|
|
1827
|
+
When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
|
|
1828
|
+
.. epigraph::
|
|
1829
|
+
|
|
1830
|
+
Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
|
|
1831
|
+
|
|
1832
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection
|
|
1833
|
+
'''
|
|
1834
|
+
result = self._values.get("deep_threat_inspection")
|
|
1835
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
1836
|
+
|
|
1631
1837
|
@builtins.property
|
|
1632
1838
|
def override(
|
|
1633
1839
|
self,
|
|
@@ -1641,7 +1847,7 @@ class CfnFirewallPolicy(
|
|
|
1641
1847
|
|
|
1642
1848
|
@builtins.property
|
|
1643
1849
|
def priority(self) -> typing.Optional[jsii.Number]:
|
|
1644
|
-
'''An integer setting that indicates the order in which to run the stateful rule groups in a single
|
|
1850
|
+
'''An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy.
|
|
1645
1851
|
|
|
1646
1852
|
This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings.
|
|
1647
1853
|
|
|
@@ -1679,7 +1885,7 @@ class CfnFirewallPolicy(
|
|
|
1679
1885
|
) -> None:
|
|
1680
1886
|
'''Identifier for a single stateless rule group, used in a firewall policy to refer to the rule group.
|
|
1681
1887
|
|
|
1682
|
-
:param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single
|
|
1888
|
+
:param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
1683
1889
|
:param resource_arn: The Amazon Resource Name (ARN) of the stateless rule group.
|
|
1684
1890
|
|
|
1685
1891
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html
|
|
@@ -1707,7 +1913,7 @@ class CfnFirewallPolicy(
|
|
|
1707
1913
|
|
|
1708
1914
|
@builtins.property
|
|
1709
1915
|
def priority(self) -> jsii.Number:
|
|
1710
|
-
'''An integer setting that indicates the order in which to run the stateless rule groups in a single
|
|
1916
|
+
'''An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy.
|
|
1711
1917
|
|
|
1712
1918
|
Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
1713
1919
|
|
|
@@ -1780,6 +1986,7 @@ class CfnFirewallPolicyProps:
|
|
|
1780
1986
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
1781
1987
|
|
|
1782
1988
|
# the properties below are optional
|
|
1989
|
+
enable_tls_session_holding=False,
|
|
1783
1990
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
1784
1991
|
rule_variables={
|
|
1785
1992
|
"rule_variables_key": {
|
|
@@ -1799,6 +2006,7 @@ class CfnFirewallPolicyProps:
|
|
|
1799
2006
|
resource_arn="resourceArn",
|
|
1800
2007
|
|
|
1801
2008
|
# the properties below are optional
|
|
2009
|
+
deep_threat_inspection=False,
|
|
1802
2010
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
1803
2011
|
action="action"
|
|
1804
2012
|
),
|
|
@@ -1907,14 +2115,17 @@ class CfnFirewallPolicyProps:
|
|
|
1907
2115
|
name_mapping={
|
|
1908
2116
|
"firewall_name": "firewallName",
|
|
1909
2117
|
"firewall_policy_arn": "firewallPolicyArn",
|
|
1910
|
-
"
|
|
1911
|
-
"
|
|
2118
|
+
"availability_zone_change_protection": "availabilityZoneChangeProtection",
|
|
2119
|
+
"availability_zone_mappings": "availabilityZoneMappings",
|
|
1912
2120
|
"delete_protection": "deleteProtection",
|
|
1913
2121
|
"description": "description",
|
|
1914
2122
|
"enabled_analysis_types": "enabledAnalysisTypes",
|
|
1915
2123
|
"firewall_policy_change_protection": "firewallPolicyChangeProtection",
|
|
1916
2124
|
"subnet_change_protection": "subnetChangeProtection",
|
|
2125
|
+
"subnet_mappings": "subnetMappings",
|
|
1917
2126
|
"tags": "tags",
|
|
2127
|
+
"transit_gateway_id": "transitGatewayId",
|
|
2128
|
+
"vpc_id": "vpcId",
|
|
1918
2129
|
},
|
|
1919
2130
|
)
|
|
1920
2131
|
class CfnFirewallProps:
|
|
@@ -1923,27 +2134,33 @@ class CfnFirewallProps:
|
|
|
1923
2134
|
*,
|
|
1924
2135
|
firewall_name: builtins.str,
|
|
1925
2136
|
firewall_policy_arn: builtins.str,
|
|
1926
|
-
|
|
1927
|
-
|
|
2137
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2138
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
1928
2139
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1929
2140
|
description: typing.Optional[builtins.str] = None,
|
|
1930
2141
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1931
2142
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1932
2143
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2144
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
1933
2145
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2146
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
2147
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
1934
2148
|
) -> None:
|
|
1935
2149
|
'''Properties for defining a ``CfnFirewall``.
|
|
1936
2150
|
|
|
1937
2151
|
:param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
|
|
1938
2152
|
:param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
|
|
1939
|
-
:param
|
|
1940
|
-
:param
|
|
2153
|
+
:param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
2154
|
+
:param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
1941
2155
|
:param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
|
|
1942
2156
|
:param description: A description of the firewall.
|
|
1943
2157
|
:param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
|
|
1944
2158
|
:param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
1945
2159
|
:param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
2160
|
+
:param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
1946
2161
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
2162
|
+
:param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
|
|
2163
|
+
:param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
|
|
1947
2164
|
|
|
1948
2165
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html
|
|
1949
2166
|
:exampleMetadata: fixture=_generated
|
|
@@ -1957,44 +2174,54 @@ class CfnFirewallProps:
|
|
|
1957
2174
|
cfn_firewall_props = networkfirewall.CfnFirewallProps(
|
|
1958
2175
|
firewall_name="firewallName",
|
|
1959
2176
|
firewall_policy_arn="firewallPolicyArn",
|
|
1960
|
-
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
1961
|
-
subnet_id="subnetId",
|
|
1962
|
-
|
|
1963
|
-
# the properties below are optional
|
|
1964
|
-
ip_address_type="ipAddressType"
|
|
1965
|
-
)],
|
|
1966
|
-
vpc_id="vpcId",
|
|
1967
2177
|
|
|
1968
2178
|
# the properties below are optional
|
|
2179
|
+
availability_zone_change_protection=False,
|
|
2180
|
+
availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
2181
|
+
availability_zone="availabilityZone"
|
|
2182
|
+
)],
|
|
1969
2183
|
delete_protection=False,
|
|
1970
2184
|
description="description",
|
|
1971
2185
|
enabled_analysis_types=["enabledAnalysisTypes"],
|
|
1972
2186
|
firewall_policy_change_protection=False,
|
|
1973
2187
|
subnet_change_protection=False,
|
|
2188
|
+
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
2189
|
+
subnet_id="subnetId",
|
|
2190
|
+
|
|
2191
|
+
# the properties below are optional
|
|
2192
|
+
ip_address_type="ipAddressType"
|
|
2193
|
+
)],
|
|
1974
2194
|
tags=[CfnTag(
|
|
1975
2195
|
key="key",
|
|
1976
2196
|
value="value"
|
|
1977
|
-
)]
|
|
2197
|
+
)],
|
|
2198
|
+
transit_gateway_id="transitGatewayId",
|
|
2199
|
+
vpc_id="vpcId"
|
|
1978
2200
|
)
|
|
1979
2201
|
'''
|
|
1980
2202
|
if __debug__:
|
|
1981
2203
|
type_hints = typing.get_type_hints(_typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57bc238e99)
|
|
1982
2204
|
check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
|
|
1983
2205
|
check_type(argname="argument firewall_policy_arn", value=firewall_policy_arn, expected_type=type_hints["firewall_policy_arn"])
|
|
1984
|
-
check_type(argname="argument
|
|
1985
|
-
check_type(argname="argument
|
|
2206
|
+
check_type(argname="argument availability_zone_change_protection", value=availability_zone_change_protection, expected_type=type_hints["availability_zone_change_protection"])
|
|
2207
|
+
check_type(argname="argument availability_zone_mappings", value=availability_zone_mappings, expected_type=type_hints["availability_zone_mappings"])
|
|
1986
2208
|
check_type(argname="argument delete_protection", value=delete_protection, expected_type=type_hints["delete_protection"])
|
|
1987
2209
|
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
1988
2210
|
check_type(argname="argument enabled_analysis_types", value=enabled_analysis_types, expected_type=type_hints["enabled_analysis_types"])
|
|
1989
2211
|
check_type(argname="argument firewall_policy_change_protection", value=firewall_policy_change_protection, expected_type=type_hints["firewall_policy_change_protection"])
|
|
1990
2212
|
check_type(argname="argument subnet_change_protection", value=subnet_change_protection, expected_type=type_hints["subnet_change_protection"])
|
|
2213
|
+
check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
|
|
1991
2214
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
2215
|
+
check_type(argname="argument transit_gateway_id", value=transit_gateway_id, expected_type=type_hints["transit_gateway_id"])
|
|
2216
|
+
check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
|
|
1992
2217
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
1993
2218
|
"firewall_name": firewall_name,
|
|
1994
2219
|
"firewall_policy_arn": firewall_policy_arn,
|
|
1995
|
-
"subnet_mappings": subnet_mappings,
|
|
1996
|
-
"vpc_id": vpc_id,
|
|
1997
2220
|
}
|
|
2221
|
+
if availability_zone_change_protection is not None:
|
|
2222
|
+
self._values["availability_zone_change_protection"] = availability_zone_change_protection
|
|
2223
|
+
if availability_zone_mappings is not None:
|
|
2224
|
+
self._values["availability_zone_mappings"] = availability_zone_mappings
|
|
1998
2225
|
if delete_protection is not None:
|
|
1999
2226
|
self._values["delete_protection"] = delete_protection
|
|
2000
2227
|
if description is not None:
|
|
@@ -2005,8 +2232,14 @@ class CfnFirewallProps:
|
|
|
2005
2232
|
self._values["firewall_policy_change_protection"] = firewall_policy_change_protection
|
|
2006
2233
|
if subnet_change_protection is not None:
|
|
2007
2234
|
self._values["subnet_change_protection"] = subnet_change_protection
|
|
2235
|
+
if subnet_mappings is not None:
|
|
2236
|
+
self._values["subnet_mappings"] = subnet_mappings
|
|
2008
2237
|
if tags is not None:
|
|
2009
2238
|
self._values["tags"] = tags
|
|
2239
|
+
if transit_gateway_id is not None:
|
|
2240
|
+
self._values["transit_gateway_id"] = transit_gateway_id
|
|
2241
|
+
if vpc_id is not None:
|
|
2242
|
+
self._values["vpc_id"] = vpc_id
|
|
2010
2243
|
|
|
2011
2244
|
@builtins.property
|
|
2012
2245
|
def firewall_name(self) -> builtins.str:
|
|
@@ -2033,30 +2266,30 @@ class CfnFirewallProps:
|
|
|
2033
2266
|
return typing.cast(builtins.str, result)
|
|
2034
2267
|
|
|
2035
2268
|
@builtins.property
|
|
2036
|
-
def
|
|
2269
|
+
def availability_zone_change_protection(
|
|
2037
2270
|
self,
|
|
2038
|
-
) -> typing.
|
|
2039
|
-
'''
|
|
2271
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2272
|
+
'''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.
|
|
2040
2273
|
|
|
2041
|
-
|
|
2274
|
+
When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
2042
2275
|
|
|
2043
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-
|
|
2276
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection
|
|
2044
2277
|
'''
|
|
2045
|
-
result = self._values.get("
|
|
2046
|
-
|
|
2047
|
-
return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]], result)
|
|
2278
|
+
result = self._values.get("availability_zone_change_protection")
|
|
2279
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2048
2280
|
|
|
2049
2281
|
@builtins.property
|
|
2050
|
-
def
|
|
2051
|
-
|
|
2282
|
+
def availability_zone_mappings(
|
|
2283
|
+
self,
|
|
2284
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]]:
|
|
2285
|
+
'''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.
