aws-cdk-lib 2.195.0__py3-none-any.whl → 2.224.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (572) hide show
  1. aws_cdk/__init__.py +1806 -417
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.195.0.jsii.tgz → aws-cdk-lib@2.224.0.jsii.tgz} +0 -0
  4. aws_cdk/alexa_ask/__init__.py +12 -2
  5. aws_cdk/aws_accessanalyzer/__init__.py +323 -6
  6. aws_cdk/aws_acmpca/__init__.py +53 -10
  7. aws_cdk/aws_aiops/__init__.py +1019 -0
  8. aws_cdk/aws_amazonmq/__init__.py +357 -313
  9. aws_cdk/aws_amplify/__init__.py +173 -17
  10. aws_cdk/aws_amplifyuibuilder/__init__.py +35 -6
  11. aws_cdk/aws_apigateway/__init__.py +1245 -215
  12. aws_cdk/aws_apigatewayv2/__init__.py +3890 -476
  13. aws_cdk/aws_apigatewayv2_integrations/__init__.py +94 -16
  14. aws_cdk/aws_appconfig/__init__.py +618 -91
  15. aws_cdk/aws_appflow/__init__.py +151 -6
  16. aws_cdk/aws_appintegrations/__init__.py +546 -6
  17. aws_cdk/aws_applicationautoscaling/__init__.py +75 -10
  18. aws_cdk/aws_applicationinsights/__init__.py +13 -2
  19. aws_cdk/aws_applicationsignals/__init__.py +374 -6
  20. aws_cdk/aws_appmesh/__init__.py +136 -26
  21. aws_cdk/aws_apprunner/__init__.py +66 -18
  22. aws_cdk/aws_appstream/__init__.py +309 -55
  23. aws_cdk/aws_appsync/__init__.py +350 -94
  24. aws_cdk/aws_apptest/__init__.py +71 -2
  25. aws_cdk/aws_aps/__init__.py +2188 -94
  26. aws_cdk/aws_arcregionswitch/__init__.py +5095 -0
  27. aws_cdk/aws_arczonalshift/__init__.py +39 -12
  28. aws_cdk/aws_athena/__init__.py +365 -29
  29. aws_cdk/aws_auditmanager/__init__.py +71 -2
  30. aws_cdk/aws_autoscaling/__init__.py +165 -60
  31. aws_cdk/aws_autoscaling_common/__init__.py +3 -0
  32. aws_cdk/aws_autoscalingplans/__init__.py +13 -2
  33. aws_cdk/aws_b2bi/__init__.py +1819 -99
  34. aws_cdk/aws_backup/__init__.py +370 -42
  35. aws_cdk/aws_backupgateway/__init__.py +13 -2
  36. aws_cdk/aws_batch/__init__.py +1462 -163
  37. aws_cdk/aws_bcmdataexports/__init__.py +21 -2
  38. aws_cdk/aws_bedrock/__init__.py +7867 -727
  39. aws_cdk/aws_bedrockagentcore/__init__.py +10425 -0
  40. aws_cdk/aws_billingconductor/__init__.py +197 -11
  41. aws_cdk/aws_budgets/__init__.py +611 -4
  42. aws_cdk/aws_cassandra/__init__.py +247 -6
  43. aws_cdk/aws_ce/__init__.py +35 -6
  44. aws_cdk/aws_certificatemanager/__init__.py +258 -32
  45. aws_cdk/aws_chatbot/__init__.py +76 -6
  46. aws_cdk/aws_cleanrooms/__init__.py +709 -206
  47. aws_cdk/aws_cleanroomsml/__init__.py +13 -2
  48. aws_cdk/aws_cloud9/__init__.py +13 -2
  49. aws_cdk/aws_cloudformation/__init__.py +362 -189
  50. aws_cdk/aws_cloudfront/__init__.py +2188 -674
  51. aws_cdk/aws_cloudfront/experimental/__init__.py +114 -16
  52. aws_cdk/aws_cloudfront_origins/__init__.py +615 -74
  53. aws_cdk/aws_cloudtrail/__init__.py +311 -21
  54. aws_cdk/aws_cloudwatch/__init__.py +3093 -1038
  55. aws_cdk/aws_cloudwatch_actions/__init__.py +75 -1
  56. aws_cdk/aws_codeartifact/__init__.py +35 -6
  57. aws_cdk/aws_codebuild/__init__.py +1303 -135
  58. aws_cdk/aws_codecommit/__init__.py +29 -9
  59. aws_cdk/aws_codeconnections/__init__.py +13 -2
  60. aws_cdk/aws_codedeploy/__init__.py +130 -6
  61. aws_cdk/aws_codeguruprofiler/__init__.py +80 -2
  62. aws_cdk/aws_codegurureviewer/__init__.py +13 -2
  63. aws_cdk/aws_codepipeline/__init__.py +177 -71
  64. aws_cdk/aws_codepipeline_actions/__init__.py +753 -4
  65. aws_cdk/aws_codestar/__init__.py +13 -2
  66. aws_cdk/aws_codestarconnections/__init__.py +35 -6
  67. aws_cdk/aws_codestarnotifications/__init__.py +22 -2
  68. aws_cdk/aws_cognito/__init__.py +905 -92
  69. aws_cdk/aws_cognito_identitypool/__init__.py +23 -12
  70. aws_cdk/aws_comprehend/__init__.py +24 -4
  71. aws_cdk/aws_config/__init__.py +227 -30
  72. aws_cdk/aws_connect/__init__.py +2736 -191
  73. aws_cdk/aws_connectcampaigns/__init__.py +13 -2
  74. aws_cdk/aws_connectcampaignsv2/__init__.py +268 -6
  75. aws_cdk/aws_controltower/__init__.py +35 -6
  76. aws_cdk/aws_cur/__init__.py +100 -4
  77. aws_cdk/aws_customerprofiles/__init__.py +617 -27
  78. aws_cdk/aws_databrew/__init__.py +68 -12
  79. aws_cdk/aws_datapipeline/__init__.py +42 -2
  80. aws_cdk/aws_datasync/__init__.py +1514 -977
  81. aws_cdk/aws_datazone/__init__.py +7426 -1763
  82. aws_cdk/aws_dax/__init__.py +83 -6
  83. aws_cdk/aws_deadline/__init__.py +511 -36
  84. aws_cdk/aws_detective/__init__.py +35 -6
  85. aws_cdk/aws_devicefarm/__init__.py +68 -12
  86. aws_cdk/aws_devopsguru/__init__.py +37 -6
  87. aws_cdk/aws_directoryservice/__init__.py +53 -4
  88. aws_cdk/aws_dlm/__init__.py +13 -2
  89. aws_cdk/aws_dms/__init__.py +184 -27
  90. aws_cdk/aws_docdb/__init__.py +350 -49
  91. aws_cdk/aws_docdbelastic/__init__.py +13 -2
  92. aws_cdk/aws_dsql/__init__.py +386 -16
  93. aws_cdk/aws_dynamodb/__init__.py +1479 -170
  94. aws_cdk/aws_ec2/__init__.py +10465 -1335
  95. aws_cdk/aws_ecr/__init__.py +637 -43
  96. aws_cdk/aws_ecr_assets/__init__.py +10 -0
  97. aws_cdk/aws_ecs/__init__.py +6629 -490
  98. aws_cdk/aws_ecs_patterns/__init__.py +124 -12
  99. aws_cdk/aws_efs/__init__.py +276 -24
  100. aws_cdk/aws_eks/__init__.py +1132 -227
  101. aws_cdk/aws_elasticache/__init__.py +378 -25
  102. aws_cdk/aws_elasticbeanstalk/__init__.py +75 -8
  103. aws_cdk/aws_elasticloadbalancing/__init__.py +22 -2
  104. aws_cdk/aws_elasticloadbalancingv2/__init__.py +1796 -123
  105. aws_cdk/aws_elasticsearch/__init__.py +291 -9
  106. aws_cdk/aws_emr/__init__.py +219 -18
  107. aws_cdk/aws_emrcontainers/__init__.py +71 -2
  108. aws_cdk/aws_emrserverless/__init__.py +188 -3
  109. aws_cdk/aws_entityresolution/__init__.py +585 -58
  110. aws_cdk/aws_events/__init__.py +1007 -126
  111. aws_cdk/aws_events_targets/__init__.py +398 -65
  112. aws_cdk/aws_eventschemas/__init__.py +46 -8
  113. aws_cdk/aws_evidently/__init__.py +57 -10
  114. aws_cdk/aws_evs/__init__.py +2244 -0
  115. aws_cdk/aws_finspace/__init__.py +71 -2
  116. aws_cdk/aws_fis/__init__.py +26 -4
  117. aws_cdk/aws_fms/__init__.py +35 -6
  118. aws_cdk/aws_forecast/__init__.py +24 -4
  119. aws_cdk/aws_frauddetector/__init__.py +79 -14
  120. aws_cdk/aws_fsx/__init__.py +1349 -127
  121. aws_cdk/aws_gamelift/__init__.py +755 -94
  122. aws_cdk/aws_gameliftstreams/__init__.py +44 -22
  123. aws_cdk/aws_globalaccelerator/__init__.py +73 -14
  124. aws_cdk/aws_glue/__init__.py +1455 -378
  125. aws_cdk/aws_grafana/__init__.py +13 -2
  126. aws_cdk/aws_greengrass/__init__.py +654 -32
  127. aws_cdk/aws_greengrassv2/__init__.py +53 -4
  128. aws_cdk/aws_groundstation/__init__.py +122 -6
  129. aws_cdk/aws_guardduty/__init__.py +1613 -123
  130. aws_cdk/aws_healthimaging/__init__.py +71 -2
  131. aws_cdk/aws_healthlake/__init__.py +42 -2
  132. aws_cdk/aws_iam/__init__.py +921 -141
  133. aws_cdk/aws_identitystore/__init__.py +24 -4
  134. aws_cdk/aws_imagebuilder/__init__.py +1454 -199
  135. aws_cdk/aws_inspector/__init__.py +44 -6
  136. aws_cdk/aws_inspectorv2/__init__.py +2285 -243
  137. aws_cdk/aws_internetmonitor/__init__.py +71 -2
  138. aws_cdk/aws_invoicing/__init__.py +13 -2
  139. aws_cdk/aws_iot/__init__.py +1760 -64
  140. aws_cdk/aws_iotanalytics/__init__.py +162 -8
  141. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +106 -40
  142. aws_cdk/aws_iotevents/__init__.py +122 -6
  143. aws_cdk/aws_iotfleethub/__init__.py +71 -2
  144. aws_cdk/aws_iotfleetwise/__init__.py +195 -14
  145. aws_cdk/aws_iotsitewise/__init__.py +1837 -89
  146. aws_cdk/aws_iotthingsgraph/__init__.py +13 -2
  147. aws_cdk/aws_iottwinmaker/__init__.py +115 -10
  148. aws_cdk/aws_iotwireless/__init__.py +649 -22
  149. aws_cdk/aws_ivs/__init__.py +561 -57
  150. aws_cdk/aws_ivschat/__init__.py +24 -4
  151. aws_cdk/aws_kafkaconnect/__init__.py +35 -6
  152. aws_cdk/aws_kendra/__init__.py +120 -28
  153. aws_cdk/aws_kendraranking/__init__.py +13 -2
  154. aws_cdk/aws_kinesis/__init__.py +641 -23
  155. aws_cdk/aws_kinesisanalytics/__init__.py +467 -96
  156. aws_cdk/aws_kinesisanalyticsv2/__init__.py +207 -19
  157. aws_cdk/aws_kinesisfirehose/__init__.py +3087 -295
  158. aws_cdk/aws_kinesisvideo/__init__.py +24 -4
  159. aws_cdk/aws_kms/__init__.py +204 -45
  160. aws_cdk/aws_lakeformation/__init__.py +80 -15
  161. aws_cdk/aws_lambda/__init__.py +2236 -297
  162. aws_cdk/aws_lambda_event_sources/__init__.py +638 -1
  163. aws_cdk/aws_lambda_nodejs/__init__.py +63 -24
  164. aws_cdk/aws_launchwizard/__init__.py +13 -2
  165. aws_cdk/aws_lex/__init__.py +2162 -212
  166. aws_cdk/aws_licensemanager/__init__.py +24 -4
  167. aws_cdk/aws_lightsail/__init__.py +2958 -1322
  168. aws_cdk/aws_location/__init__.py +618 -14
  169. aws_cdk/aws_logs/__init__.py +6014 -923
  170. aws_cdk/aws_lookoutequipment/__init__.py +13 -2
  171. aws_cdk/aws_lookoutmetrics/__init__.py +38 -6
  172. aws_cdk/aws_lookoutvision/__init__.py +71 -2
  173. aws_cdk/aws_m2/__init__.py +94 -19
  174. aws_cdk/aws_macie/__init__.py +49 -11
  175. aws_cdk/aws_managedblockchain/__init__.py +180 -6
  176. aws_cdk/aws_mediaconnect/__init__.py +101 -18
  177. aws_cdk/aws_mediaconvert/__init__.py +35 -6
  178. aws_cdk/aws_medialive/__init__.py +1938 -532
  179. aws_cdk/aws_mediapackage/__init__.py +59 -12
  180. aws_cdk/aws_mediapackagev2/__init__.py +1616 -233
  181. aws_cdk/aws_mediastore/__init__.py +13 -2
  182. aws_cdk/aws_mediatailor/__init__.py +583 -12
  183. aws_cdk/aws_memorydb/__init__.py +271 -12
  184. aws_cdk/aws_mpa/__init__.py +1495 -0
  185. aws_cdk/aws_msk/__init__.py +108 -22
  186. aws_cdk/aws_mwaa/__init__.py +121 -9
  187. aws_cdk/aws_neptune/__init__.py +290 -78
  188. aws_cdk/aws_neptunegraph/__init__.py +24 -4
  189. aws_cdk/aws_networkfirewall/__init__.py +1184 -164
  190. aws_cdk/aws_networkmanager/__init__.py +349 -33
  191. aws_cdk/aws_nimblestudio/__init__.py +283 -408
  192. aws_cdk/aws_notifications/__init__.py +317 -12
  193. aws_cdk/aws_notificationscontacts/__init__.py +13 -2
  194. aws_cdk/aws_oam/__init__.py +24 -4
  195. aws_cdk/aws_observabilityadmin/__init__.py +2561 -0
  196. aws_cdk/aws_odb/__init__.py +5872 -0
  197. aws_cdk/aws_omics/__init__.py +2967 -162
  198. aws_cdk/aws_opensearchserverless/__init__.py +312 -37
  199. aws_cdk/aws_opensearchservice/__init__.py +501 -19
  200. aws_cdk/aws_opsworks/__init__.py +235 -139
  201. aws_cdk/aws_opsworkscm/__init__.py +16 -52
  202. aws_cdk/aws_organizations/__init__.py +70 -10
  203. aws_cdk/aws_osis/__init__.py +167 -2
  204. aws_cdk/aws_panorama/__init__.py +181 -9
  205. aws_cdk/aws_paymentcryptography/__init__.py +24 -4
  206. aws_cdk/aws_pcaconnectorad/__init__.py +59 -10
  207. aws_cdk/aws_pcaconnectorscep/__init__.py +24 -4
  208. aws_cdk/aws_pcs/__init__.py +516 -64
  209. aws_cdk/aws_personalize/__init__.py +46 -8
  210. aws_cdk/aws_pinpoint/__init__.py +329 -38
  211. aws_cdk/aws_pinpointemail/__init__.py +48 -8
  212. aws_cdk/aws_pipes/__init__.py +12 -2
  213. aws_cdk/aws_proton/__init__.py +37 -6
  214. aws_cdk/aws_qbusiness/__init__.py +635 -34
  215. aws_cdk/aws_qldb/__init__.py +24 -4
  216. aws_cdk/aws_quicksight/__init__.py +7900 -1160