|
|
2052
2286
|
|
|
2053
|
-
|
|
2287
|
+
Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
2054
2288
|
|
|
2055
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-
|
|
2289
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings
|
|
2056
2290
|
'''
|
|
2057
|
-
result = self._values.get("
|
|
2058
|
-
|
|
2059
|
-
return typing.cast(builtins.str, result)
|
|
2291
|
+
result = self._values.get("availability_zone_mappings")
|
|
2292
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]], result)
|
|
2060
2293
|
|
|
2061
2294
|
@builtins.property
|
|
2062
2295
|
def delete_protection(
|
|
@@ -2115,6 +2348,23 @@ class CfnFirewallProps:
|
|
|
2115
2348
|
result = self._values.get("subnet_change_protection")
|
|
2116
2349
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2117
2350
|
|
|
2351
|
+
@builtins.property
|
|
2352
|
+
def subnet_mappings(
|
|
2353
|
+
self,
|
|
2354
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]]:
|
|
2355
|
+
'''The primary public subnets that Network Firewall is using for the firewall.
|
|
2356
|
+
|
|
2357
|
+
Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
|
|
2358
|
+
|
|
2359
|
+
These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
|
|
2360
|
+
|
|
2361
|
+
In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
2362
|
+
|
|
2363
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
|
|
2364
|
+
'''
|
|
2365
|
+
result = self._values.get("subnet_mappings")
|
|
2366
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]], result)
|
|
2367
|
+
|
|
2118
2368
|
@builtins.property
|
|
2119
2369
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
2120
2370
|
'''An array of key-value pairs to apply to this resource.
|
|
@@ -2126,6 +2376,28 @@ class CfnFirewallProps:
|
|
|
2126
2376
|
result = self._values.get("tags")
|
|
2127
2377
|
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
|
|
2128
2378
|
|
|
2379
|
+
@builtins.property
|
|
2380
|
+
def transit_gateway_id(self) -> typing.Optional[builtins.str]:
|
|
2381
|
+
'''The unique identifier of the transit gateway associated with this firewall.
|
|
2382
|
+
|
|
2383
|
+
This field is only present for transit gateway-attached firewalls.
|
|
2384
|
+
|
|
2385
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid
|
|
2386
|
+
'''
|
|
2387
|
+
result = self._values.get("transit_gateway_id")
|
|
2388
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2389
|
+
|
|
2390
|
+
@builtins.property
|
|
2391
|
+
def vpc_id(self) -> typing.Optional[builtins.str]:
|
|
2392
|
+
'''The unique identifier of the VPC where the firewall is in use.
|
|
2393
|
+
|
|
2394
|
+
You can't change the VPC of a firewall after you create the firewall.
|
|
2395
|
+
|
|
2396
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
|
|
2397
|
+
'''
|
|
2398
|
+
result = self._values.get("vpc_id")
|
|
2399
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2400
|
+
|
|
2129
2401
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
2130
2402
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
2131
2403
|
|
|
@@ -2138,17 +2410,17 @@ class CfnFirewallProps:
|
|
|
2138
2410
|
)
|
|
2139
2411
|
|
|
2140
2412
|
|
|
2141
|
-
@jsii.implements(_IInspectable_c2943556)
|
|
2413
|
+
@jsii.implements(_IInspectable_c2943556, _ILoggingConfigurationRef_1588c620)
|
|
2142
2414
|
class CfnLoggingConfiguration(
|
|
2143
2415
|
_CfnResource_9df397a6,
|
|
2144
2416
|
metaclass=jsii.JSIIMeta,
|
|
2145
2417
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnLoggingConfiguration",
|
|
2146
2418
|
):
|
|
2147
|
-
'''Use the
|
|
2419
|
+
'''Use the logging configuration to define the destinations and logging options for an firewall.
|
|
2148
2420
|
|
|
2149
2421
|
You must change the logging configuration by changing one ``LogDestinationConfig`` setting at a time in your ``LogDestinationConfigs`` .
|
|
2150
2422
|
|
|
2151
|
-
You can make only one of the following changes to your
|
|
2423
|
+
You can make only one of the following changes to your logging configuration resource:
|
|
2152
2424
|
|
|
2153
2425
|
- Create a new log destination object by adding a single ``LogDestinationConfig`` array element to ``LogDestinationConfigs`` .
|
|
2154
2426
|
- Delete a log destination object by removing a single ``LogDestinationConfig`` array element from ``LogDestinationConfigs`` .
|
|
@@ -2179,6 +2451,7 @@ class CfnLoggingConfiguration(
|
|
|
2179
2451
|
),
|
|
2180
2452
|
|
|
2181
2453
|
# the properties below are optional
|
|
2454
|
+
enable_monitoring_dashboard=False,
|
|
2182
2455
|
firewall_name="firewallName"
|
|
2183
2456
|
)
|
|
2184
2457
|
'''
|
|
@@ -2190,13 +2463,16 @@ class CfnLoggingConfiguration(
|
|
|
2190
2463
|
*,
|
|
2191
2464
|
firewall_arn: builtins.str,
|
|
2192
2465
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LoggingConfigurationProperty", typing.Dict[builtins.str, typing.Any]]],
|
|
2466
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2193
2467
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
2194
2468
|
) -> None:
|
|
2195
|
-
'''
|
|
2469
|
+
'''Create a new ``AWS::NetworkFirewall::LoggingConfiguration``.
|
|
2470
|
+
|
|
2196
2471
|
:param scope: Scope in which this resource is defined.
|
|
2197
2472
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
2198
|
-
:param firewall_arn: The Amazon Resource Name (ARN) of the
|
|
2199
|
-
:param logging_configuration: Defines how AWS Network Firewall performs logging for a
|
|
2473
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2474
|
+
:param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
|
|
2475
|
+
:param enable_monitoring_dashboard:
|
|
2200
2476
|
:param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2201
2477
|
'''
|
|
2202
2478
|
if __debug__:
|
|
@@ -2206,6 +2482,7 @@ class CfnLoggingConfiguration(
|
|
|
2206
2482
|
props = CfnLoggingConfigurationProps(
|
|
2207
2483
|
firewall_arn=firewall_arn,
|
|
2208
2484
|
logging_configuration=logging_configuration,
|
|
2485
|
+
enable_monitoring_dashboard=enable_monitoring_dashboard,
|
|
2209
2486
|
firewall_name=firewall_name,
|
|
2210
2487
|
)
|
|
2211
2488
|
|
|
@@ -2246,10 +2523,16 @@ class CfnLoggingConfiguration(
|
|
|
2246
2523
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2247
2524
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
2248
2525
|
|
|
2526
|
+
@builtins.property
|
|
2527
|
+
@jsii.member(jsii_name="loggingConfigurationRef")
|
|
2528
|
+
def logging_configuration_ref(self) -> _LoggingConfigurationReference_f6c32f6c:
|
|
2529
|
+
'''A reference to a LoggingConfiguration resource.'''
|
|
2530
|
+
return typing.cast(_LoggingConfigurationReference_f6c32f6c, jsii.get(self, "loggingConfigurationRef"))
|
|
2531
|
+
|
|
2249
2532
|
@builtins.property
|
|
2250
2533
|
@jsii.member(jsii_name="firewallArn")
|
|
2251
2534
|
def firewall_arn(self) -> builtins.str:
|
|
2252
|
-
'''The Amazon Resource Name (ARN) of the
|
|
2535
|
+
'''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.'''
|
|
2253
2536
|
return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
|
|
2254
2537
|
|
|
2255
2538
|
@firewall_arn.setter
|
|
@@ -2264,7 +2547,7 @@ class CfnLoggingConfiguration(
|
|
|
2264
2547
|
def logging_configuration(
|
|
2265
2548
|
self,
|
|
2266
2549
|
) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"]:
|
|
2267
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2550
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.'''
|
|
2268
2551
|
return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"], jsii.get(self, "loggingConfiguration"))
|
|
2269
2552
|
|
|
2270
2553
|
@logging_configuration.setter
|
|
@@ -2277,6 +2560,23 @@ class CfnLoggingConfiguration(
|
|
|
2277
2560
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2278
2561
|
jsii.set(self, "loggingConfiguration", value) # pyright: ignore[reportArgumentType]
|
|
2279
2562
|
|
|
2563
|
+
@builtins.property
|
|
2564
|
+
@jsii.member(jsii_name="enableMonitoringDashboard")
|
|
2565
|
+
def enable_monitoring_dashboard(
|
|
2566
|
+
self,
|
|
2567
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2568
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "enableMonitoringDashboard"))
|
|
2569
|
+
|
|
2570
|
+
@enable_monitoring_dashboard.setter
|
|
2571
|
+
def enable_monitoring_dashboard(
|
|
2572
|
+
self,
|
|
2573
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
2574
|
+
) -> None:
|
|
2575
|
+
if __debug__:
|
|
2576
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe)
|
|
2577
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2578
|
+
jsii.set(self, "enableMonitoringDashboard", value) # pyright: ignore[reportArgumentType]
|
|
2579
|
+
|
|
2280
2580
|
@builtins.property
|
|
2281
2581
|
@jsii.member(jsii_name="firewallName")
|
|
2282
2582
|
def firewall_name(self) -> typing.Optional[builtins.str]:
|
|
@@ -2309,7 +2609,7 @@ class CfnLoggingConfiguration(
|
|
|
2309
2609
|
) -> None:
|
|
2310
2610
|
'''Defines where AWS Network Firewall sends logs for the firewall for one log type.
|
|
2311
2611
|
|
|
2312
|
-
This is used in
|
|
2612
|
+
This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
|
|
2313
2613
|
|
|
2314
2614
|
Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to ``DROP`` or ``ALERT`` .
|
|
2315
2615
|
|
|
@@ -2421,7 +2721,7 @@ class CfnLoggingConfiguration(
|
|
|
2421
2721
|
*,
|
|
2422
2722
|
log_destination_configs: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LogDestinationConfigProperty", typing.Dict[builtins.str, typing.Any]]]]],
|
|
2423
2723
|
) -> None:
|
|
2424
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2724
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.
|
|
2425
2725
|
|
|
2426
2726
|
:param log_destination_configs: Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
|
|
2427
2727
|
|
|
@@ -2483,6 +2783,7 @@ class CfnLoggingConfiguration(
|
|
|
2483
2783
|
name_mapping={
|
|
2484
2784
|
"firewall_arn": "firewallArn",
|
|
2485
2785
|
"logging_configuration": "loggingConfiguration",
|
|
2786
|
+
"enable_monitoring_dashboard": "enableMonitoringDashboard",
|
|
2486
2787
|
"firewall_name": "firewallName",
|
|
2487
2788
|
},
|
|
2488
2789
|
)
|
|
@@ -2492,12 +2793,14 @@ class CfnLoggingConfigurationProps:
|
|
|
2492
2793
|
*,
|
|
2493
2794
|
firewall_arn: builtins.str,
|
|
2494
2795
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
2796
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2495
2797
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
2496
2798
|
) -> None:
|
|
2497
2799
|
'''Properties for defining a ``CfnLoggingConfiguration``.
|
|
2498
2800
|
|
|
2499
|
-
:param firewall_arn: The Amazon Resource Name (ARN) of the
|
|
2500
|
-
:param logging_configuration: Defines how AWS Network Firewall performs logging for a
|
|
2801
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2802
|
+
:param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
|
|
2803
|
+
:param enable_monitoring_dashboard:
|
|
2501
2804
|
:param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2502
2805
|
|
|
2503
2806
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html
|
|
@@ -2522,6 +2825,7 @@ class CfnLoggingConfigurationProps:
|
|
|
2522
2825
|
),
|
|
2523
2826
|
|
|
2524
2827
|
# the properties below are optional
|
|
2828
|
+
enable_monitoring_dashboard=False,
|
|
2525
2829
|
firewall_name="firewallName"
|
|
2526
2830
|
)
|
|
2527
2831
|
'''
|
|
@@ -2529,17 +2833,20 @@ class CfnLoggingConfigurationProps:
|
|
|
2529
2833
|
type_hints = typing.get_type_hints(_typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d62178ab9369)
|
|
2530
2834
|
check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
|
|
2531
2835
|
check_type(argname="argument logging_configuration", value=logging_configuration, expected_type=type_hints["logging_configuration"])
|
|
2836
|
+
check_type(argname="argument enable_monitoring_dashboard", value=enable_monitoring_dashboard, expected_type=type_hints["enable_monitoring_dashboard"])
|
|
2532
2837
|
check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
|
|
2533
2838
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
2534
2839
|
"firewall_arn": firewall_arn,
|
|
2535
2840
|
"logging_configuration": logging_configuration,
|
|
2536
2841
|
}
|
|
2842
|
+
if enable_monitoring_dashboard is not None:
|
|
2843
|
+
self._values["enable_monitoring_dashboard"] = enable_monitoring_dashboard
|
|
2537
2844
|
if firewall_name is not None:
|
|
2538
2845
|
self._values["firewall_name"] = firewall_name
|
|
2539
2846
|
|
|
2540
2847
|
@builtins.property
|
|
2541
2848
|
def firewall_arn(self) -> builtins.str:
|
|
2542
|
-
'''The Amazon Resource Name (ARN) of the
|
|
2849
|
+
'''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.
|
|
2543
2850
|
|
|
2544
2851
|
You can't change the firewall specification after you create the logging configuration.
|
|
2545
2852
|
|
|
@@ -2553,7 +2860,7 @@ class CfnLoggingConfigurationProps:
|
|
|
2553
2860
|
def logging_configuration(
|
|
2554
2861
|
self,
|
|
2555
2862
|
) -> typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty]:
|
|
2556
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2863
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.
|
|
2557
2864
|
|
|
2558
2865
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration
|
|
2559
2866
|
'''
|
|
@@ -2561,6 +2868,16 @@ class CfnLoggingConfigurationProps:
|
|
|
2561
2868
|
assert result is not None, "Required property 'logging_configuration' is missing"
|
|
2562
2869
|
return typing.cast(typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty], result)
|
|
2563
2870
|
|
|
2871
|
+
@builtins.property
|
|
2872
|
+
def enable_monitoring_dashboard(
|
|
2873
|
+
self,
|
|
2874
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2875
|
+
'''
|
|
2876
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-enablemonitoringdashboard
|
|
2877
|
+
'''
|
|
2878
|
+
result = self._values.get("enable_monitoring_dashboard")
|
|
2879
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2880
|
+
|
|
2564
2881
|
@builtins.property
|
|
2565
2882
|
def firewall_name(self) -> typing.Optional[builtins.str]:
|
|
2566
2883
|
'''The name of the firewall that the logging configuration is associated with.
|
|
@@ -2584,15 +2901,13 @@ class CfnLoggingConfigurationProps:
|
|
|
2584
2901
|
)
|
|
2585
2902
|
|
|
2586
2903
|
|
|
2587
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
2904
|
+
@jsii.implements(_IInspectable_c2943556, _IRuleGroupRef_f1ee71d3, _ITaggable_36806126)
|
|
2588
2905
|
class CfnRuleGroup(
|
|
2589
2906
|
_CfnResource_9df397a6,
|
|
2590
2907
|
metaclass=jsii.JSIIMeta,
|
|
2591
2908
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup",
|
|
2592
2909
|
):
|
|
2593
|
-
'''Use the
|
|
2594
|
-
|
|
2595
|
-
You use rule groups in an ``FirewallPolicy`` to specify the filtering behavior of an ``Firewall`` .
|
|
2910
|
+
'''Use the ` <https://docs.aws.amazon.com/RuleGroup>`_ to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
|
|
2596
2911
|
|
|
2597
2912
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
|
|
2598
2913
|
:cloudformationResource: AWS::NetworkFirewall::RuleGroup
|
|
@@ -2705,6 +3020,9 @@ class CfnRuleGroup(
|
|
|
2705
3020
|
rule_order="ruleOrder"
|
|
2706
3021
|
)
|
|
2707
3022
|
),
|
|
3023
|
+
summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
3024
|
+
rule_options=["ruleOptions"]
|
|
3025
|
+
),
|
|
2708
3026
|
tags=[CfnTag(
|
|
2709
3027
|
key="key",
|
|
2710
3028
|
value="value"
|
|
@@ -2722,9 +3040,11 @@ class CfnRuleGroup(
|
|
|
2722
3040
|
type: builtins.str,
|
|
2723
3041
|
description: typing.Optional[builtins.str] = None,
|
|
2724
3042
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.RuleGroupProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3043
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.SummaryConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2725
3044
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2726
3045
|
) -> None:
|
|
2727
|
-
'''
|
|
3046
|
+
'''Create a new ``AWS::NetworkFirewall::RuleGroup``.
|
|
3047
|
+
|
|
2728
3048
|
:param scope: Scope in which this resource is defined.
|
|
2729
3049
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
2730
3050
|
:param capacity: The maximum operating resources that this rule group can use. You can't change a rule group's capacity setting after you create the rule group. When you update a rule group, you are limited to this capacity. When you reference a rule group from a firewall policy, Network Firewall reserves this capacity for the rule group.
|
|
@@ -2732,6 +3052,7 @@ class CfnRuleGroup(
|
|
|
2732
3052
|
:param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
|
|
2733
3053
|
:param description: A description of the rule group.
|
|
2734
3054
|
:param rule_group: An object that defines the rule group rules.
|
|
3055
|
+
:param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
|
|
2735
3056
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
2736
3057
|
'''
|
|
2737
3058
|
if __debug__:
|
|
@@ -2744,6 +3065,7 @@ class CfnRuleGroup(
|
|
|
2744
3065
|
type=type,
|
|
2745
3066
|
description=description,
|
|
2746
3067
|
rule_group=rule_group,
|
|
3068
|
+
summary_configuration=summary_configuration,
|
|
2747
3069
|
tags=tags,
|
|
2748
3070
|
)
|
|
2749
3071
|
|
|
@@ -2782,7 +3104,7 @@ class CfnRuleGroup(
|
|
|
2782
3104
|
@builtins.property
|
|
2783
3105
|
@jsii.member(jsii_name="attrRuleGroupArn")
|
|
2784
3106
|
def attr_rule_group_arn(self) -> builtins.str:
|
|
2785
|
-
'''The Amazon Resource Name (ARN) of the
|
|
3107
|
+
'''The Amazon Resource Name (ARN) of the rule group.
|
|
2786
3108
|
|
|
2787
3109
|
:cloudformationAttribute: RuleGroupArn
|
|
2788
3110
|
'''
|
|
@@ -2791,7 +3113,7 @@ class CfnRuleGroup(
|
|
|
2791
3113
|
@builtins.property
|
|
2792
3114
|
@jsii.member(jsii_name="attrRuleGroupId")
|
|
2793
3115
|
def attr_rule_group_id(self) -> builtins.str:
|
|
2794
|
-
'''The unique ID of the
|
|
3116
|
+
'''The unique ID of the rule group resource.
|
|
2795
3117
|
|
|
2796
3118
|
:cloudformationAttribute: RuleGroupId
|
|
2797
3119
|
'''
|
|
@@ -2802,6 +3124,12 @@ class CfnRuleGroup(
|
|
|
2802
3124
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2803
3125
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
2804
3126
|
|
|
3127
|
+
@builtins.property
|
|
3128
|
+
@jsii.member(jsii_name="ruleGroupRef")
|
|
3129
|
+
def rule_group_ref(self) -> _RuleGroupReference_b514c132:
|
|
3130
|
+
'''A reference to a RuleGroup resource.'''
|
|
3131
|
+
return typing.cast(_RuleGroupReference_b514c132, jsii.get(self, "ruleGroupRef"))
|
|
3132
|
+
|
|
2805
3133
|
@builtins.property
|
|
2806
3134
|
@jsii.member(jsii_name="tags")
|
|
2807
3135
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -2878,6 +3206,24 @@ class CfnRuleGroup(
|
|
|
2878
3206
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2879
3207
|
jsii.set(self, "ruleGroup", value) # pyright: ignore[reportArgumentType]
|
|
2880
3208
|
|
|
3209
|
+
@builtins.property
|
|
3210
|
+
@jsii.member(jsii_name="summaryConfiguration")
|
|
3211
|
+
def summary_configuration(
|
|
3212
|
+
self,
|
|
3213
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]]:
|
|
3214
|
+
'''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .'''
|
|
3215
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]], jsii.get(self, "summaryConfiguration"))
|
|
3216
|
+
|
|
3217
|
+
@summary_configuration.setter
|
|
3218
|
+
def summary_configuration(
|
|
3219
|
+
self,
|
|
3220
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]],
|
|
3221
|
+
) -> None:
|
|
3222
|
+
if __debug__:
|
|
3223
|
+
type_hints = typing.get_type_hints(_typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0)
|
|
3224
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
3225
|
+
jsii.set(self, "summaryConfiguration", value) # pyright: ignore[reportArgumentType]
|
|
3226
|
+
|
|
2881
3227
|
@builtins.property
|
|
2882
3228
|
@jsii.member(jsii_name="tagsRaw")
|
|
2883
3229
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -2965,7 +3311,7 @@ class CfnRuleGroup(
|
|
|
2965
3311
|
def __init__(self, *, address_definition: builtins.str) -> None:
|
|
2966
3312
|
'''A single IP address specification.
|
|
2967
3313
|
|
|
2968
|
-
This is used in the
|
|
3314
|
+
This is used in the match attributes source and destination specifications.
|
|
2969
3315
|
|
|
2970
3316
|
:param address_definition: Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. Examples: - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify ``192.0.2.44/32`` . - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify ``192.0.2.0/24`` . - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify ``1111:0000:0000:0000:0000:0000:0000:0111/128`` . - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify ``1111:0000:0000:0000:0000:0000:0000:0000/64`` . For more information about CIDR notation, see the Wikipedia entry `Classless Inter-Domain Routing <https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing>`_ .
|
|
2971
3317
|
|
|
@@ -3044,8 +3390,8 @@ class CfnRuleGroup(
|
|
|
3044
3390
|
|
|
3045
3391
|
You can use custom actions in the following places:
|
|
3046
3392
|
|
|
3047
|
-
- In
|
|
3048
|
-
- In an
|
|
3393
|
+
- In a ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
3394
|
+
- In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
3049
3395
|
|
|
3050
3396
|
:param action_definition: The custom action associated with the action name.
|
|
3051
3397
|
:param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
|
|
@@ -3359,7 +3705,7 @@ class CfnRuleGroup(
|
|
|
3359
3705
|
) -> None:
|
|
3360
3706
|
'''A list of IP addresses and address ranges, in CIDR notation.
|
|
3361
3707
|
|
|
3362
|
-
This is part of a ``
|
|
3708
|
+
This is part of a ``RuleVariables`` .
|
|
3363
3709
|
|
|
3364
3710
|
:param definition: The list of IP addresses and address ranges, in CIDR notation.
|
|
3365
3711
|
|
|
@@ -3414,11 +3760,11 @@ class CfnRuleGroup(
|
|
|
3414
3760
|
*,
|
|
3415
3761
|
reference_arn: typing.Optional[builtins.str] = None,
|
|
3416
3762
|
) -> None:
|
|
3417
|
-
'''Configures one or more
|
|
3763
|
+
'''Configures one or more IP set references for a Suricata-compatible rule group.
|
|
3418
3764
|
|
|
3419
3765
|
An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see `Using IP set references <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall Developer Guide* .
|
|
3420
3766
|
|
|
3421
|
-
:param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the
|
|
3767
|
+
:param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
|
|
3422
3768
|
|
|
3423
3769
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html
|
|
3424
3770
|
:exampleMetadata: fixture=_generated
|
|
@@ -3442,7 +3788,7 @@ class CfnRuleGroup(
|
|
|
3442
3788
|
|
|
3443
3789
|
@builtins.property
|
|
3444
3790
|
def reference_arn(self) -> typing.Optional[builtins.str]:
|
|
3445
|
-
'''The Amazon Resource Name (ARN) of the resource to include in the
|
|
3791
|
+
'''The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
|
|
3446
3792
|
|
|
3447
3793
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn
|
|
3448
3794
|
'''
|
|
@@ -3653,7 +3999,7 @@ class CfnRuleGroup(
|
|
|
3653
3999
|
def __init__(self, *, from_port: jsii.Number, to_port: jsii.Number) -> None:
|
|
3654
4000
|
'''A single port range specification.