  217. aws_cdk/aws_ram/__init__.py +24 -4
  218. aws_cdk/aws_rbin/__init__.py +12 -2
  219. aws_cdk/aws_rds/__init__.py +3721 -573
  220. aws_cdk/aws_redshift/__init__.py +143 -20
  221. aws_cdk/aws_redshiftserverless/__init__.py +699 -11
  222. aws_cdk/aws_refactorspaces/__init__.py +64 -14
  223. aws_cdk/aws_rekognition/__init__.py +93 -6
  224. aws_cdk/aws_resiliencehub/__init__.py +24 -4
  225. aws_cdk/aws_resourceexplorer2/__init__.py +35 -6
  226. aws_cdk/aws_resourcegroups/__init__.py +82 -4
  227. aws_cdk/aws_robomaker/__init__.py +72 -12
  228. aws_cdk/aws_rolesanywhere/__init__.py +194 -19
  229. aws_cdk/aws_route53/__init__.py +3965 -1436
  230. aws_cdk/aws_route53_targets/__init__.py +3 -0
  231. aws_cdk/aws_route53profiles/__init__.py +37 -6
  232. aws_cdk/aws_route53recoverycontrol/__init__.py +46 -8
  233. aws_cdk/aws_route53recoveryreadiness/__init__.py +104 -8
  234. aws_cdk/aws_route53resolver/__init__.py +189 -40
  235. aws_cdk/aws_rtbfabric/__init__.py +3498 -0
  236. aws_cdk/aws_rum/__init__.py +13 -2
  237. aws_cdk/aws_s3/__init__.py +1742 -221
  238. aws_cdk/aws_s3_assets/__init__.py +11 -11
  239. aws_cdk/aws_s3_deployment/__init__.py +153 -11
  240. aws_cdk/aws_s3_notifications/__init__.py +7 -7
  241. aws_cdk/aws_s3express/__init__.py +1053 -6
  242. aws_cdk/aws_s3objectlambda/__init__.py +68 -16
  243. aws_cdk/aws_s3outposts/__init__.py +46 -8
  244. aws_cdk/aws_s3tables/__init__.py +2000 -323
  245. aws_cdk/aws_s3vectors/__init__.py +1378 -0
  246. aws_cdk/aws_sagemaker/__init__.py +6848 -373
  247. aws_cdk/aws_sam/__init__.py +79 -14
  248. aws_cdk/aws_scheduler/__init__.py +249 -4
  249. aws_cdk/aws_sdb/__init__.py +12 -2
  250. aws_cdk/aws_secretsmanager/__init__.py +194 -14
  251. aws_cdk/aws_securityhub/__init__.py +3121 -176
  252. aws_cdk/aws_securitylake/__init__.py +46 -8
  253. aws_cdk/aws_servicecatalog/__init__.py +429 -246
  254. aws_cdk/aws_servicecatalogappregistry/__init__.py +164 -8
  255. aws_cdk/aws_servicediscovery/__init__.py +188 -47
  256. aws_cdk/aws_ses/__init__.py +2265 -369
  257. aws_cdk/aws_shield/__init__.py +46 -8
  258. aws_cdk/aws_signer/__init__.py +33 -4
  259. aws_cdk/aws_simspaceweaver/__init__.py +42 -2
  260. aws_cdk/aws_smsvoice/__init__.py +4716 -0
  261. aws_cdk/aws_sns/__init__.py +263 -29
  262. aws_cdk/aws_sns_subscriptions/__init__.py +265 -2
  263. aws_cdk/aws_sqs/__init__.py +223 -14
  264. aws_cdk/aws_ssm/__init__.py +413 -58
  265. aws_cdk/aws_ssmcontacts/__init__.py +98 -9
  266. aws_cdk/aws_ssmguiconnect/__init__.py +20 -9
  267. aws_cdk/aws_ssmincidents/__init__.py +24 -4
  268. aws_cdk/aws_ssmquicksetup/__init__.py +393 -8
  269. aws_cdk/aws_sso/__init__.py +70 -12
  270. aws_cdk/aws_stepfunctions/__init__.py +823 -94
  271. aws_cdk/aws_stepfunctions_tasks/__init__.py +2323 -150
  272. aws_cdk/aws_supportapp/__init__.py +39 -6
  273. aws_cdk/aws_synthetics/__init__.py +1088 -126
  274. aws_cdk/aws_systemsmanagersap/__init__.py +13 -2
  275. aws_cdk/aws_timestream/__init__.py +104 -8
  276. aws_cdk/aws_transfer/__init__.py +784 -87
  277. aws_cdk/aws_verifiedpermissions/__init__.py +306 -13
  278. aws_cdk/aws_voiceid/__init__.py +54 -5
  279. aws_cdk/aws_vpclattice/__init__.py +589 -231
  280. aws_cdk/aws_waf/__init__.py +79 -14
  281. aws_cdk/aws_wafregional/__init__.py +123 -22
  282. aws_cdk/aws_wafv2/__init__.py +1183 -64
  283. aws_cdk/aws_wisdom/__init__.py +1403 -90
  284. aws_cdk/aws_workspaces/__init__.py +134 -6
  285. aws_cdk/aws_workspacesinstances/__init__.py +3940 -0
  286. aws_cdk/aws_workspacesthinclient/__init__.py +79 -10
  287. aws_cdk/aws_workspacesweb/__init__.py +1057 -141
  288. aws_cdk/aws_xray/__init__.py +48 -8
  289. aws_cdk/cloud_assembly_schema/__init__.py +368 -48
  290. aws_cdk/custom_resources/__init__.py +58 -12
  291. aws_cdk/cx_api/__init__.py +125 -21
  292. aws_cdk/interfaces/__init__.py +739 -0
  293. aws_cdk/interfaces/alexa_ask/__init__.py +146 -0
  294. aws_cdk/interfaces/aws_accessanalyzer/__init__.py +146 -0
  295. aws_cdk/interfaces/aws_acmpca/__init__.py +501 -0
  296. aws_cdk/interfaces/aws_aiops/__init__.py +146 -0
  297. aws_cdk/interfaces/aws_amazonmq/__init__.py +386 -0
  298. aws_cdk/interfaces/aws_amplify/__init__.py +352 -0
  299. aws_cdk/interfaces/aws_amplifyuibuilder/__init__.py +454 -0
  300. aws_cdk/interfaces/aws_apigateway/__init__.py +2486 -0
  301. aws_cdk/interfaces/aws_apigatewayv2/__init__.py +1651 -0
  302. aws_cdk/interfaces/aws_appconfig/__init__.py +1020 -0
  303. aws_cdk/interfaces/aws_appflow/__init__.py +404 -0
  304. aws_cdk/interfaces/aws_appintegrations/__init__.py +396 -0
  305. aws_cdk/interfaces/aws_applicationautoscaling/__init__.py +307 -0
  306. aws_cdk/interfaces/aws_applicationinsights/__init__.py +148 -0
  307. aws_cdk/interfaces/aws_applicationsignals/__init__.py +358 -0
  308. aws_cdk/interfaces/aws_appmesh/__init__.py +888 -0
  309. aws_cdk/interfaces/aws_apprunner/__init__.py +564 -0
  310. aws_cdk/interfaces/aws_appstream/__init__.py +1482 -0
  311. aws_cdk/interfaces/aws_appsync/__init__.py +1326 -0
  312. aws_cdk/interfaces/aws_apptest/__init__.py +163 -0
  313. aws_cdk/interfaces/aws_aps/__init__.py +558 -0
  314. aws_cdk/interfaces/aws_arcregionswitch/__init__.py +146 -0
  315. aws_cdk/interfaces/aws_arczonalshift/__init__.py +273 -0
  316. aws_cdk/interfaces/aws_athena/__init__.py +575 -0
  317. aws_cdk/interfaces/aws_auditmanager/__init__.py +163 -0
  318. aws_cdk/interfaces/aws_autoscaling/__init__.py +705 -0
  319. aws_cdk/interfaces/aws_autoscalingplans/__init__.py +148 -0
  320. aws_cdk/interfaces/aws_b2bi/__init__.py +524 -0
  321. aws_cdk/interfaces/aws_backup/__init__.py +955 -0
  322. aws_cdk/interfaces/aws_backupgateway/__init__.py +146 -0
  323. aws_cdk/interfaces/aws_batch/__init__.py +681 -0
  324. aws_cdk/interfaces/aws_bcmdataexports/__init__.py +146 -0
  325. aws_cdk/interfaces/aws_bedrock/__init__.py +1942 -0
  326. aws_cdk/interfaces/aws_bedrockagentcore/__init__.py +934 -0
  327. aws_cdk/interfaces/aws_billing/__init__.py +146 -0
  328. aws_cdk/interfaces/aws_billingconductor/__init__.py +463 -0
  329. aws_cdk/interfaces/aws_budgets/__init__.py +261 -0
  330. aws_cdk/interfaces/aws_cassandra/__init__.py +381 -0
  331. aws_cdk/interfaces/aws_ce/__init__.py +352 -0
  332. aws_cdk/interfaces/aws_certificatemanager/__init__.py +251 -0
  333. aws_cdk/interfaces/aws_chatbot/__init__.py +366 -0
  334. aws_cdk/interfaces/aws_cleanrooms/__init__.py +1103 -0
  335. aws_cdk/interfaces/aws_cleanroomsml/__init__.py +148 -0
  336. aws_cdk/interfaces/aws_cloud9/__init__.py +166 -0
  337. aws_cdk/interfaces/aws_cloudformation/__init__.py +1919 -0
  338. aws_cdk/interfaces/aws_cloudfront/__init__.py +1998 -0
  339. aws_cdk/interfaces/aws_cloudtrail/__init__.py +570 -0
  340. aws_cdk/interfaces/aws_cloudwatch/__init__.py +733 -0
  341. aws_cdk/interfaces/aws_codeartifact/__init__.py +352 -0
  342. aws_cdk/interfaces/aws_codebuild/__init__.py +487 -0
  343. aws_cdk/interfaces/aws_codecommit/__init__.py +163 -0
  344. aws_cdk/interfaces/aws_codeconnections/__init__.py +146 -0
  345. aws_cdk/interfaces/aws_codedeploy/__init__.py +352 -0
  346. aws_cdk/interfaces/aws_codeguruprofiler/__init__.py +168 -0
  347. aws_cdk/interfaces/aws_codegurureviewer/__init__.py +148 -0
  348. aws_cdk/interfaces/aws_codepipeline/__init__.py +388 -0
  349. aws_cdk/interfaces/aws_codestar/__init__.py +146 -0
  350. aws_cdk/interfaces/aws_codestarconnections/__init__.py +370 -0
  351. aws_cdk/interfaces/aws_codestarnotifications/__init__.py +148 -0
  352. aws_cdk/interfaces/aws_cognito/__init__.py +1929 -0
  353. aws_cdk/interfaces/aws_comprehend/__init__.py +251 -0
  354. aws_cdk/interfaces/aws_config/__init__.py +1165 -0
  355. aws_cdk/interfaces/aws_connect/__init__.py +2949 -0
  356. aws_cdk/interfaces/aws_connectcampaigns/__init__.py +146 -0
  357. aws_cdk/interfaces/aws_connectcampaignsv2/__init__.py +146 -0
  358. aws_cdk/interfaces/aws_controltower/__init__.py +394 -0
  359. aws_cdk/interfaces/aws_cur/__init__.py +146 -0
  360. aws_cdk/interfaces/aws_customerprofiles/__init__.py +915 -0
  361. aws_cdk/interfaces/aws_databrew/__init__.py +661 -0
  362. aws_cdk/interfaces/aws_datapipeline/__init__.py +146 -0
  363. aws_cdk/interfaces/aws_datasync/__init__.py +1384 -0
  364. aws_cdk/interfaces/aws_datazone/__init__.py +2238 -0
  365. aws_cdk/interfaces/aws_dax/__init__.py +364 -0
  366. aws_cdk/interfaces/aws_deadline/__init__.py +1303 -0
  367. aws_cdk/interfaces/aws_detective/__init__.py +364 -0
  368. aws_cdk/interfaces/aws_devicefarm/__init__.py +663 -0
  369. aws_cdk/interfaces/aws_devopsguru/__init__.py +362 -0
  370. aws_cdk/interfaces/aws_directoryservice/__init__.py +251 -0
  371. aws_cdk/interfaces/aws_dlm/__init__.py +166 -0
  372. aws_cdk/interfaces/aws_dms/__init__.py +1176 -0
  373. aws_cdk/interfaces/aws_docdb/__init__.py +560 -0
  374. aws_cdk/interfaces/aws_docdbelastic/__init__.py +146 -0
  375. aws_cdk/interfaces/aws_dsql/__init__.py +146 -0
  376. aws_cdk/interfaces/aws_dynamodb/__init__.py +278 -0
  377. aws_cdk/interfaces/aws_ec2/__init__.py +11963 -0
  378. aws_cdk/interfaces/aws_ecr/__init__.py +814 -0
  379. aws_cdk/interfaces/aws_ecs/__init__.py +845 -0
  380. aws_cdk/interfaces/aws_efs/__init__.py +392 -0
  381. aws_cdk/interfaces/aws_eks/__init__.py +948 -0
  382. aws_cdk/interfaces/aws_elasticache/__init__.py +1108 -0
  383. aws_cdk/interfaces/aws_elasticbeanstalk/__init__.py +503 -0
  384. aws_cdk/interfaces/aws_elasticloadbalancing/__init__.py +148 -0
  385. aws_cdk/interfaces/aws_elasticloadbalancingv2/__init__.py +795 -0
  386. aws_cdk/interfaces/aws_elasticsearch/__init__.py +158 -0
  387. aws_cdk/interfaces/aws_emr/__init__.py +913 -0
  388. aws_cdk/interfaces/aws_emrcontainers/__init__.py +168 -0
  389. aws_cdk/interfaces/aws_emrserverless/__init__.py +166 -0
  390. aws_cdk/interfaces/aws_entityresolution/__init__.py +608 -0
  391. aws_cdk/interfaces/aws_events/__init__.py +872 -0
  392. aws_cdk/interfaces/aws_eventschemas/__init__.py +455 -0
  393. aws_cdk/interfaces/aws_evidently/__init__.py +558 -0
  394. aws_cdk/interfaces/aws_evs/__init__.py +166 -0
  395. aws_cdk/interfaces/aws_finspace/__init__.py +166 -0
  396. aws_cdk/interfaces/aws_fis/__init__.py +271 -0
  397. aws_cdk/interfaces/aws_fms/__init__.py +364 -0
  398. aws_cdk/interfaces/aws_forecast/__init__.py +249 -0
  399. aws_cdk/interfaces/aws_frauddetector/__init__.py +764 -0
  400. aws_cdk/interfaces/aws_fsx/__init__.py +663 -0
  401. aws_cdk/interfaces/aws_gamelift/__init__.py +1325 -0
  402. aws_cdk/interfaces/aws_gameliftstreams/__init__.py +249 -0
  403. aws_cdk/interfaces/aws_globalaccelerator/__init__.py +461 -0
  404. aws_cdk/interfaces/aws_glue/__init__.py +2377 -0
  405. aws_cdk/interfaces/aws_grafana/__init__.py +146 -0
  406. aws_cdk/interfaces/aws_greengrass/__init__.py +1871 -0
  407. aws_cdk/interfaces/aws_greengrassv2/__init__.py +251 -0
  408. aws_cdk/interfaces/aws_groundstation/__init__.py +396 -0
  409. aws_cdk/interfaces/aws_guardduty/__init__.py +1225 -0