|
|
3655
4001
|
|
|
3656
|
-
This is used for source and destination port ranges in the stateless
|
|
4002
|
+
This is used for source and destination port ranges in the stateless match attributes.
|
|
3657
4003
|
|
|
3658
4004
|
:param from_port: The lower limit of the port range. This must be less than or equal to the ``ToPort`` specification.
|
|
3659
4005
|
:param to_port: The upper limit of the port range. This must be greater than or equal to the ``FromPort`` specification.
|
|
@@ -3843,7 +4189,7 @@ class CfnRuleGroup(
|
|
|
3843
4189
|
*,
|
|
3844
4190
|
ip_set_references: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetReferenceProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
3845
4191
|
) -> None:
|
|
3846
|
-
'''Configures the
|
|
4192
|
+
'''Configures the reference sets for a stateful rule group.
|
|
3847
4193
|
|
|
3848
4194
|
For more information, see the `Using IP set references in Suricata compatible rule groups <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall User Guide* .
|
|
3849
4195
|
|
|
@@ -3911,7 +4257,7 @@ class CfnRuleGroup(
|
|
|
3911
4257
|
|
|
3912
4258
|
AWS Network Firewall inspects each packet for the specified matching criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on the packet.
|
|
3913
4259
|
|
|
3914
|
-
:param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the
|
|
4260
|
+
:param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy. For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
|
|
3915
4261
|
:param match_attributes: Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection. Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags.
|
|
3916
4262
|
|
|
3917
4263
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ruledefinition.html
|
|
@@ -3966,7 +4312,7 @@ class CfnRuleGroup(
|
|
|
3966
4312
|
You must specify a standard action and you can add custom actions.
|
|
3967
4313
|
.. epigraph::
|
|
3968
4314
|
|
|
3969
|
-
Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the
|
|
4315
|
+
Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy.
|
|
3970
4316
|
|
|
3971
4317
|
For every rule, you must specify exactly one of the following standard actions.
|
|
3972
4318
|
|
|
@@ -4308,7 +4654,7 @@ class CfnRuleGroup(
|
|
|
4308
4654
|
ip_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
4309
4655
|
port_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.PortSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
4310
4656
|
) -> None:
|
|
4311
|
-
'''Settings that are available for use in the rules in the
|
|
4657
|
+
'''Settings that are available for use in the rules in the rule group where this is defined.
|
|
4312
4658
|
|
|
4313
4659
|
:param ip_sets: A list of IP addresses and address ranges, in CIDR notation.
|
|
4314
4660
|
:param port_sets: A list of port ranges.
|
|
@@ -4399,9 +4745,9 @@ class CfnRuleGroup(
|
|
|
4399
4745
|
|
|
4400
4746
|
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
|
|
4401
4747
|
|
|
4402
|
-
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``
|
|
4748
|
+
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
|
|
4403
4749
|
|
|
4404
|
-
:param generated_rules_type: Whether you want to allow or
|
|
4750
|
+
:param generated_rules_type: Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list. .. epigraph:: When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
|
|
4405
4751
|
:param targets: The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:. - Explicit names. For example, ``abc.example.com`` matches only the domain ``abc.example.com`` . - Names that use a domain wildcard, which you indicate with an initial ' ``.`` '. For example, ``.example.com`` matches ``example.com`` and matches all subdomains of ``example.com`` , such as ``abc.example.com`` and ``www.example.com`` .
|
|
4406
4752
|
:param target_types: The types of targets to inspect for. Valid values are ``TLS_SNI`` and ``HTTP_HOST`` .
|
|
4407
4753
|
|
|
@@ -4433,7 +4779,11 @@ class CfnRuleGroup(
|
|
|
4433
4779
|
|
|
4434
4780
|
@builtins.property
|
|
4435
4781
|
def generated_rules_type(self) -> builtins.str:
|
|
4436
|
-
'''Whether you want to allow or
|
|
4782
|
+
'''Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
|
|
4783
|
+
|
|
4784
|
+
.. epigraph::
|
|
4785
|
+
|
|
4786
|
+
When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
|
|
4437
4787
|
|
|
4438
4788
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html#cfn-networkfirewall-rulegroup-rulessourcelist-generatedrulestype
|
|
4439
4789
|
'''
|
|
@@ -4501,7 +4851,7 @@ class CfnRuleGroup(
|
|
|
4501
4851
|
Each rule group requires a single ``RulesSource`` . You can use an instance of this for either stateless rules or stateful rules.
|
|
4502
4852
|
|
|
4503
4853
|
:param rules_source_list: Stateful inspection criteria for a domain list rule group.
|
|
4504
|
-
:param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in
|
|
4854
|
+
:param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
|
|
4505
4855
|
:param stateful_rules: An array of individual stateful rules inspection criteria to be used together in a stateful rule group. Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
|
|
4506
4856
|
:param stateless_rules_and_custom_actions: Stateless inspection criteria to be used in a stateless rule group.
|
|
4507
4857
|
|
|
@@ -4619,7 +4969,7 @@ class CfnRuleGroup(
|
|
|
4619
4969
|
These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
|
|
4620
4970
|
.. epigraph::
|
|
4621
4971
|
|
|
4622
|
-
You can't use the ``priority`` keyword if the ``RuleOrder`` option in
|
|
4972
|
+
You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
|
|
4623
4973
|
|
|
4624
4974
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring
|
|
4625
4975
|
'''
|
|
@@ -4737,7 +5087,7 @@ class CfnRuleGroup(
|
|
|
4737
5087
|
|
|
4738
5088
|
Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
|
|
4739
5089
|
|
|
4740
|
-
:param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5090
|
+
:param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration. ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
|
|
4741
5091
|
:param header: The stateful inspection criteria for this rule, used to inspect traffic flows.
|
|
4742
5092
|
:param rule_options: Additional settings for a stateful rule, provided as keywords and settings.
|
|
4743
5093
|
|
|
@@ -4788,13 +5138,13 @@ class CfnRuleGroup(
|
|
|
4788
5138
|
The actions for a stateful rule are defined as follows:
|
|
4789
5139
|
|
|
4790
5140
|
- *PASS* - Permits the packets to go to the intended destination.
|
|
4791
|
-
- *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5141
|
+
- *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
4792
5142
|
- *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic.
|
|
4793
|
-
- *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5143
|
+
- *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
4794
5144
|
|
|
4795
5145
|
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` .
|
|
4796
5146
|
|
|
4797
|
-
- *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the
|
|
5147
|
+
- *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
|
|
4798
5148
|
|
|
4799
5149
|
``REJECT`` isn't currently available for use with IMAP and FTP protocols.
|
|
4800
5150
|
|
|
@@ -4853,7 +5203,7 @@ class CfnRuleGroup(
|
|
|
4853
5203
|
) -> None:
|
|
4854
5204
|
'''A single stateless rule.
|
|
4855
5205
|
|
|
4856
|
-
This is used in ``
|
|
5206
|
+
This is used in ``StatelessRulesAndCustomActions`` .
|
|
4857
5207
|
|
|
4858
5208
|
:param priority: Indicates the order in which to run this rule relative to all of the rules that are defined for a stateless rule group. Network Firewall evaluates the rules in a rule group starting with the lowest priority setting. You must ensure that the priority settings are unique for the rule group. Each stateless rule group uses exactly one ``StatelessRulesAndCustomActions`` object, and each ``StatelessRulesAndCustomActions`` contains exactly one ``StatelessRules`` object. To ensure unique priority settings for your rule groups, set unique priorities for the stateless rules that you define inside any single ``StatelessRules`` object. You can change the priority settings of your rules at any time. To make it easier to insert rules later, number them so there's a wide range in between, for example use 100, 200, and so on.
|
|
4859
5209
|
:param rule_definition: Defines the stateless 5-tuple packet inspection criteria and the action to take on a packet that matches the criteria.
|
|
@@ -4965,7 +5315,7 @@ class CfnRuleGroup(
|
|
|
4965
5315
|
Each stateless rule group uses exactly one of these data types to define its stateless rules.
|
|
4966
5316
|
|
|
4967
5317
|
:param stateless_rules: Defines the set of stateless rules for use in a stateless rule group.
|
|
4968
|
-
:param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule
|
|
5318
|
+
:param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
|
|
4969
5319
|
|
|
4970
5320
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html
|
|
4971
5321
|
:exampleMetadata: fixture=_generated
|
|
@@ -5048,7 +5398,7 @@ class CfnRuleGroup(
|
|
|
5048
5398
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.CustomActionProperty"]]]]:
|
|
5049
5399
|
'''Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification.
|
|
5050
5400
|
|
|
5051
|
-
You name each custom action that you define, and then you can use it by name in your stateless rule
|
|
5401
|
+
You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
|
|
5052
5402
|
|
|
5053
5403
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions
|
|
5054
5404
|
'''
|
|
@@ -5067,27 +5417,25 @@ class CfnRuleGroup(
|
|
|
5067
5417
|
)
|
|
5068
5418
|
|
|
5069
5419
|
@jsii.data_type(
|
|
5070
|
-
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.
|
|
5420
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.SummaryConfigurationProperty",
|
|
5071
5421
|
jsii_struct_bases=[],
|
|
5072
|
-
name_mapping={"
|
|
5422
|
+
name_mapping={"rule_options": "ruleOptions"},
|
|
5073
5423
|
)
|
|
5074
|
-
class
|
|
5424
|
+
class SummaryConfigurationProperty:
|
|
5075
5425
|
def __init__(
|
|
5076
5426
|
self,
|
|
5077
5427
|
*,
|
|
5078
|
-
|
|
5079
|
-
masks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5428
|
+
rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5080
5429
|
) -> None:
|
|
5081
|
-
'''
|
|
5430
|
+
'''A complex type that specifies which Suricata rule metadata fields to use when displaying threat information. Contains:.
|
|
5082
5431
|
|
|
5083
|
-
|
|
5432
|
+
- ``RuleOptions`` - The Suricata rule options fields to extract and display
|
|
5084
5433
|
|
|
5085
|
-
|
|
5434
|
+
These settings affect how threat information appears in both the console and API responses. Summaries are available for rule groups you manage and for active threat defense AWS managed rule groups.
|
|
5086
5435
|
|
|
5087
|
-
:param
|
|
5088
|
-
:param masks: The set of flags to consider in the inspection. To inspect all flags in the valid values list, leave this with no setting.
|
|
5436
|
+
:param rule_options: Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
|
|
5089
5437
|
|
|
5090
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-
|
|
5438
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html
|
|
5091
5439
|
:exampleMetadata: fixture=_generated
|
|
5092
5440
|
|
|
5093
5441
|
Example::
|
|
@@ -5096,7 +5444,68 @@ class CfnRuleGroup(
|
|
|
5096
5444
|
# The values are placeholders you should change.
|
|
5097
5445
|
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
5098
5446
|
|
|
5099
|
-
|
|
5447
|
+
summary_configuration_property = networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
5448
|
+
rule_options=["ruleOptions"]
|
|
5449
|
+
)
|
|
5450
|
+
'''
|
|
5451
|
+
if __debug__:
|
|
5452
|
+
type_hints = typing.get_type_hints(_typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307)
|
|
5453
|
+
check_type(argname="argument rule_options", value=rule_options, expected_type=type_hints["rule_options"])
|
|
5454
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
5455
|
+
if rule_options is not None:
|
|
5456
|
+
self._values["rule_options"] = rule_options
|
|
5457
|
+
|
|
5458
|
+
@builtins.property
|
|
5459
|
+
def rule_options(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
5460
|
+
'''Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
|
|
5461
|
+
|
|
5462
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html#cfn-networkfirewall-rulegroup-summaryconfiguration-ruleoptions
|
|
5463
|
+
'''
|
|
5464
|
+
result = self._values.get("rule_options")
|
|
5465
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
5466
|
+
|
|
5467
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
5468
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
5469
|
+
|
|
5470
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
5471
|
+
return not (rhs == self)
|
|
5472
|
+
|
|
5473
|
+
def __repr__(self) -> str:
|
|
5474
|
+
return "SummaryConfigurationProperty(%s)" % ", ".join(
|
|
5475
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
5476
|
+
)
|
|
5477
|
+
|
|
5478
|
+
@jsii.data_type(
|
|
5479
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.TCPFlagFieldProperty",
|
|
5480
|
+
jsii_struct_bases=[],
|
|
5481
|
+
name_mapping={"flags": "flags", "masks": "masks"},
|
|
5482
|
+
)
|
|
5483
|
+
class TCPFlagFieldProperty:
|
|
5484
|
+
def __init__(
|
|
5485
|
+
self,
|
|
5486
|
+
*,
|
|
5487
|
+
flags: typing.Sequence[builtins.str],
|
|
5488
|
+
masks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5489
|
+
) -> None:
|
|
5490
|
+
'''TCP flags and masks to inspect packets for. This is used in the match attributes specification.