  410. aws_cdk/interfaces/aws_healthimaging/__init__.py +163 -0
  411. aws_cdk/interfaces/aws_healthlake/__init__.py +146 -0
  412. aws_cdk/interfaces/aws_iam/__init__.py +1803 -0
  413. aws_cdk/interfaces/aws_identitystore/__init__.py +288 -0
  414. aws_cdk/interfaces/aws_imagebuilder/__init__.py +984 -0
  415. aws_cdk/interfaces/aws_inspector/__init__.py +354 -0
  416. aws_cdk/interfaces/aws_inspectorv2/__init__.py +467 -0
  417. aws_cdk/interfaces/aws_internetmonitor/__init__.py +163 -0
  418. aws_cdk/interfaces/aws_invoicing/__init__.py +146 -0
  419. aws_cdk/interfaces/aws_iot/__init__.py +3483 -0
  420. aws_cdk/interfaces/aws_iotanalytics/__init__.py +455 -0
  421. aws_cdk/interfaces/aws_iotcoredeviceadvisor/__init__.py +168 -0
  422. aws_cdk/interfaces/aws_iotevents/__init__.py +352 -0
  423. aws_cdk/interfaces/aws_iotfleethub/__init__.py +166 -0
  424. aws_cdk/interfaces/aws_iotfleetwise/__init__.py +892 -0
  425. aws_cdk/interfaces/aws_iotsitewise/__init__.py +1097 -0
  426. aws_cdk/interfaces/aws_iotthingsgraph/__init__.py +146 -0
  427. aws_cdk/interfaces/aws_iottwinmaker/__init__.py +711 -0
  428. aws_cdk/interfaces/aws_iotwireless/__init__.py +1401 -0
  429. aws_cdk/interfaces/aws_ivs/__init__.py +1075 -0
  430. aws_cdk/interfaces/aws_ivschat/__init__.py +251 -0
  431. aws_cdk/interfaces/aws_kafkaconnect/__init__.py +354 -0
  432. aws_cdk/interfaces/aws_kendra/__init__.py +428 -0
  433. aws_cdk/interfaces/aws_kendraranking/__init__.py +166 -0
  434. aws_cdk/interfaces/aws_kinesis/__init__.py +364 -0
  435. aws_cdk/interfaces/aws_kinesisanalytics/__init__.py +364 -0
  436. aws_cdk/interfaces/aws_kinesisanalyticsv2/__init__.py +479 -0
  437. aws_cdk/interfaces/aws_kinesisfirehose/__init__.py +168 -0
  438. aws_cdk/interfaces/aws_kinesisvideo/__init__.py +283 -0
  439. aws_cdk/interfaces/aws_kms/__init__.py +376 -0
  440. aws_cdk/interfaces/aws_lakeformation/__init__.py +860 -0
  441. aws_cdk/interfaces/aws_lambda/__init__.py +1141 -0
  442. aws_cdk/interfaces/aws_launchwizard/__init__.py +146 -0
  443. aws_cdk/interfaces/aws_lex/__init__.py +513 -0
  444. aws_cdk/interfaces/aws_licensemanager/__init__.py +249 -0
  445. aws_cdk/interfaces/aws_lightsail/__init__.py +1744 -0
  446. aws_cdk/interfaces/aws_location/__init__.py +879 -0
  447. aws_cdk/interfaces/aws_logs/__init__.py +1667 -0
  448. aws_cdk/interfaces/aws_lookoutequipment/__init__.py +168 -0
  449. aws_cdk/interfaces/aws_lookoutmetrics/__init__.py +251 -0
  450. aws_cdk/interfaces/aws_lookoutvision/__init__.py +163 -0
  451. aws_cdk/interfaces/aws_m2/__init__.py +352 -0
  452. aws_cdk/interfaces/aws_macie/__init__.py +512 -0
  453. aws_cdk/interfaces/aws_managedblockchain/__init__.py +381 -0
  454. aws_cdk/interfaces/aws_mediaconnect/__init__.py +1028 -0
  455. aws_cdk/interfaces/aws_mediaconvert/__init__.py +396 -0
  456. aws_cdk/interfaces/aws_medialive/__init__.py +1755 -0
  457. aws_cdk/interfaces/aws_mediapackage/__init__.py +644 -0
  458. aws_cdk/interfaces/aws_mediapackagev2/__init__.py +618 -0
  459. aws_cdk/interfaces/aws_mediastore/__init__.py +146 -0
  460. aws_cdk/interfaces/aws_mediatailor/__init__.py +788 -0
  461. aws_cdk/interfaces/aws_memorydb/__init__.py +685 -0
  462. aws_cdk/interfaces/aws_mpa/__init__.py +249 -0
  463. aws_cdk/interfaces/aws_msk/__init__.py +764 -0
  464. aws_cdk/interfaces/aws_mwaa/__init__.py +166 -0
  465. aws_cdk/interfaces/aws_neptune/__init__.py +663 -0
  466. aws_cdk/interfaces/aws_neptunegraph/__init__.py +265 -0
  467. aws_cdk/interfaces/aws_networkfirewall/__init__.py +669 -0
  468. aws_cdk/interfaces/aws_networkmanager/__init__.py +1832 -0
  469. aws_cdk/interfaces/aws_nimblestudio/__init__.py +388 -0
  470. aws_cdk/interfaces/aws_notifications/__init__.py +868 -0
  471. aws_cdk/interfaces/aws_notificationscontacts/__init__.py +148 -0
  472. aws_cdk/interfaces/aws_oam/__init__.py +249 -0
  473. aws_cdk/interfaces/aws_observabilityadmin/__init__.py +362 -0
  474. aws_cdk/interfaces/aws_odb/__init__.py +562 -0
  475. aws_cdk/interfaces/aws_omics/__init__.py +838 -0
  476. aws_cdk/interfaces/aws_opensearchserverless/__init__.py +859 -0
  477. aws_cdk/interfaces/aws_opensearchservice/__init__.py +283 -0
  478. aws_cdk/interfaces/aws_opsworks/__init__.py +772 -0
  479. aws_cdk/interfaces/aws_opsworkscm/__init__.py +146 -0
  480. aws_cdk/interfaces/aws_organizations/__init__.py +646 -0
  481. aws_cdk/interfaces/aws_osis/__init__.py +146 -0
  482. aws_cdk/interfaces/aws_panorama/__init__.py +420 -0
  483. aws_cdk/interfaces/aws_paymentcryptography/__init__.py +249 -0
  484. aws_cdk/interfaces/aws_pcaconnectorad/__init__.py +608 -0
  485. aws_cdk/interfaces/aws_pcaconnectorscep/__init__.py +249 -0
  486. aws_cdk/interfaces/aws_pcs/__init__.py +352 -0
  487. aws_cdk/interfaces/aws_personalize/__init__.py +455 -0
  488. aws_cdk/interfaces/aws_pinpoint/__init__.py +2125 -0
  489. aws_cdk/interfaces/aws_pinpointemail/__init__.py +467 -0
  490. aws_cdk/interfaces/aws_pipes/__init__.py +158 -0
  491. aws_cdk/interfaces/aws_proton/__init__.py +360 -0
  492. aws_cdk/interfaces/aws_qbusiness/__init__.py +1122 -0
  493. aws_cdk/interfaces/aws_qldb/__init__.py +283 -0
  494. aws_cdk/interfaces/aws_quicksight/__init__.py +1566 -0
  495. aws_cdk/interfaces/aws_ram/__init__.py +249 -0
  496. aws_cdk/interfaces/aws_rbin/__init__.py +146 -0
  497. aws_cdk/interfaces/aws_rds/__init__.py +1780 -0
  498. aws_cdk/interfaces/aws_redshift/__init__.py +1104 -0
  499. aws_cdk/interfaces/aws_redshiftserverless/__init__.py +356 -0
  500. aws_cdk/interfaces/aws_refactorspaces/__init__.py +605 -0
  501. aws_cdk/interfaces/aws_rekognition/__init__.py +406 -0
  502. aws_cdk/interfaces/aws_resiliencehub/__init__.py +251 -0
  503. aws_cdk/interfaces/aws_resourceexplorer2/__init__.py +354 -0
  504. aws_cdk/interfaces/aws_resourcegroups/__init__.py +261 -0
  505. aws_cdk/interfaces/aws_robomaker/__init__.py +673 -0
  506. aws_cdk/interfaces/aws_rolesanywhere/__init__.py +384 -0
  507. aws_cdk/interfaces/aws_route53/__init__.py +804 -0
  508. aws_cdk/interfaces/aws_route53profiles/__init__.py +368 -0
  509. aws_cdk/interfaces/aws_route53recoverycontrol/__init__.py +463 -0
  510. aws_cdk/interfaces/aws_route53recoveryreadiness/__init__.py +535 -0
  511. aws_cdk/interfaces/aws_route53resolver/__init__.py +1356 -0
  512. aws_cdk/interfaces/aws_rtbfabric/__init__.py +352 -0
  513. aws_cdk/interfaces/aws_rum/__init__.py +146 -0
  514. aws_cdk/interfaces/aws_s3/__init__.py +1171 -0
  515. aws_cdk/interfaces/aws_s3express/__init__.py +392 -0
  516. aws_cdk/interfaces/aws_s3objectlambda/__init__.py +271 -0
  517. aws_cdk/interfaces/aws_s3outposts/__init__.py +455 -0
  518. aws_cdk/interfaces/aws_s3tables/__init__.py +575 -0
  519. aws_cdk/interfaces/aws_s3vectors/__init__.py +354 -0
  520. aws_cdk/interfaces/aws_sagemaker/__init__.py +3797 -0
  521. aws_cdk/interfaces/aws_sam/__init__.py +603 -0
  522. aws_cdk/interfaces/aws_scheduler/__init__.py +286 -0
  523. aws_cdk/interfaces/aws_sdb/__init__.py +146 -0
  524. aws_cdk/interfaces/aws_secretsmanager/__init__.py +461 -0
  525. aws_cdk/interfaces/aws_securityhub/__init__.py +1499 -0
  526. aws_cdk/interfaces/aws_securitylake/__init__.py +474 -0
  527. aws_cdk/interfaces/aws_servicecatalog/__init__.py +1829 -0
  528. aws_cdk/interfaces/aws_servicecatalogappregistry/__init__.py +557 -0
  529. aws_cdk/interfaces/aws_servicediscovery/__init__.py +636 -0
  530. aws_cdk/interfaces/aws_ses/__init__.py +2018 -0
  531. aws_cdk/interfaces/aws_shield/__init__.py +455 -0
  532. aws_cdk/interfaces/aws_signer/__init__.py +266 -0
  533. aws_cdk/interfaces/aws_simspaceweaver/__init__.py +146 -0
  534. aws_cdk/interfaces/aws_smsvoice/__init__.py +892 -0
  535. aws_cdk/interfaces/aws_sns/__init__.py +455 -0
  536. aws_cdk/interfaces/aws_sqs/__init__.py +364 -0
  537. aws_cdk/interfaces/aws_ssm/__init__.py +982 -0
  538. aws_cdk/interfaces/aws_ssmcontacts/__init__.py +455 -0
  539. aws_cdk/interfaces/aws_ssmguiconnect/__init__.py +146 -0
  540. aws_cdk/interfaces/aws_ssmincidents/__init__.py +249 -0
  541. aws_cdk/interfaces/aws_ssmquicksetup/__init__.py +253 -0
  542. aws_cdk/interfaces/aws_sso/__init__.py +797 -0
  543. aws_cdk/interfaces/aws_stepfunctions/__init__.py +459 -0
  544. aws_cdk/interfaces/aws_supportapp/__init__.py +372 -0
  545. aws_cdk/interfaces/aws_synthetics/__init__.py +249 -0
  546. aws_cdk/interfaces/aws_systemsmanagersap/__init__.py +148 -0
  547. aws_cdk/interfaces/aws_timestream/__init__.py +526 -0
  548. aws_cdk/interfaces/aws_transfer/__init__.py +967 -0
  549. aws_cdk/interfaces/aws_verifiedpermissions/__init__.py +538 -0
  550. aws_cdk/interfaces/aws_voiceid/__init__.py +146 -0
  551. aws_cdk/interfaces/aws_vpclattice/__init__.py +1418 -0
  552. aws_cdk/interfaces/aws_waf/__init__.py +764 -0
  553. aws_cdk/interfaces/aws_wafregional/__init__.py +1182 -0
  554. aws_cdk/interfaces/aws_wafv2/__init__.py +870 -0
  555. aws_cdk/interfaces/aws_wisdom/__init__.py +1556 -0
  556. aws_cdk/interfaces/aws_workspaces/__init__.py +352 -0
  557. aws_cdk/interfaces/aws_workspacesinstances/__init__.py +390 -0
  558. aws_cdk/interfaces/aws_workspacesthinclient/__init__.py +168 -0
  559. aws_cdk/interfaces/aws_workspacesweb/__init__.py +1085 -0
  560. aws_cdk/interfaces/aws_xray/__init__.py +457 -0
  561. aws_cdk/lambda_layer_awscli/__init__.py +6 -0
  562. aws_cdk/lambda_layer_node_proxy_agent/__init__.py +6 -0
  563. aws_cdk/pipelines/__init__.py +202 -52
  564. aws_cdk/region_info/__init__.py +3 -0
  565. aws_cdk/triggers/__init__.py +66 -18
  566. {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/METADATA +418 -18
  567. aws_cdk_lib-2.224.0.dist-info/RECORD +584 -0
  568. aws_cdk_lib-2.195.0.dist-info/RECORD +0 -304
  569. {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/LICENSE +0 -0
  570. {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/NOTICE +0 -0
  571. {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/WHEEL +0 -0
  572. {aws_cdk_lib-2.195.0.dist-info → aws_cdk_lib-2.224.0.dist-info}/top_level.txt +0 -0
@@ -68,15 +68,29 @@ from .. import (
68
68
  TagManager as _TagManager_0a598cb3,
69
69
  TreeInspector as _TreeInspector_488e0dd5,
70
70
  )
71
+ from ..interfaces.aws_networkfirewall import (
72
+ FirewallPolicyReference as _FirewallPolicyReference_590b2e0a,
73
+ FirewallReference as _FirewallReference_2bf55714,
74
+ IFirewallPolicyRef as _IFirewallPolicyRef_bd446a4d,
75
+ IFirewallRef as _IFirewallRef_31769805,
76
+ ILoggingConfigurationRef as _ILoggingConfigurationRef_1588c620,
77
+ IRuleGroupRef as _IRuleGroupRef_f1ee71d3,
78
+ ITLSInspectionConfigurationRef as _ITLSInspectionConfigurationRef_6d0a6d9c,
79
+ IVpcEndpointAssociationRef as _IVpcEndpointAssociationRef_bd0818d9,
80
+ LoggingConfigurationReference as _LoggingConfigurationReference_f6c32f6c,
81
+ RuleGroupReference as _RuleGroupReference_b514c132,
82
+ TLSInspectionConfigurationReference as _TLSInspectionConfigurationReference_52bd7dd3,
83
+ VpcEndpointAssociationReference as _VpcEndpointAssociationReference_d627bc37,
84
+ )
71
85
 
72
86
 
73
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
87
+ @jsii.implements(_IInspectable_c2943556, _IFirewallRef_31769805, _ITaggable_36806126)
74
88
  class CfnFirewall(
75
89
  _CfnResource_9df397a6,
76
90
  metaclass=jsii.JSIIMeta,
77
91
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall",
78
92
  ):
79
- '''Use the ``Firewall`` to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
93
+ '''Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
80
94
 
81
95
  The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
82
96
 
@@ -93,24 +107,29 @@ class CfnFirewall(
93
107
  cfn_firewall = networkfirewall.CfnFirewall(self, "MyCfnFirewall",
94
108
  firewall_name="firewallName",
95
109
  firewall_policy_arn="firewallPolicyArn",
96
- subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
97
- subnet_id="subnetId",
98
-
99
- # the properties below are optional
100
- ip_address_type="ipAddressType"
101
- )],
102
- vpc_id="vpcId",
103
110
 
104
111
  # the properties below are optional
112
+ availability_zone_change_protection=False,
113
+ availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
114
+ availability_zone="availabilityZone"
115
+ )],
105
116
  delete_protection=False,
106
117
  description="description",
107
118
  enabled_analysis_types=["enabledAnalysisTypes"],
108
119
  firewall_policy_change_protection=False,
109
120
  subnet_change_protection=False,
121
+ subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
122
+ subnet_id="subnetId",
123
+
124
+ # the properties below are optional
125
+ ip_address_type="ipAddressType"
126
+ )],
110
127
  tags=[CfnTag(
111
128
  key="key",
112
129
  value="value"
113
- )]
130
+ )],
131
+ transit_gateway_id="transitGatewayId",
132
+ vpc_id="vpcId"
114
133
  )
115
134
  '''
116
135
 
@@ -121,28 +140,35 @@ class CfnFirewall(
121
140
  *,
122
141
  firewall_name: builtins.str,
123
142
  firewall_policy_arn: builtins.str,
124
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]],
125
- vpc_id: builtins.str,
143
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
144
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.AvailabilityZoneMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
126
145
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
127
146
  description: typing.Optional[builtins.str] = None,
128
147
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
129
148
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
130
149
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
150
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
131
151
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
152
+ transit_gateway_id: typing.Optional[builtins.str] = None,
153
+ vpc_id: typing.Optional[builtins.str] = None,
132
154
  ) -> None:
133
- '''
155
+ '''Create a new ``AWS::NetworkFirewall::Firewall``.
156
+
134
157
  :param scope: Scope in which this resource is defined.
135
158
  :param id: Construct identifier for this resource (unique in its scope).
136
159
  :param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
137
160
  :param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
138
- :param subnet_mappings: The public subnets that Network Firewall is using for the firewall. Each subnet must belong to a different Availability Zone.
139
- :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
161
+ :param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
162
+ :param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
140
163
  :param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
141
164
  :param description: A description of the firewall.
142
165
  :param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
143
166
  :param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
144
167
  :param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
168
+ :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
145
169
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
170
+ :param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
171
+ :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
146
172
  '''
147
173
  if __debug__:
148
174
  type_hints = typing.get_type_hints(_typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56)
@@ -151,14 +177,17 @@ class CfnFirewall(
151
177
  props = CfnFirewallProps(
152
178
  firewall_name=firewall_name,
153
179
  firewall_policy_arn=firewall_policy_arn,
154
- subnet_mappings=subnet_mappings,
155
- vpc_id=vpc_id,
180
+ availability_zone_change_protection=availability_zone_change_protection,
181
+ availability_zone_mappings=availability_zone_mappings,
156
182
  delete_protection=delete_protection,
157
183
  description=description,
158
184
  enabled_analysis_types=enabled_analysis_types,
159
185
  firewall_policy_change_protection=firewall_policy_change_protection,
160
186
  subnet_change_protection=subnet_change_protection,
187
+ subnet_mappings=subnet_mappings,
161
188
  tags=tags,
189
+ transit_gateway_id=transit_gateway_id,
190
+ vpc_id=vpc_id,
162
191
  )
163
192
 
164
193
  jsii.create(self.__class__, self, [scope, id, props])
@@ -207,7 +236,7 @@ class CfnFirewall(
207
236
  @builtins.property
208
237
  @jsii.member(jsii_name="attrFirewallArn")
209
238
  def attr_firewall_arn(self) -> builtins.str:
210
- '''The Amazon Resource Name (ARN) of the ``Firewall`` .
239
+ '''The Amazon Resource Name (ARN) of the firewall.
211
240
 
212
241
  :cloudformationAttribute: FirewallArn
213
242
  '''
@@ -216,17 +245,34 @@ class CfnFirewall(
216
245
  @builtins.property
217
246
  @jsii.member(jsii_name="attrFirewallId")
218
247
  def attr_firewall_id(self) -> builtins.str:
219
- '''The name of the ``Firewall`` resource.
248
+ '''The name of the firewallresource.
220
249
 
221
250
  :cloudformationAttribute: FirewallId
222
251
  '''
223
252
  return typing.cast(builtins.str, jsii.get(self, "attrFirewallId"))
224
253
 
254
+ @builtins.property
255
+ @jsii.member(jsii_name="attrTransitGatewayAttachmentId")
256
+ def attr_transit_gateway_attachment_id(self) -> builtins.str:
257
+ '''The unique identifier of the transit gateway attachment associated with this firewall.
258
+
259
+ This field is only present for transit gateway-attached firewalls.
260
+
261
+ :cloudformationAttribute: TransitGatewayAttachmentId
262
+ '''
263
+ return typing.cast(builtins.str, jsii.get(self, "attrTransitGatewayAttachmentId"))
264
+
225
265
  @builtins.property
226
266
  @jsii.member(jsii_name="cfnProperties")
227
267
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
228
268
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
229
269
 
270
+ @builtins.property
271
+ @jsii.member(jsii_name="firewallRef")
272
+ def firewall_ref(self) -> _FirewallReference_2bf55714:
273
+ '''A reference to a Firewall resource.'''
274
+ return typing.cast(_FirewallReference_2bf55714, jsii.get(self, "firewallRef"))
275
+
230
276
  @builtins.property
231
277
  @jsii.member(jsii_name="tags")
232
278
  def tags(self) -> _TagManager_0a598cb3:
@@ -260,35 +306,40 @@ class CfnFirewall(
260
306
  jsii.set(self, "firewallPolicyArn", value) # pyright: ignore[reportArgumentType]
261
307
 
262
308
  @builtins.property
263
- @jsii.member(jsii_name="subnetMappings")
264
- def subnet_mappings(
309
+ @jsii.member(jsii_name="availabilityZoneChangeProtection")
310
+ def availability_zone_change_protection(
265
311
  self,
266
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]:
267
- '''The public subnets that Network Firewall is using for the firewall.'''
268
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]], jsii.get(self, "subnetMappings"))
312
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
313
+ '''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.'''
314
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "availabilityZoneChangeProtection"))
269
315
 
270
- @subnet_mappings.setter
271
- def subnet_mappings(
316
+ @availability_zone_change_protection.setter
317
+ def availability_zone_change_protection(
272
318
  self,
273
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]],
319
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
274
320
  ) -> None:
275
321
  if __debug__:
276
- type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
322
+ type_hints = typing.get_type_hints(_typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1)
277
323
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
278
- jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
324
+ jsii.set(self, "availabilityZoneChangeProtection", value) # pyright: ignore[reportArgumentType]
279
325
 