|
|
5491
|
+
|
|
5492
|
+
For example:
|
|
5493
|
+
|
|
5494
|
+
``"TCPFlags": [ { "Flags": [ "ECE", "SYN" ], "Masks": [ "SYN", "ECE" ] } ]``
|
|
5495
|
+
|
|
5496
|
+
:param flags: Used in conjunction with the ``Masks`` setting to define the flags that must be set and flags that must not be set in order for the packet to match. This setting can only specify values that are also specified in the ``Masks`` setting. For the flags that are specified in the masks setting, the following must be true for the packet to match: - The ones that are set in this flags setting must be set in the packet. - The ones that are not set in this flags setting must also not be set in the packet.
|
|
5497
|
+
:param masks: The set of flags to consider in the inspection. To inspect all flags in the valid values list, leave this with no setting.
|
|
5498
|
+
|
|
5499
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-tcpflagfield.html
|
|
5500
|
+
:exampleMetadata: fixture=_generated
|
|
5501
|
+
|
|
5502
|
+
Example::
|
|
5503
|
+
|
|
5504
|
+
# The code below shows an example of how to instantiate this type.
|
|
5505
|
+
# The values are placeholders you should change.
|
|
5506
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
5507
|
+
|
|
5508
|
+
t_cPFlag_field_property = networkfirewall.CfnRuleGroup.TCPFlagFieldProperty(
|
|
5100
5509
|
flags=["flags"],
|
|
5101
5510
|
|
|
5102
5511
|
# the properties below are optional
|
|
@@ -5162,6 +5571,7 @@ class CfnRuleGroup(
|
|
|
5162
5571
|
"type": "type",
|
|
5163
5572
|
"description": "description",
|
|
5164
5573
|
"rule_group": "ruleGroup",
|
|
5574
|
+
"summary_configuration": "summaryConfiguration",
|
|
5165
5575
|
"tags": "tags",
|
|
5166
5576
|
},
|
|
5167
5577
|
)
|
|
@@ -5174,6 +5584,7 @@ class CfnRuleGroupProps:
|
|
|
5174
5584
|
type: builtins.str,
|
|
5175
5585
|
description: typing.Optional[builtins.str] = None,
|
|
5176
5586
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5587
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5177
5588
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5178
5589
|
) -> None:
|
|
5179
5590
|
'''Properties for defining a ``CfnRuleGroup``.
|
|
@@ -5183,6 +5594,7 @@ class CfnRuleGroupProps:
|
|
|
5183
5594
|
:param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
|
|
5184
5595
|
:param description: A description of the rule group.
|
|
5185
5596
|
:param rule_group: An object that defines the rule group rules.
|
|
5597
|
+
:param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
|
|
5186
5598
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
5187
5599
|
|
|
5188
5600
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
|
|
@@ -5295,6 +5707,9 @@ class CfnRuleGroupProps:
|
|
|
5295
5707
|
rule_order="ruleOrder"
|
|
5296
5708
|
)
|
|
5297
5709
|
),
|
|
5710
|
+
summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
5711
|
+
rule_options=["ruleOptions"]
|
|
5712
|
+
),
|
|
5298
5713
|
tags=[CfnTag(
|
|
5299
5714
|
key="key",
|
|
5300
5715
|
value="value"
|
|
@@ -5308,6 +5723,7 @@ class CfnRuleGroupProps:
|
|
|
5308
5723
|
check_type(argname="argument type", value=type, expected_type=type_hints["type"])
|
|
5309
5724
|
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
5310
5725
|
check_type(argname="argument rule_group", value=rule_group, expected_type=type_hints["rule_group"])
|
|
5726
|
+
check_type(argname="argument summary_configuration", value=summary_configuration, expected_type=type_hints["summary_configuration"])
|
|
5311
5727
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
5312
5728
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
5313
5729
|
"capacity": capacity,
|
|
@@ -5318,6 +5734,8 @@ class CfnRuleGroupProps:
|
|
|
5318
5734
|
self._values["description"] = description
|
|
5319
5735
|
if rule_group is not None:
|
|
5320
5736
|
self._values["rule_group"] = rule_group
|
|
5737
|
+
if summary_configuration is not None:
|
|
5738
|
+
self._values["summary_configuration"] = summary_configuration
|
|
5321
5739
|
if tags is not None:
|
|
5322
5740
|
self._values["tags"] = tags
|
|
5323
5741
|
|
|
@@ -5378,6 +5796,20 @@ class CfnRuleGroupProps:
|
|
|
5378
5796
|
result = self._values.get("rule_group")
|
|
5379
5797
|
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.RuleGroupProperty]], result)
|
|
5380
5798
|
|
|
5799
|
+
@builtins.property
|
|
5800
|
+
def summary_configuration(
|
|
5801
|
+
self,
|
|
5802
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]]:
|
|
5803
|
+
'''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .
|
|
5804
|
+
|
|
5805
|
+
- The ``RuleOptions`` specified in ``SummaryConfiguration``
|
|
5806
|
+
- Rule metadata organization preferences
|
|
5807
|
+
|
|
5808
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration
|
|
5809
|
+
'''
|
|
5810
|
+
result = self._values.get("summary_configuration")
|
|
5811
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]], result)
|
|
5812
|
+
|
|
5381
5813
|
@builtins.property
|
|
5382
5814
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
5383
5815
|
'''An array of key-value pairs to apply to this resource.
|
|
@@ -5401,7 +5833,7 @@ class CfnRuleGroupProps:
|
|
|
5401
5833
|
)
|
|
5402
5834
|
|
|
5403
5835
|
|
|
5404
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggableV2_4e6798f8)
|
|
5836
|
+
@jsii.implements(_IInspectable_c2943556, _ITLSInspectionConfigurationRef_6d0a6d9c, _ITaggableV2_4e6798f8)
|
|
5405
5837
|
class CfnTLSInspectionConfiguration(
|
|
5406
5838
|
_CfnResource_9df397a6,
|
|
5407
5839
|
metaclass=jsii.JSIIMeta,
|
|
@@ -5474,10 +5906,11 @@ class CfnTLSInspectionConfiguration(
|
|
|
5474
5906
|
description: typing.Optional[builtins.str] = None,
|
|
5475
5907
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5476
5908
|
) -> None:
|
|
5477
|
-
'''
|
|
5909
|
+
'''Create a new ``AWS::NetworkFirewall::TLSInspectionConfiguration``.
|
|
5910
|
+
|
|
5478
5911
|
:param scope: Scope in which this resource is defined.
|
|
5479
5912
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
5480
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
5913
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5481
5914
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
5482
5915
|
:param description: A description of the TLS inspection configuration.
|
|
5483
5916
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -5556,6 +5989,14 @@ class CfnTLSInspectionConfiguration(
|
|
|
5556
5989
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
5557
5990
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
5558
5991
|
|
|
5992
|
+
@builtins.property
|
|
5993
|
+
@jsii.member(jsii_name="tlsInspectionConfigurationRef")
|
|
5994
|
+
def tls_inspection_configuration_ref(
|
|
5995
|
+
self,
|
|
5996
|
+
) -> _TLSInspectionConfigurationReference_52bd7dd3:
|
|
5997
|
+
'''A reference to a TLSInspectionConfiguration resource.'''
|
|
5998
|
+
return typing.cast(_TLSInspectionConfigurationReference_52bd7dd3, jsii.get(self, "tlsInspectionConfigurationRef"))
|
|
5999
|
+
|
|
5559
6000
|
@builtins.property
|
|
5560
6001
|
@jsii.member(jsii_name="tlsInspectionConfiguration")
|
|
5561
6002
|
def tls_inspection_configuration(
|
|
@@ -5695,7 +6136,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
5695
6136
|
) -> None:
|
|
5696
6137
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
5697
6138
|
|
|
5698
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6139
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5699
6140
|
|
|
5700
6141
|
:param revoked_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
5701
6142
|
:param unknown_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
@@ -5852,14 +6293,14 @@ class CfnTLSInspectionConfiguration(
|
|
|
5852
6293
|
scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
5853
6294
|
server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
5854
6295
|
) -> None:
|
|
5855
|
-
'''Configures the
|
|
6296
|
+
'''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5856
6297
|
|
|
5857
6298
|
.. epigraph::
|
|
5858
6299
|
|
|
5859
|
-
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6300
|
+
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
|
|
5860
6301
|
|
|
5861
|
-
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
5862
|
-
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6302
|
+
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
6303
|
+
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5863
6304
|
:param scopes: A list of scopes.
|
|
5864
6305
|
:param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
|
|
5865
6306
|
|
|
@@ -5918,16 +6359,16 @@ class CfnTLSInspectionConfiguration(
|
|
|
5918
6359
|
|
|
5919
6360
|
@builtins.property
|
|
5920
6361
|
def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
|
|
5921
|
-
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
6362
|
+
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
|
|
5922
6363
|
|
|
5923
6364
|
The following limitations apply:
|
|
5924
6365
|
|
|
5925
6366
|
- You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
|
|
5926
6367
|
- You can't use certificates issued by AWS Private Certificate Authority .
|
|
5927
6368
|
|
|
5928
|
-
For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with
|
|
6369
|
+
For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5929
6370
|
|
|
5930
|
-
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *
|
|
6371
|
+
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
5931
6372
|
|
|
5932
6373
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
|
|
5933
6374
|
'''
|
|
@@ -5940,7 +6381,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
5940
6381
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.CheckCertificateRevocationStatusProperty"]]:
|
|
5941
6382
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
5942
6383
|
|
|
5943
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6384
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5944
6385
|
|
|
5945
6386
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-checkcertificaterevocationstatus
|
|
5946
6387
|
'''
|
|
@@ -5991,9 +6432,9 @@ class CfnTLSInspectionConfiguration(
|
|
|
5991
6432
|
*,
|
|
5992
6433
|
resource_arn: typing.Optional[builtins.str] = None,
|
|
5993
6434
|
) -> None:
|
|
5994
|
-
'''Any
|
|
6435
|
+
'''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
5995
6436
|
|
|
5996
|
-
:param resource_arn: The Amazon Resource Name (ARN) of the
|
|
6437
|
+
:param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
5997
6438
|
|
|
5998
6439
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
|
|
5999
6440
|
:exampleMetadata: fixture=_generated
|
|
@@ -6017,7 +6458,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6017
6458
|
|
|
6018
6459
|
@builtins.property
|
|
6019
6460
|
def resource_arn(self) -> typing.Optional[builtins.str]:
|
|
6020
|
-
'''The Amazon Resource Name (ARN) of the
|
|
6461
|
+
'''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
6021
6462
|
|
|
6022
6463
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
|
|
6023
6464
|
'''
|
|
@@ -6305,7 +6746,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6305
6746
|
) -> None:
|
|
6306
6747
|
'''Properties for defining a ``CfnTLSInspectionConfiguration``.
|
|
6307
6748
|
|
|
6308
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
6749
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6309
6750
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
6310
6751
|
:param description: A description of the TLS inspection configuration.
|
|
6311
6752
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -6380,7 +6821,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6380
6821
|
) -> typing.Union[_IResolvable_da3f097b, CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty]:
|
|
6381
6822
|
'''The object that defines a TLS inspection configuration.