280
326
  @builtins.property
281
- @jsii.member(jsii_name="vpcId")
282
- def vpc_id(self) -> builtins.str:
283
- '''The unique identifier of the VPC where the firewall is in use.'''
284
- return typing.cast(builtins.str, jsii.get(self, "vpcId"))
327
+ @jsii.member(jsii_name="availabilityZoneMappings")
328
+ def availability_zone_mappings(
329
+ self,
330
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]]:
331
+ '''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.'''
332
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]], jsii.get(self, "availabilityZoneMappings"))
285
333
 
286
- @vpc_id.setter
287
- def vpc_id(self, value: builtins.str) -> None:
334
+ @availability_zone_mappings.setter
335
+ def availability_zone_mappings(
336
+ self,
337
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]],
338
+ ) -> None:
288
339
  if __debug__:
289
- type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
340
+ type_hints = typing.get_type_hints(_typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77)
290
341
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
291
- jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
342
+ jsii.set(self, "availabilityZoneMappings", value) # pyright: ignore[reportArgumentType]
292
343
 
293
344
  @builtins.property
294
345
  @jsii.member(jsii_name="deleteProtection")
@@ -373,6 +424,24 @@ class CfnFirewall(
373
424
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
374
425
  jsii.set(self, "subnetChangeProtection", value) # pyright: ignore[reportArgumentType]
375
426
 
427
+ @builtins.property
428
+ @jsii.member(jsii_name="subnetMappings")
429
+ def subnet_mappings(
430
+ self,
431
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]]:
432
+ '''The primary public subnets that Network Firewall is using for the firewall.'''
433
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]], jsii.get(self, "subnetMappings"))
434
+
435
+ @subnet_mappings.setter
436
+ def subnet_mappings(
437
+ self,
438
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]],
439
+ ) -> None:
440
+ if __debug__:
441
+ type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
442
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
443
+ jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
444
+
376
445
  @builtins.property
377
446
  @jsii.member(jsii_name="tagsRaw")
378
447
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -386,6 +455,90 @@ class CfnFirewall(
386
455
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
387
456
  jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
388
457
 
458
+ @builtins.property
459
+ @jsii.member(jsii_name="transitGatewayId")
460
+ def transit_gateway_id(self) -> typing.Optional[builtins.str]:
461
+ '''The unique identifier of the transit gateway associated with this firewall.'''
462
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "transitGatewayId"))
463
+
464
+ @transit_gateway_id.setter
465
+ def transit_gateway_id(self, value: typing.Optional[builtins.str]) -> None:
466
+ if __debug__:
467
+ type_hints = typing.get_type_hints(_typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6)
468
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
469
+ jsii.set(self, "transitGatewayId", value) # pyright: ignore[reportArgumentType]
470
+
471
+ @builtins.property
472
+ @jsii.member(jsii_name="vpcId")
473
+ def vpc_id(self) -> typing.Optional[builtins.str]:
474
+ '''The unique identifier of the VPC where the firewall is in use.'''
475
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "vpcId"))
476
+
477
+ @vpc_id.setter
478
+ def vpc_id(self, value: typing.Optional[builtins.str]) -> None:
479
+ if __debug__:
480
+ type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
481
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
482
+ jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
483
+
484
+ @jsii.data_type(
485
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty",
486
+ jsii_struct_bases=[],
487
+ name_mapping={"availability_zone": "availabilityZone"},
488
+ )
489
+ class AvailabilityZoneMappingProperty:
490
+ def __init__(self, *, availability_zone: builtins.str) -> None:
491
+ '''Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall.
492
+
493
+ Each mapping represents where the firewall can process traffic. You use these mappings when calling ``CreateFirewall`` , ``AssociateAvailabilityZones`` , and ``DisassociateAvailabilityZones`` .
494
+
495
+ To retrieve the current Availability Zone mappings for a firewall, use ``DescribeFirewall`` .
496
+
497
+ :param availability_zone: The ID of the Availability Zone where the firewall endpoint is located. For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
498
+
499
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html
500
+ :exampleMetadata: fixture=_generated
501
+
502
+ Example::
503
+
504
+ # The code below shows an example of how to instantiate this type.
505
+ # The values are placeholders you should change.
506
+ from aws_cdk import aws_networkfirewall as networkfirewall
507
+
508
+ availability_zone_mapping_property = networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
509
+ availability_zone="availabilityZone"
510
+ )
511
+ '''
512
+ if __debug__:
513
+ type_hints = typing.get_type_hints(_typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf)
514
+ check_type(argname="argument availability_zone", value=availability_zone, expected_type=type_hints["availability_zone"])
515
+ self._values: typing.Dict[builtins.str, typing.Any] = {
516
+ "availability_zone": availability_zone,
517
+ }
518
+
519
+ @builtins.property
520
+ def availability_zone(self) -> builtins.str:
521
+ '''The ID of the Availability Zone where the firewall endpoint is located.
522
+
523
+ For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
524
+
525
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone
526
+ '''
527
+ result = self._values.get("availability_zone")
528
+ assert result is not None, "Required property 'availability_zone' is missing"
529
+ return typing.cast(builtins.str, result)
530
+
531
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
532
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
533
+
534
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
535
+ return not (rhs == self)
536
+
537
+ def __repr__(self) -> str:
538
+ return "AvailabilityZoneMappingProperty(%s)" % ", ".join(
539
+ k + "=" + repr(v) for k, v in self._values.items()
540
+ )
541
+
389
542
  @jsii.data_type(
390
543
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.SubnetMappingProperty",
391
544
  jsii_struct_bases=[],
@@ -464,13 +617,13 @@ class CfnFirewall(
464
617
  )
465
618
 
466
619
 
467
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
620
+ @jsii.implements(_IInspectable_c2943556, _IFirewallPolicyRef_bd446a4d, _ITaggable_36806126)
468
621
  class CfnFirewallPolicy(
469
622
  _CfnResource_9df397a6,
470
623
  metaclass=jsii.JSIIMeta,
471
624
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewallPolicy",
472
625
  ):
473
- '''Use the ``FirewallPolicy`` to define the stateless and stateful network traffic filtering behavior for your ``Firewall`` .
626
+ '''Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall.
474
627
 
475
628
  You can use one firewall policy for multiple firewalls.
476
629
 
@@ -490,6 +643,7 @@ class CfnFirewallPolicy(
490
643
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
491
644
 
492
645
  # the properties below are optional
646
+ enable_tls_session_holding=False,
493
647
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
494
648
  rule_variables={
495
649
  "rule_variables_key": {
@@ -509,6 +663,7 @@ class CfnFirewallPolicy(
509
663
  resource_arn="resourceArn",
510
664
 
511
665
  # the properties below are optional
666
+ deep_threat_inspection=False,
512
667
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
513
668
  action="action"
514
669
  ),
@@ -551,7 +706,8 @@ class CfnFirewallPolicy(
551
706
  description: typing.Optional[builtins.str] = None,
552
707
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
553
708
  ) -> None:
554
- '''
709
+ '''Create a new ``AWS::NetworkFirewall::FirewallPolicy``.
710
+
555
711
  :param scope: Scope in which this resource is defined.
556
712
  :param id: Construct identifier for this resource (unique in its scope).
557
713
  :param firewall_policy: The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings.
@@ -605,7 +761,7 @@ class CfnFirewallPolicy(
605
761
  @builtins.property
606
762
  @jsii.member(jsii_name="attrFirewallPolicyArn")
607
763
  def attr_firewall_policy_arn(self) -> builtins.str:
608
- '''The Amazon Resource Name (ARN) of the ``FirewallPolicy`` .
764
+ '''The Amazon Resource Name (ARN) of the firewall policy.
609
765
 
610
766
  :cloudformationAttribute: FirewallPolicyArn
611
767
  '''
@@ -614,7 +770,7 @@ class CfnFirewallPolicy(
614
770
  @builtins.property
615
771
  @jsii.member(jsii_name="attrFirewallPolicyId")
616
772
  def attr_firewall_policy_id(self) -> builtins.str:
617
- '''The unique ID of the ``FirewallPolicy`` resource.
773
+ '''The unique ID of the firewall policy resource.
618
774
 
619
775
  :cloudformationAttribute: FirewallPolicyId
620
776
  '''
@@ -625,6 +781,12 @@ class CfnFirewallPolicy(
625
781
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
626
782
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
627
783
 
784
+ @builtins.property
785
+ @jsii.member(jsii_name="firewallPolicyRef")
786
+ def firewall_policy_ref(self) -> _FirewallPolicyReference_590b2e0a:
787
+ '''A reference to a FirewallPolicy resource.'''
788
+ return typing.cast(_FirewallPolicyReference_590b2e0a, jsii.get(self, "firewallPolicyRef"))
789
+
628
790
  @builtins.property
629
791
  @jsii.member(jsii_name="tags")
630
792
  def tags(self) -> _TagManager_0a598cb3:
@@ -776,8 +938,8 @@ class CfnFirewallPolicy(
776
938
 
777
939
  You can use custom actions in the following places:
778
940
 
779
- - In an ``RuleGroup.StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
780
- - In an ``FirewallPolicy`` specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
941
+ - In an ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
942
+ - In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
781
943
 
782
944
  :param action_definition: The custom action associated with the action name.
783
945
  :param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
@@ -910,6 +1072,7 @@ class CfnFirewallPolicy(
910
1072
  name_mapping={
911
1073
  "stateless_default_actions": "statelessDefaultActions",
912
1074
  "stateless_fragment_default_actions": "statelessFragmentDefaultActions",
1075
+ "enable_tls_session_holding": "enableTlsSessionHolding",
913
1076
  "policy_variables": "policyVariables",
914
1077
  "stateful_default_actions": "statefulDefaultActions",
915
1078
  "stateful_engine_options": "statefulEngineOptions",
@@ -925,6 +1088,7 @@ class CfnFirewallPolicy(
925
1088
  *,
926
1089
  stateless_default_actions: typing.Sequence[builtins.str],
927
1090
  stateless_fragment_default_actions: typing.Sequence[builtins.str],
1091
+ enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
928
1092
  policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.PolicyVariablesProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
929
1093
  stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
930
1094
  stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulEngineOptionsProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -937,6 +1101,7 @@ class CfnFirewallPolicy(
937
1101
 
938
1102
  :param stateless_default_actions: The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
939
1103
  :param stateless_fragment_default_actions: The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. If you want non-matching fragmented packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
1104
+ :param enable_tls_session_holding: When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules. Requires an associated TLS Inspection configuration.
940
1105
  :param policy_variables: Contains variables that you can use to override default Suricata settings in your firewall policy.
941
1106
  :param stateful_default_actions: The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order. Valid values of the stateful default action: - aws:drop_strict - aws:drop_established - aws:alert_strict - aws:alert_established For more information, see `Strict evaluation order <https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html>`_ in the *AWS Network Firewall Developer Guide* .
942
1107
  :param stateful_engine_options: Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
@@ -959,6 +1124,7 @@ class CfnFirewallPolicy(
959
1124
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
960
1125
 
961
1126
  # the properties below are optional
1127
+ enable_tls_session_holding=False,
962
1128
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
963
1129
  rule_variables={
964
1130
  "rule_variables_key": {
@@ -978,6 +1144,7 @@ class CfnFirewallPolicy(
978
1144
  resource_arn="resourceArn",
979
1145
 
980
1146
  # the properties below are optional
1147
+ deep_threat_inspection=False,
981
1148
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
982
1149
  action="action"
983
1150
  ),
@@ -1004,6 +1171,7 @@ class CfnFirewallPolicy(
1004
1171
  type_hints = typing.get_type_hints(_typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2db29fc18)
1005
1172
  check_type(argname="argument stateless_default_actions", value=stateless_default_actions, expected_type=type_hints["stateless_default_actions"])
1006
1173
  check_type(argname="argument stateless_fragment_default_actions", value=stateless_fragment_default_actions, expected_type=type_hints["stateless_fragment_default_actions"])
1174
+ check_type(argname="argument enable_tls_session_holding", value=enable_tls_session_holding, expected_type=type_hints["enable_tls_session_holding"])
1007
1175
  check_type(argname="argument policy_variables", value=policy_variables, expected_type=type_hints["policy_variables"])
1008
1176
  check_type(argname="argument stateful_default_actions", value=stateful_default_actions, expected_type=type_hints["stateful_default_actions"])
1009
1177
  check_type(argname="argument stateful_engine_options", value=stateful_engine_options, expected_type=type_hints["stateful_engine_options"])
@@ -1015,6 +1183,8 @@ class CfnFirewallPolicy(
1015
1183
  "stateless_default_actions": stateless_default_actions,
1016
1184
  "stateless_fragment_default_actions": stateless_fragment_default_actions,
1017
1185
  }
1186
+ if enable_tls_session_holding is not None:
1187
+ self._values["enable_tls_session_holding"] = enable_tls_session_holding
1018
1188
  if policy_variables is not None:
1019
1189
  self._values["policy_variables"] = policy_variables
1020
1190
  if stateful_default_actions is not None:
@@ -1062,6 +1232,19 @@ class CfnFirewallPolicy(
1062
1232
  assert result is not None, "Required property 'stateless_fragment_default_actions' is missing"
1063
1233
  return typing.cast(typing.List[builtins.str], result)
1064
1234
 
1235
+ @builtins.property
1236
+ def enable_tls_session_holding(
1237
+ self,
1238
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
1239
+ '''When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules.
1240
+
1241
+ Requires an associated TLS Inspection configuration.
1242
+
1243
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicy-enabletlssessionholding
1244
+ '''
1245
+ result = self._values.get("enable_tls_session_holding")
1246
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
1247
+
1065
1248
  @builtins.property
1066
1249
  def policy_variables(
1067
1250
  self,
@@ -1241,7 +1424,7 @@ class CfnFirewallPolicy(
1241
1424
  ) -> None:
1242
1425
  '''A list of IP addresses and address ranges, in CIDR notation.
1243
1426
 
1244
- This is part of a ``RuleVariables`` .
1427
+ This is part of a rule variable.
1245
1428
 
1246
1429
  :param definition: The list of IP addresses and address ranges, in CIDR notation.
1247
1430
 
@@ -1568,6 +1751,7 @@ class CfnFirewallPolicy(
1568
1751
  jsii_struct_bases=[],
1569
1752
  name_mapping={
1570
1753
  "resource_arn": "resourceArn",
1754
+ "deep_threat_inspection": "deepThreatInspection",
1571
1755
  "override": "override",
1572
1756
  "priority": "priority",
1573
1757
  },
@@ -1577,14 +1761,16 @@ class CfnFirewallPolicy(
1577
1761
  self,
1578
1762
  *,
1579
1763
  resource_arn: builtins.str,
1764
+ deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1580
1765
  override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulRuleGroupOverrideProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
1581
1766
  priority: typing.Optional[jsii.Number] = None,
1582
1767
  ) -> None:
1583
1768
  '''Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.
1584
1769
 
1585
1770
  :param resource_arn: The Amazon Resource Name (ARN) of the stateful rule group.
1771
+ :param deep_threat_inspection: AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. .. epigraph:: Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
1586
1772
  :param override: The action that allows the policy owner to override the behavior of the rule group within a policy.
1587
- :param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single ``FirewallPolicy`` . This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
1773
+ :param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
1588
1774
 
1589
1775
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html
1590
1776
  :exampleMetadata: fixture=_generated
@@ -1599,6 +1785,7 @@ class CfnFirewallPolicy(
1599
1785
  resource_arn="resourceArn",
1600
1786
 
1601
1787
  # the properties below are optional
1788
+ deep_threat_inspection=False,
1602
1789
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
1603
1790
  action="action"
1604
1791
  ),
@@ -1608,11 +1795,14 @@ class CfnFirewallPolicy(
1608
1795
  if __debug__:
1609
1796
  type_hints = typing.get_type_hints(_typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8)
1610
1797
  check_type(argname="argument resource_arn", value=resource_arn, expected_type=type_hints["resource_arn"])
1798
+ check_type(argname="argument deep_threat_inspection", value=deep_threat_inspection, expected_type=type_hints["deep_threat_inspection"])
1611
1799
  check_type(argname="argument override", value=override, expected_type=type_hints["override"])
1612
1800
  check_type(argname="argument priority", value=priority, expected_type=type_hints["priority"])
1613
1801
  self._values: typing.Dict[builtins.str, typing.Any] = {
1614
1802
  "resource_arn": resource_arn,
1615
1803
  }
1804
+ if deep_threat_inspection is not None:
1805
+ self._values["deep_threat_inspection"] = deep_threat_inspection
1616
1806
  if override is not None:
1617
1807
  self._values["override"] = override
1618
1808
  if priority is not None:
@@ -1628,6 +1818,22 @@ class CfnFirewallPolicy(
1628
1818
  assert result is not None, "Required property 'resource_arn' is missing"
1629
1819
  return typing.cast(builtins.str, result)
1630
1820
 
1821
+ @builtins.property
1822
+ def deep_threat_inspection(
1823
+ self,
1824
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
1825
+ '''AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability.
1826
+
1827
+ When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
1828
+ .. epigraph::
1829
+
1830
+ Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
1831
+
1832
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection
1833
+ '''
1834
+ result = self._values.get("deep_threat_inspection")
1835
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
1836
+
1631
1837
  @builtins.property
1632
1838
  def override(
1633
1839
  self,
@@ -1641,7 +1847,7 @@ class CfnFirewallPolicy(
1641
1847
 
1642
1848
  @builtins.property
1643
1849
  def priority(self) -> typing.Optional[jsii.Number]:
1644
- '''An integer setting that indicates the order in which to run the stateful rule groups in a single ``FirewallPolicy`` .
1850
+ '''An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy.
1645
1851
 
1646
1852
  This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings.
1647
1853
 
@@ -1679,7 +1885,7 @@ class CfnFirewallPolicy(
1679
1885
  ) -> None:
1680
1886
  '''Identifier for a single stateless rule group, used in a firewall policy to refer to the rule group.
1681
1887
 
1682
- :param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single ``FirewallPolicy`` . Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1888
+ :param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1683
1889
  :param resource_arn: The Amazon Resource Name (ARN) of the stateless rule group.
1684
1890
 
1685
1891
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html
@@ -1707,7 +1913,7 @@ class CfnFirewallPolicy(
1707
1913
 
1708
1914
  @builtins.property
1709
1915
  def priority(self) -> jsii.Number:
1710
- '''An integer setting that indicates the order in which to run the stateless rule groups in a single ``FirewallPolicy`` .
1916
+ '''An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy.
1711
1917
 
1712
1918
  Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1713
1919
 
@@ -1780,6 +1986,7 @@ class CfnFirewallPolicyProps:
1780
1986
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
1781
1987
 
1782
1988
  # the properties below are optional
1989
+ enable_tls_session_holding=False,
1783
1990
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
1784
1991
  rule_variables={
1785
1992
  "rule_variables_key": {
@@ -1799,6 +2006,7 @@ class CfnFirewallPolicyProps:
1799
2006
  resource_arn="resourceArn",
1800
2007
 
1801
2008
  # the properties below are optional
2009
+ deep_threat_inspection=False,
1802
2010
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
1803
2011
  action="action"
1804
2012
  ),
@@ -1907,14 +2115,17 @@ class CfnFirewallPolicyProps:
1907
2115
  name_mapping={
1908
2116
  "firewall_name": "firewallName",
1909
2117
  "firewall_policy_arn": "firewallPolicyArn",
1910
- "subnet_mappings": "subnetMappings",
1911
- "vpc_id": "vpcId",
2118
+ "availability_zone_change_protection": "availabilityZoneChangeProtection",
2119
+ "availability_zone_mappings": "availabilityZoneMappings",
1912
2120
  "delete_protection": "deleteProtection",
1913
2121
  "description": "description",
1914
2122
  "enabled_analysis_types": "enabledAnalysisTypes",
1915
2123
  "firewall_policy_change_protection": "firewallPolicyChangeProtection",
1916
2124
  "subnet_change_protection": "subnetChangeProtection",
2125
+ "subnet_mappings": "subnetMappings",
1917
2126
  "tags": "tags",
2127
+ "transit_gateway_id": "transitGatewayId",
2128
+ "vpc_id": "vpcId",
1918
2129
  },
1919
2130
  )
1920
2131
  class CfnFirewallProps:
@@ -1923,27 +2134,33 @@ class CfnFirewallProps:
1923
2134
  *,
1924
2135
  firewall_name: builtins.str,
1925
2136
  firewall_policy_arn: builtins.str,
1926
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
1927
- vpc_id: builtins.str,
2137
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2138
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
1928
2139
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1929
2140
  description: typing.Optional[builtins.str] = None,
1930
2141
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
1931
2142
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1932
2143
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2144
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
1933
2145
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
2146
+ transit_gateway_id: typing.Optional[builtins.str] = None,
2147
+ vpc_id: typing.Optional[builtins.str] = None,
1934
2148
  ) -> None:
1935
2149
  '''Properties for defining a ``CfnFirewall``.
1936
2150
 
1937
2151
  :param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
1938
2152
  :param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
1939
- :param subnet_mappings: The public subnets that Network Firewall is using for the firewall. Each subnet must belong to a different Availability Zone.
1940
- :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
2153
+ :param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
2154
+ :param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
1941
2155
  :param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
1942
2156
  :param description: A description of the firewall.
1943
2157
  :param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
1944
2158
  :param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
1945
2159
  :param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
2160
+ :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
1946
2161
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
2162
+ :param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
2163
+ :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
1947
2164
 
1948
2165
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html
1949
2166
  :exampleMetadata: fixture=_generated
@@ -1957,44 +2174,54 @@ class CfnFirewallProps:
1957
2174
  cfn_firewall_props = networkfirewall.CfnFirewallProps(
1958
2175
  firewall_name="firewallName",
1959
2176
  firewall_policy_arn="firewallPolicyArn",
1960
- subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
1961
- subnet_id="subnetId",
1962
-
1963
- # the properties below are optional
1964
- ip_address_type="ipAddressType"
1965
- )],
1966
- vpc_id="vpcId",
1967
2177
 
1968
2178
  # the properties below are optional
2179
+ availability_zone_change_protection=False,
2180
+ availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
2181
+ availability_zone="availabilityZone"
2182
+ )],
1969
2183
  delete_protection=False,
1970
2184
  description="description",
1971
2185
  enabled_analysis_types=["enabledAnalysisTypes"],
1972
2186
  firewall_policy_change_protection=False,
1973
2187
  subnet_change_protection=False,
2188
+ subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
2189
+ subnet_id="subnetId",
2190
+
2191
+ # the properties below are optional
2192
+ ip_address_type="ipAddressType"
2193
+ )],
1974
2194
  tags=[CfnTag(
1975
2195
  key="key",
1976
2196
  value="value"
1977
- )]
2197
+ )],
2198
+ transit_gateway_id="transitGatewayId",
2199
+ vpc_id="vpcId"
1978
2200
  )
1979
2201
  '''
1980
2202
  if __debug__:
1981
2203
  type_hints = typing.get_type_hints(_typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57bc238e99)
1982
2204
  check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
1983
2205
  check_type(argname="argument firewall_policy_arn", value=firewall_policy_arn, expected_type=type_hints["firewall_policy_arn"])
1984
- check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
1985
- check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
2206
+ check_type(argname="argument availability_zone_change_protection", value=availability_zone_change_protection, expected_type=type_hints["availability_zone_change_protection"])
2207
+ check_type(argname="argument availability_zone_mappings", value=availability_zone_mappings, expected_type=type_hints["availability_zone_mappings"])
1986
2208
  check_type(argname="argument delete_protection", value=delete_protection, expected_type=type_hints["delete_protection"])
1987
2209
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
1988
2210
  check_type(argname="argument enabled_analysis_types", value=enabled_analysis_types, expected_type=type_hints["enabled_analysis_types"])
1989
2211
  check_type(argname="argument firewall_policy_change_protection", value=firewall_policy_change_protection, expected_type=type_hints["firewall_policy_change_protection"])
1990
2212
  check_type(argname="argument subnet_change_protection", value=subnet_change_protection, expected_type=type_hints["subnet_change_protection"])
2213
+ check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
1991
2214
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
2215
+ check_type(argname="argument transit_gateway_id", value=transit_gateway_id, expected_type=type_hints["transit_gateway_id"])
2216
+ check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
1992
2217
  self._values: typing.Dict[builtins.str, typing.Any] = {
1993
2218
  "firewall_name": firewall_name,
1994
2219
  "firewall_policy_arn": firewall_policy_arn,
1995
- "subnet_mappings": subnet_mappings,
1996
- "vpc_id": vpc_id,
1997
2220
  }
2221
+ if availability_zone_change_protection is not None:
2222
+ self._values["availability_zone_change_protection"] = availability_zone_change_protection
2223
+ if availability_zone_mappings is not None:
2224
+ self._values["availability_zone_mappings"] = availability_zone_mappings
1998
2225
  if delete_protection is not None:
1999
2226
  self._values["delete_protection"] = delete_protection
2000
2227
  if description is not None:
@@ -2005,8 +2232,14 @@ class CfnFirewallProps:
2005
2232
  self._values["firewall_policy_change_protection"] = firewall_policy_change_protection
2006
2233
  if subnet_change_protection is not None:
2007
2234
  self._values["subnet_change_protection"] = subnet_change_protection
2235
+ if subnet_mappings is not None:
2236
+ self._values["subnet_mappings"] = subnet_mappings
2008
2237
  if tags is not None:
2009
2238
  self._values["tags"] = tags
2239
+ if transit_gateway_id is not None:
2240
+ self._values["transit_gateway_id"] = transit_gateway_id
2241
+ if vpc_id is not None:
2242
+ self._values["vpc_id"] = vpc_id
2010
2243
 
2011
2244
  @builtins.property
2012
2245
  def firewall_name(self) -> builtins.str:
@@ -2033,30 +2266,30 @@ class CfnFirewallProps:
2033
2266
  return typing.cast(builtins.str, result)
2034
2267
 
2035
2268
  @builtins.property
2036
- def subnet_mappings(
2269
+ def availability_zone_change_protection(
2037
2270
  self,
2038
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]:
2039
- '''The public subnets that Network Firewall is using for the firewall.
2271
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2272
+ '''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.
2040
2273
 
2041
- Each subnet must belong to a different Availability Zone.
2274
+ When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
2042
2275
 
2043
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
2276
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection
2044
2277
  '''
2045
- result = self._values.get("subnet_mappings")
2046
- assert result is not None, "Required property 'subnet_mappings' is missing"
2047
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]], result)
2278
+ result = self._values.get("availability_zone_change_protection")
2279
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2048
2280
 