|
|
6382
6823
|
|
|
6383
|
-
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
6824
|
+
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6384
6825
|
|
|
6385
6826
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
|
|
6386
6827
|
'''
|
|
@@ -6430,6 +6871,453 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6430
6871
|
)
|
|
6431
6872
|
|
|
6432
6873
|
|
|
6874
|
+
@jsii.implements(_IInspectable_c2943556, _IVpcEndpointAssociationRef_bd0818d9, _ITaggableV2_4e6798f8)
|
|
6875
|
+
class CfnVpcEndpointAssociation(
|
|
6876
|
+
_CfnResource_9df397a6,
|
|
6877
|
+
metaclass=jsii.JSIIMeta,
|
|
6878
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation",
|
|
6879
|
+
):
|
|
6880
|
+
'''A VPC endpoint association defines a single subnet to use for a firewall endpoint for a ``Firewall`` .
|
|
6881
|
+
|
|
6882
|
+
You can define VPC endpoint associations only in the Availability Zones that already have a subnet mapping defined in the ``Firewall`` resource.
|
|
6883
|
+
.. epigraph::
|
|
6884
|
+
|
|
6885
|
+
You can retrieve the list of Availability Zones that are available for use by calling ``DescribeFirewallMetadata`` .
|
|
6886
|
+
|
|
6887
|
+
To manage firewall endpoints, first, in the ``Firewall`` specification, you specify a single VPC and one subnet for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as VPC endpoint associations.
|
|
6888
|
+
|
|
6889
|
+
You can use VPC endpoint associations to expand the protections of the firewall as follows:
|
|
6890
|
+
|
|
6891
|
+
- *Protect multiple VPCs with a single firewall* - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the ``Firewall`` subnet mappings.
|
|
6892
|
+
- *Define multiple firewall endpoints for a VPC in an Availability Zone* - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the ``Firewall`` subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.
|
|
6893
|
+
|
|
6894
|
+
You can use AWS Resource Access Manager to share a ``Firewall`` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see ``PutResourcePolicy`` in this guide and see `Sharing Network Firewall resources <https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6895
|
+
|
|
6896
|
+
The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling ``DescribeVpcEndpointAssociation`` .
|
|
6897
|
+
|
|
6898
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
|
|
6899
|
+
:cloudformationResource: AWS::NetworkFirewall::VpcEndpointAssociation
|
|
6900
|
+
:exampleMetadata: fixture=_generated
|
|
6901
|
+
|
|
6902
|
+
Example::
|
|
6903
|
+
|
|
6904
|
+
# The code below shows an example of how to instantiate this type.
|
|
6905
|
+
# The values are placeholders you should change.
|
|
6906
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
6907
|
+
|
|
6908
|
+
cfn_vpc_endpoint_association = networkfirewall.CfnVpcEndpointAssociation(self, "MyCfnVpcEndpointAssociation",
|
|
6909
|
+
firewall_arn="firewallArn",
|
|
6910
|
+
subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
6911
|
+
subnet_id="subnetId",
|
|
6912
|
+
|
|
6913
|
+
# the properties below are optional
|
|
6914
|
+
ip_address_type="ipAddressType"
|
|
6915
|
+
),
|
|
6916
|
+
vpc_id="vpcId",
|
|
6917
|
+
|
|
6918
|
+
# the properties below are optional
|
|
6919
|
+
description="description",
|
|
6920
|
+
tags=[CfnTag(
|
|
6921
|
+
key="key",
|
|
6922
|
+
value="value"
|
|
6923
|
+
)]
|
|
6924
|
+
)
|
|
6925
|
+
'''
|
|
6926
|
+
|
|
6927
|
+
def __init__(
|
|
6928
|
+
self,
|
|
6929
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
6930
|
+
id: builtins.str,
|
|
6931
|
+
*,
|
|
6932
|
+
firewall_arn: builtins.str,
|
|
6933
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union["CfnVpcEndpointAssociation.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]],
|
|
6934
|
+
vpc_id: builtins.str,
|
|
6935
|
+
description: typing.Optional[builtins.str] = None,
|
|
6936
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6937
|
+
) -> None:
|
|
6938
|
+
'''Create a new ``AWS::NetworkFirewall::VpcEndpointAssociation``.
|
|
6939
|
+
|
|
6940
|
+
:param scope: Scope in which this resource is defined.
|
|
6941
|
+
:param id: Construct identifier for this resource (unique in its scope).
|
|
6942
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
|
|
6943
|
+
:param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
6944
|
+
:param vpc_id: The unique identifier of the VPC for the endpoint association.
|
|
6945
|
+
:param description: A description of the VPC endpoint association.
|
|
6946
|
+
:param tags: The key:value pairs to associate with the resource.
|
|
6947
|
+
'''
|
|
6948
|
+
if __debug__:
|
|
6949
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3)
|
|
6950
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
6951
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
6952
|
+
props = CfnVpcEndpointAssociationProps(
|
|
6953
|
+
firewall_arn=firewall_arn,
|
|
6954
|
+
subnet_mapping=subnet_mapping,
|
|
6955
|
+
vpc_id=vpc_id,
|
|
6956
|
+
description=description,
|
|
6957
|
+
tags=tags,
|
|
6958
|
+
)
|
|
6959
|
+
|
|
6960
|
+
jsii.create(self.__class__, self, [scope, id, props])
|
|
6961
|
+
|
|
6962
|
+
@jsii.member(jsii_name="inspect")
|
|
6963
|
+
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
6964
|
+
'''Examines the CloudFormation resource and discloses attributes.
|
|
6965
|
+
|
|
6966
|
+
:param inspector: tree inspector to collect and process attributes.
|
|
6967
|
+
'''
|
|
6968
|
+
if __debug__:
|
|
6969
|
+
type_hints = typing.get_type_hints(_typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac)
|
|
6970
|
+
check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
|
|
6971
|
+
return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
|
|
6972
|
+
|
|
6973
|
+
@jsii.member(jsii_name="renderProperties")
|
|
6974
|
+
def _render_properties(
|
|
6975
|
+
self,
|
|
6976
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
6977
|
+
) -> typing.Mapping[builtins.str, typing.Any]:
|
|
6978
|
+
'''
|
|
6979
|
+
:param props: -
|
|
6980
|
+
'''
|
|
6981
|
+
if __debug__:
|
|
6982
|
+
type_hints = typing.get_type_hints(_typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036)
|
|
6983
|
+
check_type(argname="argument props", value=props, expected_type=type_hints["props"])
|
|
6984
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
|
|
6985
|
+
|
|
6986
|
+
@jsii.python.classproperty
|
|
6987
|
+
@jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
|
|
6988
|
+
def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
|
|
6989
|
+
'''The CloudFormation resource type name for this resource class.'''
|
|
6990
|
+
return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
|
|
6991
|
+
|
|
6992
|
+
@builtins.property
|
|
6993
|
+
@jsii.member(jsii_name="attrEndpointId")
|
|
6994
|
+
def attr_endpoint_id(self) -> builtins.str:
|
|
6995
|
+
'''The unique ID of the firewall endpoint for the subnet that you attached to the firewall.For example: "vpce-111122223333".
|
|
6996
|
+
|
|
6997
|
+
:cloudformationAttribute: EndpointId
|
|
6998
|
+
'''
|
|
6999
|
+
return typing.cast(builtins.str, jsii.get(self, "attrEndpointId"))
|
|
7000
|
+
|
|
7001
|
+
@builtins.property
|
|
7002
|
+
@jsii.member(jsii_name="attrVpcEndpointAssociationArn")
|
|
7003
|
+
def attr_vpc_endpoint_association_arn(self) -> builtins.str:
|
|
7004
|
+
'''The Amazon Resource Name (ARN) of a VPC endpoint association.
|
|
7005
|
+
|
|
7006
|
+
:cloudformationAttribute: VpcEndpointAssociationArn
|
|
7007
|
+
'''
|
|
7008
|
+
return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationArn"))
|
|
7009
|
+
|
|
7010
|
+
@builtins.property
|
|
7011
|
+
@jsii.member(jsii_name="attrVpcEndpointAssociationId")
|
|
7012
|
+
def attr_vpc_endpoint_association_id(self) -> builtins.str:
|
|
7013
|
+
'''The unique identifier of the VPC endpoint association.
|
|
7014
|
+
|
|
7015
|
+
:cloudformationAttribute: VpcEndpointAssociationId
|
|
7016
|
+
'''
|
|
7017
|
+
return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationId"))
|
|
7018
|
+
|
|
7019
|
+
@builtins.property
|
|
7020
|
+
@jsii.member(jsii_name="cdkTagManager")
|
|
7021
|
+
def cdk_tag_manager(self) -> _TagManager_0a598cb3:
|
|
7022
|
+
'''Tag Manager which manages the tags for this resource.'''
|
|
7023
|
+
return typing.cast(_TagManager_0a598cb3, jsii.get(self, "cdkTagManager"))
|
|
7024
|
+
|
|
7025
|
+
@builtins.property
|
|
7026
|
+
@jsii.member(jsii_name="cfnProperties")
|
|
7027
|
+
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
7028
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
7029
|
+
|
|
7030
|
+
@builtins.property
|
|
7031
|
+
@jsii.member(jsii_name="vpcEndpointAssociationRef")
|
|
7032
|
+
def vpc_endpoint_association_ref(self) -> _VpcEndpointAssociationReference_d627bc37:
|
|
7033
|
+
'''A reference to a VpcEndpointAssociation resource.'''
|
|
7034
|
+
return typing.cast(_VpcEndpointAssociationReference_d627bc37, jsii.get(self, "vpcEndpointAssociationRef"))
|
|
7035
|
+
|
|
7036
|
+
@builtins.property
|
|
7037
|
+
@jsii.member(jsii_name="firewallArn")
|
|
7038
|
+
def firewall_arn(self) -> builtins.str:
|
|
7039
|
+
'''The Amazon Resource Name (ARN) of the firewall.'''
|
|
7040
|
+
return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
|
|
7041
|
+
|
|
7042
|
+
@firewall_arn.setter
|
|
7043
|
+
def firewall_arn(self, value: builtins.str) -> None:
|
|
7044
|
+
if __debug__:
|
|
7045
|
+
type_hints = typing.get_type_hints(_typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3)
|
|
7046
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7047
|
+
jsii.set(self, "firewallArn", value) # pyright: ignore[reportArgumentType]
|
|
7048
|
+
|
|
7049
|
+
@builtins.property
|
|
7050
|
+
@jsii.member(jsii_name="subnetMapping")
|
|
7051
|
+
def subnet_mapping(
|
|
7052
|
+
self,
|
|
7053
|
+
) -> typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"]:
|
|
7054
|
+
'''The ID for a subnet that's used in an association with a firewall.'''
|
|
7055
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"], jsii.get(self, "subnetMapping"))
|
|
7056
|
+
|
|
7057
|
+
@subnet_mapping.setter
|
|
7058
|
+
def subnet_mapping(
|
|
7059
|
+
self,
|
|
7060
|
+
value: typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"],
|
|
7061
|
+
) -> None:
|
|
7062
|
+
if __debug__:
|
|
7063
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593)
|
|
7064
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7065
|
+
jsii.set(self, "subnetMapping", value) # pyright: ignore[reportArgumentType]
|
|
7066
|
+
|
|
7067
|
+
@builtins.property
|
|
7068
|
+
@jsii.member(jsii_name="vpcId")
|
|
7069
|
+
def vpc_id(self) -> builtins.str:
|
|
7070
|
+
'''The unique identifier of the VPC for the endpoint association.'''
|
|
7071
|
+
return typing.cast(builtins.str, jsii.get(self, "vpcId"))
|
|
7072
|
+
|
|
7073
|
+
@vpc_id.setter
|
|
7074
|
+
def vpc_id(self, value: builtins.str) -> None:
|
|
7075
|
+
if __debug__:
|
|
7076
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767)
|
|
7077
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7078
|
+
jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
|
|
7079
|
+
|
|
7080
|
+
@builtins.property
|
|
7081
|
+
@jsii.member(jsii_name="description")
|
|
7082
|
+
def description(self) -> typing.Optional[builtins.str]:
|
|
7083
|
+
'''A description of the VPC endpoint association.'''