2049
2281
  @builtins.property
2050
- def vpc_id(self) -> builtins.str:
2051
- '''The unique identifier of the VPC where the firewall is in use.
2282
+ def availability_zone_mappings(
2283
+ self,
2284
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]]:
2285
+ '''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.
2052
2286
 
2053
- You can't change the VPC of a firewall after you create the firewall.
2287
+ Each mapping specifies an Availability Zone where the firewall processes traffic.
2054
2288
 
2055
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
2289
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings
2056
2290
  '''
2057
- result = self._values.get("vpc_id")
2058
- assert result is not None, "Required property 'vpc_id' is missing"
2059
- return typing.cast(builtins.str, result)
2291
+ result = self._values.get("availability_zone_mappings")
2292
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]], result)
2060
2293
 
2061
2294
  @builtins.property
2062
2295
  def delete_protection(
@@ -2115,6 +2348,23 @@ class CfnFirewallProps:
2115
2348
  result = self._values.get("subnet_change_protection")
2116
2349
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2117
2350
 
2351
+ @builtins.property
2352
+ def subnet_mappings(
2353
+ self,
2354
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]]:
2355
+ '''The primary public subnets that Network Firewall is using for the firewall.
2356
+
2357
+ Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
2358
+
2359
+ These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
2360
+
2361
+ In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
2362
+
2363
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
2364
+ '''
2365
+ result = self._values.get("subnet_mappings")
2366
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]], result)
2367
+
2118
2368
  @builtins.property
2119
2369
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
2120
2370
  '''An array of key-value pairs to apply to this resource.
@@ -2126,6 +2376,28 @@ class CfnFirewallProps:
2126
2376
  result = self._values.get("tags")
2127
2377
  return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
2128
2378
 
2379
+ @builtins.property
2380
+ def transit_gateway_id(self) -> typing.Optional[builtins.str]:
2381
+ '''The unique identifier of the transit gateway associated with this firewall.
2382
+
2383
+ This field is only present for transit gateway-attached firewalls.
2384
+
2385
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid
2386
+ '''
2387
+ result = self._values.get("transit_gateway_id")
2388
+ return typing.cast(typing.Optional[builtins.str], result)
2389
+
2390
+ @builtins.property
2391
+ def vpc_id(self) -> typing.Optional[builtins.str]:
2392
+ '''The unique identifier of the VPC where the firewall is in use.
2393
+
2394
+ You can't change the VPC of a firewall after you create the firewall.
2395
+
2396
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
2397
+ '''
2398
+ result = self._values.get("vpc_id")
2399
+ return typing.cast(typing.Optional[builtins.str], result)
2400
+
2129
2401
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
2130
2402
  return isinstance(rhs, self.__class__) and rhs._values == self._values
2131
2403
 
@@ -2138,17 +2410,17 @@ class CfnFirewallProps:
2138
2410
  )
2139
2411
 
2140
2412
 
2141
- @jsii.implements(_IInspectable_c2943556)
2413
+ @jsii.implements(_IInspectable_c2943556, _ILoggingConfigurationRef_1588c620)
2142
2414
  class CfnLoggingConfiguration(
2143
2415
  _CfnResource_9df397a6,
2144
2416
  metaclass=jsii.JSIIMeta,
2145
2417
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnLoggingConfiguration",
2146
2418
  ):
2147
- '''Use the ``LoggingConfiguration`` to define the destinations and logging options for an ``Firewall`` .
2419
+ '''Use the logging configuration to define the destinations and logging options for an firewall.
2148
2420
 
2149
2421
  You must change the logging configuration by changing one ``LogDestinationConfig`` setting at a time in your ``LogDestinationConfigs`` .
2150
2422
 
2151
- You can make only one of the following changes to your ``LoggingConfiguration`` resource:
2423
+ You can make only one of the following changes to your logging configuration resource:
2152
2424
 
2153
2425
  - Create a new log destination object by adding a single ``LogDestinationConfig`` array element to ``LogDestinationConfigs`` .
2154
2426
  - Delete a log destination object by removing a single ``LogDestinationConfig`` array element from ``LogDestinationConfigs`` .
@@ -2179,6 +2451,7 @@ class CfnLoggingConfiguration(
2179
2451
  ),
2180
2452
 
2181
2453
  # the properties below are optional
2454
+ enable_monitoring_dashboard=False,
2182
2455
  firewall_name="firewallName"
2183
2456
  )
2184
2457
  '''
@@ -2190,13 +2463,16 @@ class CfnLoggingConfiguration(
2190
2463
  *,
2191
2464
  firewall_arn: builtins.str,
2192
2465
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LoggingConfigurationProperty", typing.Dict[builtins.str, typing.Any]]],
2466
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2193
2467
  firewall_name: typing.Optional[builtins.str] = None,
2194
2468
  ) -> None:
2195
- '''
2469
+ '''Create a new ``AWS::NetworkFirewall::LoggingConfiguration``.
2470
+
2196
2471
  :param scope: Scope in which this resource is defined.
2197
2472
  :param id: Construct identifier for this resource (unique in its scope).
2198
- :param firewall_arn: The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2199
- :param logging_configuration: Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2473
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2474
+ :param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
2475
+ :param enable_monitoring_dashboard:
2200
2476
  :param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2201
2477
  '''
2202
2478
  if __debug__:
@@ -2206,6 +2482,7 @@ class CfnLoggingConfiguration(
2206
2482
  props = CfnLoggingConfigurationProps(
2207
2483
  firewall_arn=firewall_arn,
2208
2484
  logging_configuration=logging_configuration,
2485
+ enable_monitoring_dashboard=enable_monitoring_dashboard,
2209
2486
  firewall_name=firewall_name,
2210
2487
  )
2211
2488
 
@@ -2246,10 +2523,16 @@ class CfnLoggingConfiguration(
2246
2523
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
2247
2524
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
2248
2525
 
2526
+ @builtins.property
2527
+ @jsii.member(jsii_name="loggingConfigurationRef")
2528
+ def logging_configuration_ref(self) -> _LoggingConfigurationReference_f6c32f6c:
2529
+ '''A reference to a LoggingConfiguration resource.'''
2530
+ return typing.cast(_LoggingConfigurationReference_f6c32f6c, jsii.get(self, "loggingConfigurationRef"))
2531
+
2249
2532
  @builtins.property
2250
2533
  @jsii.member(jsii_name="firewallArn")
2251
2534
  def firewall_arn(self) -> builtins.str:
2252
- '''The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with.'''
2535
+ '''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.'''
2253
2536
  return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
2254
2537
 
2255
2538
  @firewall_arn.setter
@@ -2264,7 +2547,7 @@ class CfnLoggingConfiguration(
2264
2547
  def logging_configuration(
2265
2548
  self,
2266
2549
  ) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"]:
2267
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .'''
2550
+ '''Defines how AWS Network Firewall performs logging for a firewall.'''
2268
2551
  return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"], jsii.get(self, "loggingConfiguration"))
2269
2552
 
2270
2553
  @logging_configuration.setter
@@ -2277,6 +2560,23 @@ class CfnLoggingConfiguration(
2277
2560
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2278
2561
  jsii.set(self, "loggingConfiguration", value) # pyright: ignore[reportArgumentType]
2279
2562
 
2563
+ @builtins.property
2564
+ @jsii.member(jsii_name="enableMonitoringDashboard")
2565
+ def enable_monitoring_dashboard(
2566
+ self,
2567
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2568
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "enableMonitoringDashboard"))
2569
+
2570
+ @enable_monitoring_dashboard.setter
2571
+ def enable_monitoring_dashboard(
2572
+ self,
2573
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
2574
+ ) -> None:
2575
+ if __debug__:
2576
+ type_hints = typing.get_type_hints(_typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe)
2577
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2578
+ jsii.set(self, "enableMonitoringDashboard", value) # pyright: ignore[reportArgumentType]
2579
+
2280
2580
  @builtins.property
2281
2581
  @jsii.member(jsii_name="firewallName")
2282
2582
  def firewall_name(self) -> typing.Optional[builtins.str]:
@@ -2309,7 +2609,7 @@ class CfnLoggingConfiguration(
2309
2609
  ) -> None:
2310
2610
  '''Defines where AWS Network Firewall sends logs for the firewall for one log type.
2311
2611
 
2312
- This is used in ``LoggingConfiguration`` . You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
2612
+ This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
2313
2613
 
2314
2614
  Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to ``DROP`` or ``ALERT`` .
2315
2615
 
@@ -2421,7 +2721,7 @@ class CfnLoggingConfiguration(
2421
2721
  *,
2422
2722
  log_destination_configs: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LogDestinationConfigProperty", typing.Dict[builtins.str, typing.Any]]]]],
2423
2723
  ) -> None:
2424
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2724
+ '''Defines how AWS Network Firewall performs logging for a firewall.
2425
2725
 
2426
2726
  :param log_destination_configs: Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
2427
2727
 
@@ -2483,6 +2783,7 @@ class CfnLoggingConfiguration(
2483
2783
  name_mapping={
2484
2784
  "firewall_arn": "firewallArn",
2485
2785
  "logging_configuration": "loggingConfiguration",
2786
+ "enable_monitoring_dashboard": "enableMonitoringDashboard",
2486
2787
  "firewall_name": "firewallName",
2487
2788
  },
2488
2789
  )
@@ -2492,12 +2793,14 @@ class CfnLoggingConfigurationProps:
2492
2793
  *,
2493
2794
  firewall_arn: builtins.str,
2494
2795
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
2796
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2495
2797
  firewall_name: typing.Optional[builtins.str] = None,
2496
2798
  ) -> None:
2497
2799
  '''Properties for defining a ``CfnLoggingConfiguration``.
2498
2800
 
2499
- :param firewall_arn: The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2500
- :param logging_configuration: Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2801
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2802
+ :param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
2803
+ :param enable_monitoring_dashboard:
2501
2804
  :param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2502
2805
 
2503
2806
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html
@@ -2522,6 +2825,7 @@ class CfnLoggingConfigurationProps:
2522
2825
  ),
2523
2826
 
2524
2827
  # the properties below are optional
2828
+ enable_monitoring_dashboard=False,
2525
2829
  firewall_name="firewallName"
2526
2830
  )
2527
2831
  '''
@@ -2529,17 +2833,20 @@ class CfnLoggingConfigurationProps:
2529
2833
  type_hints = typing.get_type_hints(_typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d62178ab9369)
2530
2834
  check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
2531
2835
  check_type(argname="argument logging_configuration", value=logging_configuration, expected_type=type_hints["logging_configuration"])
2836
+ check_type(argname="argument enable_monitoring_dashboard", value=enable_monitoring_dashboard, expected_type=type_hints["enable_monitoring_dashboard"])
2532
2837
  check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
2533
2838
  self._values: typing.Dict[builtins.str, typing.Any] = {
2534
2839
  "firewall_arn": firewall_arn,
2535
2840
  "logging_configuration": logging_configuration,
2536
2841
  }
2842
+ if enable_monitoring_dashboard is not None:
2843
+ self._values["enable_monitoring_dashboard"] = enable_monitoring_dashboard
2537
2844
  if firewall_name is not None:
2538
2845
  self._values["firewall_name"] = firewall_name
2539
2846
 
2540
2847
  @builtins.property
2541
2848
  def firewall_arn(self) -> builtins.str:
2542
- '''The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with.
2849
+ '''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.
2543
2850
 
2544
2851
  You can't change the firewall specification after you create the logging configuration.
2545
2852
 
@@ -2553,7 +2860,7 @@ class CfnLoggingConfigurationProps:
2553
2860
  def logging_configuration(
2554
2861
  self,
2555
2862
  ) -> typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty]:
2556
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2863
+ '''Defines how AWS Network Firewall performs logging for a firewall.
2557
2864
 
2558
2865
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration
2559
2866
  '''
@@ -2561,6 +2868,16 @@ class CfnLoggingConfigurationProps:
2561
2868
  assert result is not None, "Required property 'logging_configuration' is missing"
2562
2869
  return typing.cast(typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty], result)
2563
2870
 
2871
+ @builtins.property
2872
+ def enable_monitoring_dashboard(
2873
+ self,
2874
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2875
+ '''
2876
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-enablemonitoringdashboard
2877
+ '''
2878
+ result = self._values.get("enable_monitoring_dashboard")
2879
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2880
+
2564
2881
  @builtins.property
2565
2882
  def firewall_name(self) -> typing.Optional[builtins.str]:
2566
2883
  '''The name of the firewall that the logging configuration is associated with.
@@ -2584,15 +2901,13 @@ class CfnLoggingConfigurationProps:
2584
2901
  )
2585
2902
 
2586
2903
 
2587
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
2904
+ @jsii.implements(_IInspectable_c2943556, _IRuleGroupRef_f1ee71d3, _ITaggable_36806126)
2588
2905
  class CfnRuleGroup(
2589
2906
  _CfnResource_9df397a6,
2590
2907
  metaclass=jsii.JSIIMeta,
2591
2908
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup",
2592
2909
  ):
2593
- '''Use the ``RuleGroup`` to define a reusable collection of stateless or stateful network traffic filtering rules.
2594
-
2595
- You use rule groups in an ``FirewallPolicy`` to specify the filtering behavior of an ``Firewall`` .
2910
+ '''Use the ` <https://docs.aws.amazon.com/RuleGroup>`_ to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
2596
2911
 