|
|
7084
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "description"))
|
|
7085
|
+
|
|
7086
|
+
@description.setter
|
|
7087
|
+
def description(self, value: typing.Optional[builtins.str]) -> None:
|
|
7088
|
+
if __debug__:
|
|
7089
|
+
type_hints = typing.get_type_hints(_typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80)
|
|
7090
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7091
|
+
jsii.set(self, "description", value) # pyright: ignore[reportArgumentType]
|
|
7092
|
+
|
|
7093
|
+
@builtins.property
|
|
7094
|
+
@jsii.member(jsii_name="tags")
|
|
7095
|
+
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
7096
|
+
'''The key:value pairs to associate with the resource.'''
|
|
7097
|
+
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
|
|
7098
|
+
|
|
7099
|
+
@tags.setter
|
|
7100
|
+
def tags(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
|
|
7101
|
+
if __debug__:
|
|
7102
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2)
|
|
7103
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7104
|
+
jsii.set(self, "tags", value) # pyright: ignore[reportArgumentType]
|
|
7105
|
+
|
|
7106
|
+
@jsii.data_type(
|
|
7107
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty",
|
|
7108
|
+
jsii_struct_bases=[],
|
|
7109
|
+
name_mapping={"subnet_id": "subnetId", "ip_address_type": "ipAddressType"},
|
|
7110
|
+
)
|
|
7111
|
+
class SubnetMappingProperty:
|
|
7112
|
+
def __init__(
|
|
7113
|
+
self,
|
|
7114
|
+
*,
|
|
7115
|
+
subnet_id: builtins.str,
|
|
7116
|
+
ip_address_type: typing.Optional[builtins.str] = None,
|
|
7117
|
+
) -> None:
|
|
7118
|
+
'''The ID for a subnet that's used in an association with a firewall.
|
|
7119
|
+
|
|
7120
|
+
This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7121
|
+
|
|
7122
|
+
:param subnet_id: The unique identifier for the subnet.
|
|
7123
|
+
:param ip_address_type: The subnet's IP address type. You can't change the IP address type after you create the subnet.
|
|
7124
|
+
|
|
7125
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html
|
|
7126
|
+
:exampleMetadata: fixture=_generated
|
|
7127
|
+
|
|
7128
|
+
Example::
|
|
7129
|
+
|
|
7130
|
+
# The code below shows an example of how to instantiate this type.
|
|
7131
|
+
# The values are placeholders you should change.
|
|
7132
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
7133
|
+
|
|
7134
|
+
subnet_mapping_property = networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
7135
|
+
subnet_id="subnetId",
|
|
7136
|
+
|
|
7137
|
+
# the properties below are optional
|
|
7138
|
+
ip_address_type="ipAddressType"
|
|
7139
|
+
)
|
|
7140
|
+
'''
|
|
7141
|
+
if __debug__:
|
|
7142
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015)
|
|
7143
|
+
check_type(argname="argument subnet_id", value=subnet_id, expected_type=type_hints["subnet_id"])
|
|
7144
|
+
check_type(argname="argument ip_address_type", value=ip_address_type, expected_type=type_hints["ip_address_type"])
|
|
7145
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
7146
|
+
"subnet_id": subnet_id,
|
|
7147
|
+
}
|
|
7148
|
+
if ip_address_type is not None:
|
|
7149
|
+
self._values["ip_address_type"] = ip_address_type
|
|
7150
|
+
|
|
7151
|
+
@builtins.property
|
|
7152
|
+
def subnet_id(self) -> builtins.str:
|
|
7153
|
+
'''The unique identifier for the subnet.
|
|
7154
|
+
|
|
7155
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-subnetid
|
|
7156
|
+
'''
|
|
7157
|
+
result = self._values.get("subnet_id")
|
|
7158
|
+
assert result is not None, "Required property 'subnet_id' is missing"
|
|
7159
|
+
return typing.cast(builtins.str, result)
|
|
7160
|
+
|
|
7161
|
+
@builtins.property
|
|
7162
|
+
def ip_address_type(self) -> typing.Optional[builtins.str]:
|
|
7163
|
+
'''The subnet's IP address type.
|
|
7164
|
+
|
|
7165
|
+
You can't change the IP address type after you create the subnet.
|
|
7166
|
+
|
|
7167
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-ipaddresstype
|
|
7168
|
+
'''
|
|
7169
|
+
result = self._values.get("ip_address_type")
|
|
7170
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
7171
|
+
|
|
7172
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
7173
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
7174
|
+
|
|
7175
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
7176
|
+
return not (rhs == self)
|
|
7177
|
+
|
|
7178
|
+
def __repr__(self) -> str:
|
|
7179
|
+
return "SubnetMappingProperty(%s)" % ", ".join(
|
|
7180
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
7181
|
+
)
|
|
7182
|
+
|
|
7183
|
+
|
|
7184
|
+
@jsii.data_type(
|
|
7185
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociationProps",
|
|
7186
|
+
jsii_struct_bases=[],
|
|
7187
|
+
name_mapping={
|
|
7188
|
+
"firewall_arn": "firewallArn",
|
|
7189
|
+
"subnet_mapping": "subnetMapping",
|
|
7190
|
+
"vpc_id": "vpcId",
|
|
7191
|
+
"description": "description",
|
|
7192
|
+
"tags": "tags",
|
|
7193
|
+
},
|
|
7194
|
+
)
|
|
7195
|
+
class CfnVpcEndpointAssociationProps:
|
|
7196
|
+
def __init__(
|
|
7197
|
+
self,
|
|
7198
|
+
*,
|
|
7199
|
+
firewall_arn: builtins.str,
|
|
7200
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7201
|
+
vpc_id: builtins.str,
|
|
7202
|
+
description: typing.Optional[builtins.str] = None,
|
|
7203
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7204
|
+
) -> None:
|
|
7205
|
+
'''Properties for defining a ``CfnVpcEndpointAssociation``.
|
|
7206
|
+
|
|
7207
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
|
|
7208
|
+
:param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7209
|
+
:param vpc_id: The unique identifier of the VPC for the endpoint association.
|
|
7210
|
+
:param description: A description of the VPC endpoint association.
|
|
7211
|
+
:param tags: The key:value pairs to associate with the resource.
|
|
7212
|
+
|
|
7213
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
|
|
7214
|
+
:exampleMetadata: fixture=_generated
|
|
7215
|
+
|
|
7216
|
+
Example::
|
|
7217
|
+
|
|
7218
|
+
# The code below shows an example of how to instantiate this type.
|
|
7219
|
+
# The values are placeholders you should change.
|
|
7220
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
7221
|
+
|
|
7222
|
+
cfn_vpc_endpoint_association_props = networkfirewall.CfnVpcEndpointAssociationProps(
|
|
7223
|
+
firewall_arn="firewallArn",
|
|
7224
|
+
subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
7225
|
+
subnet_id="subnetId",
|
|
7226
|
+
|
|
7227
|
+
# the properties below are optional
|
|
7228
|
+
ip_address_type="ipAddressType"
|
|
7229
|
+
),
|
|
7230
|
+
vpc_id="vpcId",
|
|
7231
|
+
|
|
7232
|
+
# the properties below are optional
|
|
7233
|
+
description="description",
|
|
7234
|
+
tags=[CfnTag(
|
|
7235
|
+
key="key",
|
|
7236
|
+
value="value"
|
|
7237
|
+
)]
|
|
7238
|
+
)
|
|
7239
|
+
'''
|
|
7240
|
+
if __debug__:
|
|
7241
|
+
type_hints = typing.get_type_hints(_typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76)
|
|
7242
|
+
check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
|
|
7243
|
+
check_type(argname="argument subnet_mapping", value=subnet_mapping, expected_type=type_hints["subnet_mapping"])
|
|
7244
|
+
check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
|
|
7245
|
+
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
7246
|
+
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
7247
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
7248
|
+
"firewall_arn": firewall_arn,
|
|
7249
|
+
"subnet_mapping": subnet_mapping,
|
|
7250
|
+
"vpc_id": vpc_id,
|
|
7251
|
+
}
|
|
7252
|
+
if description is not None:
|
|
7253
|
+
self._values["description"] = description
|
|
7254
|
+
if tags is not None:
|
|
7255
|
+
self._values["tags"] = tags
|
|
7256
|
+
|
|
7257
|
+
@builtins.property
|
|
7258
|
+
def firewall_arn(self) -> builtins.str:
|
|
7259
|
+
'''The Amazon Resource Name (ARN) of the firewall.
|
|
7260
|
+
|
|
7261
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-firewallarn
|
|
7262
|
+
'''
|
|
7263
|
+
result = self._values.get("firewall_arn")
|
|
7264
|
+
assert result is not None, "Required property 'firewall_arn' is missing"
|
|
7265
|
+
return typing.cast(builtins.str, result)
|
|
7266
|
+
|
|
7267
|
+
@builtins.property
|
|
7268
|
+
def subnet_mapping(
|
|
7269
|
+
self,
|
|
7270
|
+
) -> typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty]:
|
|
7271
|
+
'''The ID for a subnet that's used in an association with a firewall.
|
|
7272
|
+
|
|
7273
|
+
This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7274
|
+
|
|
7275
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping
|
|
7276
|
+
'''
|
|
7277
|
+
result = self._values.get("subnet_mapping")
|
|
7278
|
+
assert result is not None, "Required property 'subnet_mapping' is missing"
|
|
7279
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty], result)
|
|
7280
|
+
|
|
7281
|
+
@builtins.property
|
|
7282
|
+
def vpc_id(self) -> builtins.str:
|
|
7283
|
+
'''The unique identifier of the VPC for the endpoint association.
|
|
7284
|
+
|
|
7285
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-vpcid
|
|
7286
|
+
'''
|
|
7287
|
+
result = self._values.get("vpc_id")
|
|
7288
|
+
assert result is not None, "Required property 'vpc_id' is missing"
|
|
7289
|
+
return typing.cast(builtins.str, result)
|
|
7290
|
+
|
|
7291
|
+
@builtins.property
|
|
7292
|
+
def description(self) -> typing.Optional[builtins.str]:
|
|
7293
|
+
'''A description of the VPC endpoint association.
|
|
7294
|
+
|
|
7295
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-description
|
|
7296
|
+
'''
|
|
7297
|
+
result = self._values.get("description")
|
|
7298
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
7299
|
+
|
|
7300
|
+
@builtins.property
|
|
7301
|
+
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
7302
|
+
'''The key:value pairs to associate with the resource.
|
|
7303
|
+
|
|
7304
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-tags
|
|
7305
|
+
'''
|
|
7306
|
+
result = self._values.get("tags")
|
|
7307
|
+
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
|
|
7308
|
+
|
|
7309
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
7310
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
7311
|
+
|
|
7312
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
7313
|
+
return not (rhs == self)
|
|
7314
|
+
|
|
7315
|
+
def __repr__(self) -> str:
|
|
7316
|
+
return "CfnVpcEndpointAssociationProps(%s)" % ", ".join(
|
|
7317
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
7318
|
+
)
|
|
7319
|
+
|
|
7320
|
+
|
|
6433
7321
|
__all__ = [
|
|
6434
7322
|
"CfnFirewall",
|
|
6435
7323
|
"CfnFirewallPolicy",
|
|
@@ -6441,6 +7329,8 @@ __all__ = [
|
|
|
6441
7329
|
"CfnRuleGroupProps",
|
|
6442
7330
|
"CfnTLSInspectionConfiguration",
|
|
6443
7331
|
"CfnTLSInspectionConfigurationProps",
|
|
7332
|
+
"CfnVpcEndpointAssociation",
|
|
7333
|
+
"CfnVpcEndpointAssociationProps",
|
|
6444
7334
|
]
|
|
6445
7335
|
|
|
6446
7336
|
publication.publish()
|
|
@@ -6451,14 +7341,17 @@ def _typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b
|
|
|
6451
7341
|
*,
|
|
6452
7342
|
firewall_name: builtins.str,
|
|
6453
7343
|
firewall_policy_arn: builtins.str,
|
|
6454
|
-
|
|
6455
|
-
|
|
7344
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7345
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6456
7346
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6457
7347
|
description: typing.Optional[builtins.str] = None,
|
|
6458
7348
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6459
7349
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6460
7350
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7351
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6461
7352
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7353
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
7354
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
6462
7355
|
) -> None:
|
|
6463
7356
|
"""Type checking stubs"""
|
|
6464
7357
|
pass
|
|
@@ -6487,14 +7380,14 @@ def _typecheckingstub__c711ef7af7567ab69b12f083b26c4033f7cdf1593bf27227f989d7c73
|
|
|
6487
7380
|
"""Type checking stubs"""
|
|
6488
7381
|
pass
|
|
6489
7382
|
|
|
6490
|
-
def
|
|
6491
|
-
value: typing.
|
|
7383
|
+
def _typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1(
|
|
7384
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
6492
7385
|
) -> None:
|
|
6493
7386
|
"""Type checking stubs"""
|
|
6494
7387
|
pass
|
|
6495
7388
|
|
|
6496
|
-
def
|
|
6497
|
-
value:
|
|
7389
|
+
def _typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77(
|
|
7390
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]],
|
|
6498
7391
|
) -> None:
|
|
6499
7392
|
"""Type checking stubs"""
|
|
6500
7393
|
pass
|
|
@@ -6529,12 +7422,37 @@ def _typecheckingstub__3edeae6cf81be7cb1d87c21080d7c060fb1fdbd872b4292af576701d5
|
|
|
6529
7422
|
"""Type checking stubs"""
|
|
6530
7423
|
pass
|
|
6531
7424
|
|
|
7425
|
+
def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
|
|
7426
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]],
|
|
7427
|
+
) -> None:
|
|
7428
|
+
"""Type checking stubs"""
|
|
7429
|
+
pass
|
|
7430
|
+
|
|
6532
7431
|
def _typecheckingstub__e1b2b141c4b9a04d63365f9d8a2a5636d417c4a087ebfbfd40be7336d4d258da(
|
|
6533
7432
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
6534
7433
|
) -> None:
|
|
6535
7434
|
"""Type checking stubs"""
|
|
6536
7435
|
pass
|
|
6537
7436
|
|
|
7437
|
+
def _typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6(
|
|
7438
|
+
value: typing.Optional[builtins.str],
|
|
7439
|
+
) -> None:
|
|
7440
|
+
"""Type checking stubs"""
|
|
7441
|
+
pass
|
|
7442
|
+
|
|
7443
|
+
def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
|
|
7444
|
+
value: typing.Optional[builtins.str],
|
|
7445
|
+
) -> None:
|
|
7446
|
+
"""Type checking stubs"""
|
|
7447
|
+
pass
|
|
7448
|
+
|
|
7449
|
+
def _typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf(
|
|
7450
|
+
*,
|
|
7451
|
+
availability_zone: builtins.str,
|
|
7452
|
+
) -> None:
|
|
7453
|
+
"""Type checking stubs"""
|
|
7454
|
+
pass
|
|
7455
|
+
|
|
6538
7456
|
def _typecheckingstub__cf86d50b8eec902ee512afbe0dfd3b1ee2bc8f0b9f4fb9acb4ac637ae3662fc0(
|
|
6539
7457
|
*,
|
|
6540
7458
|
subnet_id: builtins.str,
|
|
@@ -6617,6 +7535,7 @@ def _typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2d
|
|
|
6617
7535
|
*,
|
|
6618
7536
|
stateless_default_actions: typing.Sequence[builtins.str],
|
|
6619
7537
|
stateless_fragment_default_actions: typing.Sequence[builtins.str],
|
|
7538
|
+
enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6620
7539
|
policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.PolicyVariablesProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6621
7540
|
stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6622
7541
|
stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulEngineOptionsProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -6675,6 +7594,7 @@ def _typecheckingstub__62be7baa7c0ae22655f34e1d3316236c114457fe368caf2a958ba1fd9
|
|
|
6675
7594
|
def _typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8(
|
|
6676
7595
|
*,
|
|
6677
7596
|
resource_arn: builtins.str,
|
|
7597
|
+
deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6678
7598
|
override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulRuleGroupOverrideProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6679
7599
|
priority: typing.Optional[jsii.Number] = None,
|
|
6680
7600
|
) -> None:
|
|
@@ -6703,14 +7623,17 @@ def _typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57b
|
|
|
6703
7623
|
*,
|
|
6704
7624
|
firewall_name: builtins.str,
|
|
6705
7625
|
firewall_policy_arn: builtins.str,
|
|
6706
|
-
|
|
6707
|
-
|
|
7626
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7627
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6708
7628
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6709
7629
|
description: typing.Optional[builtins.str] = None,
|
|
6710
7630
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6711
7631
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6712
7632
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7633
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6713
7634
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7635
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
7636
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
6714
7637
|
) -> None:
|
|
6715
7638
|
"""Type checking stubs"""
|
|
6716
7639
|
pass
|
|
@@ -6721,6 +7644,7 @@ def _typecheckingstub__71487a7865ce1877156cecd1cb83afa7ffd5f6428fa2611a7537c9ccf
|
|
|
6721
7644
|
*,
|
|
6722
7645
|
firewall_arn: builtins.str,
|
|
6723
7646
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7647
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6724
7648
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
6725
7649
|
) -> None:
|
|
6726
7650
|
"""Type checking stubs"""
|
|
@@ -6750,6 +7674,12 @@ def _typecheckingstub__6379a583f20adcddf04ea938455ca9e96ed6e0a2293ffa4b839685154
|
|
|
6750
7674
|
"""Type checking stubs"""
|
|
6751
7675
|
pass
|
|
6752
7676
|
|
|
7677
|
+
def _typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe(
|
|
7678
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7679
|
+
) -> None:
|
|
7680
|
+
"""Type checking stubs"""
|
|
7681
|
+
pass
|
|
7682
|
+
|
|
6753
7683
|
def _typecheckingstub__1e3640e7313e33945bc2b7c00caa777b47e14239e160ded6a349405aeb0b47da(
|
|
6754
7684
|
value: typing.Optional[builtins.str],
|
|
6755
7685
|
) -> None:
|
|
@@ -6776,6 +7706,7 @@ def _typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d6217
|
|
|
6776
7706
|
*,
|
|
6777
7707
|
firewall_arn: builtins.str,
|
|
6778
7708
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7709
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6779
7710
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
6780
7711
|
) -> None:
|
|
6781
7712
|
"""Type checking stubs"""
|
|
@@ -6790,6 +7721,7 @@ def _typecheckingstub__2f1d19cebb2e7dfe2bb3a674253e22bfdb540bd48dc9cd243370420d8
|
|
|
6790
7721
|
type: builtins.str,
|
|
6791
7722
|
description: typing.Optional[builtins.str] = None,
|
|
6792
7723
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7724
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6793
7725
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6794
7726
|
) -> None:
|
|
6795
7727
|
"""Type checking stubs"""
|
|
@@ -6837,6 +7769,12 @@ def _typecheckingstub__6ed6ac96ae6360b92bfdf6614d9832ba1cad5080dce3a3257a75537c9
|
|
|
6837
7769
|
"""Type checking stubs"""
|
|
6838
7770
|
pass
|
|
6839
7771
|
|
|
7772
|
+
def _typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0(
|
|
7773
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]],
|
|
7774
|
+
) -> None:
|
|
7775
|
+
"""Type checking stubs"""
|
|
7776
|
+
pass
|
|
7777
|
+
|
|
6840
7778
|
def _typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5(
|
|
6841
7779
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
6842
7780
|
) -> None:
|
|
@@ -7024,6 +7962,13 @@ def _typecheckingstub__71d7a12c23bdb40d0d25319bf80720d55c4205129c386e8de5676df43
|
|
|
7024
7962
|
"""Type checking stubs"""
|
|
7025
7963
|
pass
|
|
7026
7964
|
|
|
7965
|
+
def _typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307(
|
|
7966
|
+
*,
|
|
7967
|
+
rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
7968
|
+
) -> None:
|
|
7969
|
+
"""Type checking stubs"""
|
|
7970
|
+
pass
|
|
7971
|
+
|
|
7027
7972
|
def _typecheckingstub__775fa1817d39168a6b1883b9e449352da902edc72fb398c55cda18aa8ead3039(
|
|
7028
7973
|
*,
|
|
7029
7974
|
flags: typing.Sequence[builtins.str],
|
|
@@ -7039,6 +7984,7 @@ def _typecheckingstub__775b93be404fbe10bf6b023b8192636307852f30e49da9892d7e20aa4
|
|
|
7039
7984
|
type: builtins.str,
|
|
7040
7985
|
description: typing.Optional[builtins.str] = None,
|
|
7041
7986
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7987
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7042
7988
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7043
7989
|
) -> None:
|
|
7044
7990
|
"""Type checking stubs"""
|
|
@@ -7159,3 +8105,77 @@ def _typecheckingstub__f05137012f831af07bffb09e4ece1302036a8c7c23718d26dcb08f4bf
|
|
|
7159
8105
|
) -> None:
|
|
7160
8106
|
"""Type checking stubs"""
|
|
7161
8107
|
pass
|
|
8108
|
+
|
|
8109
|
+
def _typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3(
|
|
8110
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
8111
|
+
id: builtins.str,
|
|
8112
|
+
*,
|
|
8113
|
+
firewall_arn: builtins.str,
|
|
8114
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
8115
|
+
vpc_id: builtins.str,
|
|
8116
|
+
description: typing.Optional[builtins.str] = None,
|
|
8117
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
8118
|
+
) -> None:
|
|
8119
|
+
"""Type checking stubs"""
|
|
8120
|
+
pass
|
|
8121
|
+
|
|
8122
|
+
def _typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac(
|
|
8123
|
+
inspector: _TreeInspector_488e0dd5,
|
|
8124
|
+
) -> None:
|
|
8125
|
+
"""Type checking stubs"""
|
|
8126
|
+
pass
|
|
8127
|
+
|
|
8128
|
+
def _typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036(
|
|
8129
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
8130
|
+
) -> None:
|
|
8131
|
+
"""Type checking stubs"""
|
|
8132
|
+
pass
|
|
8133
|
+
|
|
8134
|
+
def _typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3(
|
|
8135
|
+
value: builtins.str,
|
|
8136
|
+
) -> None:
|
|
8137
|
+
"""Type checking stubs"""
|
|
8138
|
+
pass
|
|
8139
|
+
|
|
8140
|
+
def _typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593(
|
|
8141
|
+
value: typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty],
|
|
8142
|
+
) -> None:
|
|
8143
|
+
"""Type checking stubs"""
|
|
8144
|
+
pass
|
|
8145
|
+
|
|
8146
|
+
def _typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767(
|
|
8147
|
+
value: builtins.str,
|
|
8148
|
+
) -> None:
|
|
8149
|
+
"""Type checking stubs"""
|
|
8150
|
+
pass
|
|
8151
|
+
|
|
8152
|
+
def _typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80(
|
|
8153
|
+
value: typing.Optional[builtins.str],
|
|
8154
|
+
) -> None:
|
|
8155
|
+
"""Type checking stubs"""
|
|
8156
|
+
pass
|
|
8157
|
+
|
|
8158
|
+
def _typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2(
|
|
8159
|
+
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
8160
|
+
) -> None:
|
|
8161
|
+
"""Type checking stubs"""
|
|
8162
|
+
pass
|
|
8163
|
+
|
|
8164
|
+
def _typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015(
|
|
8165
|
+
*,
|
|
8166
|
+
subnet_id: builtins.str,
|
|
8167
|
+
ip_address_type: typing.Optional[builtins.str] = None,
|
|
8168
|
+
) -> None:
|
|
8169
|
+
"""Type checking stubs"""
|
|
8170
|
+
pass
|
|
8171
|
+
|
|
8172
|
+
def _typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76(
|
|
8173
|
+
*,
|
|
8174
|
+
firewall_arn: builtins.str,
|
|
8175
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
8176
|
+
vpc_id: builtins.str,
|
|
8177
|
+
description: typing.Optional[builtins.str] = None,
|
|
8178
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
8179
|
+
) -> None:
|
|
8180
|
+
"""Type checking stubs"""
|
|
8181
|
+
pass
|