2597
2912
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
2598
2913
  :cloudformationResource: AWS::NetworkFirewall::RuleGroup
@@ -2705,6 +3020,9 @@ class CfnRuleGroup(
2705
3020
  rule_order="ruleOrder"
2706
3021
  )
2707
3022
  ),
3023
+ summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
3024
+ rule_options=["ruleOptions"]
3025
+ ),
2708
3026
  tags=[CfnTag(
2709
3027
  key="key",
2710
3028
  value="value"
@@ -2722,9 +3040,11 @@ class CfnRuleGroup(
2722
3040
  type: builtins.str,
2723
3041
  description: typing.Optional[builtins.str] = None,
2724
3042
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.RuleGroupProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
3043
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.SummaryConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
2725
3044
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
2726
3045
  ) -> None:
2727
- '''
3046
+ '''Create a new ``AWS::NetworkFirewall::RuleGroup``.
3047
+
2728
3048
  :param scope: Scope in which this resource is defined.
2729
3049
  :param id: Construct identifier for this resource (unique in its scope).
2730
3050
  :param capacity: The maximum operating resources that this rule group can use. You can't change a rule group's capacity setting after you create the rule group. When you update a rule group, you are limited to this capacity. When you reference a rule group from a firewall policy, Network Firewall reserves this capacity for the rule group.
@@ -2732,6 +3052,7 @@ class CfnRuleGroup(
2732
3052
  :param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
2733
3053
  :param description: A description of the rule group.
2734
3054
  :param rule_group: An object that defines the rule group rules.
3055
+ :param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
2735
3056
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
2736
3057
  '''
2737
3058
  if __debug__:
@@ -2744,6 +3065,7 @@ class CfnRuleGroup(
2744
3065
  type=type,
2745
3066
  description=description,
2746
3067
  rule_group=rule_group,
3068
+ summary_configuration=summary_configuration,
2747
3069
  tags=tags,
2748
3070
  )
2749
3071
 
@@ -2782,7 +3104,7 @@ class CfnRuleGroup(
2782
3104
  @builtins.property
2783
3105
  @jsii.member(jsii_name="attrRuleGroupArn")
2784
3106
  def attr_rule_group_arn(self) -> builtins.str:
2785
- '''The Amazon Resource Name (ARN) of the ``RuleGroup`` .
3107
+ '''The Amazon Resource Name (ARN) of the rule group.
2786
3108
 
2787
3109
  :cloudformationAttribute: RuleGroupArn
2788
3110
  '''
@@ -2791,7 +3113,7 @@ class CfnRuleGroup(
2791
3113
  @builtins.property
2792
3114
  @jsii.member(jsii_name="attrRuleGroupId")
2793
3115
  def attr_rule_group_id(self) -> builtins.str:
2794
- '''The unique ID of the ``RuleGroup`` resource.
3116
+ '''The unique ID of the rule group resource.
2795
3117
 
2796
3118
  :cloudformationAttribute: RuleGroupId
2797
3119
  '''
@@ -2802,6 +3124,12 @@ class CfnRuleGroup(
2802
3124
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
2803
3125
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
2804
3126
 
3127
+ @builtins.property
3128
+ @jsii.member(jsii_name="ruleGroupRef")
3129
+ def rule_group_ref(self) -> _RuleGroupReference_b514c132:
3130
+ '''A reference to a RuleGroup resource.'''
3131
+ return typing.cast(_RuleGroupReference_b514c132, jsii.get(self, "ruleGroupRef"))
3132
+
2805
3133
  @builtins.property
2806
3134
  @jsii.member(jsii_name="tags")
2807
3135
  def tags(self) -> _TagManager_0a598cb3:
@@ -2878,6 +3206,24 @@ class CfnRuleGroup(
2878
3206
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2879
3207
  jsii.set(self, "ruleGroup", value) # pyright: ignore[reportArgumentType]
2880
3208
 
3209
+ @builtins.property
3210
+ @jsii.member(jsii_name="summaryConfiguration")
3211
+ def summary_configuration(
3212
+ self,
3213
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]]:
3214
+ '''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .'''
3215
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]], jsii.get(self, "summaryConfiguration"))
3216
+
3217
+ @summary_configuration.setter
3218
+ def summary_configuration(
3219
+ self,
3220
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]],
3221
+ ) -> None:
3222
+ if __debug__:
3223
+ type_hints = typing.get_type_hints(_typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0)
3224
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
3225
+ jsii.set(self, "summaryConfiguration", value) # pyright: ignore[reportArgumentType]
3226
+
2881
3227
  @builtins.property
2882
3228
  @jsii.member(jsii_name="tagsRaw")
2883
3229
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -2965,7 +3311,7 @@ class CfnRuleGroup(
2965
3311
  def __init__(self, *, address_definition: builtins.str) -> None:
2966
3312
  '''A single IP address specification.
2967
3313
 
2968
- This is used in the ``RuleGroup.MatchAttributes`` source and destination specifications.
3314
+ This is used in the match attributes source and destination specifications.
2969
3315
 
2970
3316
  :param address_definition: Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. Examples: - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify ``192.0.2.44/32`` . - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify ``192.0.2.0/24`` . - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify ``1111:0000:0000:0000:0000:0000:0000:0111/128`` . - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify ``1111:0000:0000:0000:0000:0000:0000:0000/64`` . For more information about CIDR notation, see the Wikipedia entry `Classless Inter-Domain Routing <https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing>`_ .
2971
3317
 
@@ -3044,8 +3390,8 @@ class CfnRuleGroup(
3044
3390
 
3045
3391
  You can use custom actions in the following places:
3046
3392
 
3047
- - In an ``RuleGroup.StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
3048
- - In an ``FirewallPolicy`` specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
3393
+ - In a ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
3394
+ - In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
3049
3395
 
3050
3396
  :param action_definition: The custom action associated with the action name.
3051
3397
  :param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
@@ -3359,7 +3705,7 @@ class CfnRuleGroup(
3359
3705
  ) -> None:
3360
3706
  '''A list of IP addresses and address ranges, in CIDR notation.
3361
3707
 
3362
- This is part of a ``RuleGroup.RuleVariables`` .
3708
+ This is part of a ``RuleVariables`` .
3363
3709
 
3364
3710
  :param definition: The list of IP addresses and address ranges, in CIDR notation.
3365
3711
 
@@ -3414,11 +3760,11 @@ class CfnRuleGroup(
3414
3760
  *,
3415
3761
  reference_arn: typing.Optional[builtins.str] = None,
3416
3762
  ) -> None:
3417
- '''Configures one or more ``IPSetReferences`` for a Suricata-compatible rule group.
3763
+ '''Configures one or more IP set references for a Suricata-compatible rule group.
3418
3764
 
3419
3765
  An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see `Using IP set references <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall Developer Guide* .
3420
3766
 
3421
- :param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the ``RuleGroup.IPSetReference`` .
3767
+ :param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
3422
3768
 
3423
3769
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html
3424
3770
  :exampleMetadata: fixture=_generated
@@ -3442,7 +3788,7 @@ class CfnRuleGroup(
3442
3788
 
3443
3789
  @builtins.property
3444
3790
  def reference_arn(self) -> typing.Optional[builtins.str]:
3445
- '''The Amazon Resource Name (ARN) of the resource to include in the ``RuleGroup.IPSetReference`` .
3791
+ '''The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
3446
3792
 
3447
3793
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn
3448
3794
  '''
@@ -3653,7 +3999,7 @@ class CfnRuleGroup(
3653
3999
  def __init__(self, *, from_port: jsii.Number, to_port: jsii.Number) -> None:
3654
4000
  '''A single port range specification.
3655
4001
 
3656
- This is used for source and destination port ranges in the stateless ``RuleGroup.MatchAttributes`` .
4002
+ This is used for source and destination port ranges in the stateless match attributes.
3657
4003
 
3658
4004
  :param from_port: The lower limit of the port range. This must be less than or equal to the ``ToPort`` specification.
3659
4005
  :param to_port: The upper limit of the port range. This must be greater than or equal to the ``FromPort`` specification.
@@ -3843,7 +4189,7 @@ class CfnRuleGroup(
3843
4189
  *,
3844
4190
  ip_set_references: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetReferenceProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
3845
4191
  ) -> None:
3846
- '''Configures the ``ReferenceSets`` for a stateful rule group.
4192
+ '''Configures the reference sets for a stateful rule group.
3847
4193
 
3848
4194
  For more information, see the `Using IP set references in Suricata compatible rule groups <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall User Guide* .
3849
4195
 
@@ -3911,7 +4257,7 @@ class CfnRuleGroup(
3911
4257
 
3912
4258
  AWS Network Firewall inspects each packet for the specified matching criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on the packet.
3913
4259
 
3914
- :param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the ``FirewallPolicy`` . For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
4260
+ :param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy. For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
3915
4261
  :param match_attributes: Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection. Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags.
3916
4262
 
3917
4263
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ruledefinition.html
@@ -3966,7 +4312,7 @@ class CfnRuleGroup(
3966
4312
  You must specify a standard action and you can add custom actions.
3967
4313
  .. epigraph::
3968
4314
 
3969
- Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the ``FirewallPolicy`` .
4315
+ Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy.
3970
4316
 
3971
4317
  For every rule, you must specify exactly one of the following standard actions.
3972
4318
 
@@ -4308,7 +4654,7 @@ class CfnRuleGroup(
4308
4654
  ip_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4309
4655
  port_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.PortSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4310
4656
  ) -> None:
4311
- '''Settings that are available for use in the rules in the ``RuleGroup`` where this is defined.
4657
+ '''Settings that are available for use in the rules in the rule group where this is defined.
4312
4658
 
4313
4659
  :param ip_sets: A list of IP addresses and address ranges, in CIDR notation.
4314
4660
  :param port_sets: A list of port ranges.
@@ -4399,9 +4745,9 @@ class CfnRuleGroup(
4399
4745
 
4400
4746
  For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
4401
4747
 
4402
- By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleGroup.RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
4748
+ By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
4403
4749
 
4404
- :param generated_rules_type: Whether you want to allow or deny access to the domains in your target list.
4750
+ :param generated_rules_type: Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list. .. epigraph:: When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
4405
4751
  :param targets: The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:. - Explicit names. For example, ``abc.example.com`` matches only the domain ``abc.example.com`` . - Names that use a domain wildcard, which you indicate with an initial ' ``.`` '. For example, ``.example.com`` matches ``example.com`` and matches all subdomains of ``example.com`` , such as ``abc.example.com`` and ``www.example.com`` .
4406
4752
  :param target_types: The types of targets to inspect for. Valid values are ``TLS_SNI`` and ``HTTP_HOST`` .
4407
4753
 
@@ -4433,7 +4779,11 @@ class CfnRuleGroup(
4433
4779
 
4434
4780
  @builtins.property
4435
4781
  def generated_rules_type(self) -> builtins.str:
4436
- '''Whether you want to allow or deny access to the domains in your target list.
4782
+ '''Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
4783
+
4784
+ .. epigraph::
4785
+
4786
+ When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
4437
4787
 
4438
4788
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html#cfn-networkfirewall-rulegroup-rulessourcelist-generatedrulestype
4439
4789
  '''
@@ -4501,7 +4851,7 @@ class CfnRuleGroup(
4501
4851
  Each rule group requires a single ``RulesSource`` . You can use an instance of this for either stateless rules or stateful rules.
4502
4852
 
4503
4853
  :param rules_source_list: Stateful inspection criteria for a domain list rule group.
4504
- :param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in ``StatefulRuleOptions`` is set to ``STRICT_ORDER`` .
4854
+ :param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
4505
4855
  :param stateful_rules: An array of individual stateful rules inspection criteria to be used together in a stateful rule group. Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
4506
4856
  :param stateless_rules_and_custom_actions: Stateless inspection criteria to be used in a stateless rule group.
4507
4857
 
@@ -4619,7 +4969,7 @@ class CfnRuleGroup(
4619
4969
  These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
4620
4970
  .. epigraph::
4621
4971
 
4622
- You can't use the ``priority`` keyword if the ``RuleOrder`` option in ``StatefulRuleOptions`` is set to ``STRICT_ORDER`` .
4972
+ You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
4623
4973
 
4624
4974
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring
4625
4975
  '''
@@ -4737,7 +5087,7 @@ class CfnRuleGroup(
4737
5087
 
4738
5088
  Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
4739
5089
 
4740
- :param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
5090
+ :param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration. ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
4741
5091
  :param header: The stateful inspection criteria for this rule, used to inspect traffic flows.
4742
5092
  :param rule_options: Additional settings for a stateful rule, provided as keywords and settings.
4743
5093
 
@@ -4788,13 +5138,13 @@ class CfnRuleGroup(
4788
5138
  The actions for a stateful rule are defined as follows:
4789
5139
 
4790
5140
  - *PASS* - Permits the packets to go to the intended destination.
4791
- - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5141
+ - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
4792
5142
  - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic.
4793
- - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5143
+ - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
4794
5144
 
4795
5145
  You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` .
4796
5146
 
4797
- - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5147
+ - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
4798
5148
 
4799
5149
  ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
4800
5150
 
@@ -4853,7 +5203,7 @@ class CfnRuleGroup(
4853
5203
  ) -> None:
4854
5204
  '''A single stateless rule.
4855
5205
 
4856
- This is used in ``RuleGroup.StatelessRulesAndCustomActions`` .
5206
+ This is used in ``StatelessRulesAndCustomActions`` .
4857
5207
 
4858
5208
  :param priority: Indicates the order in which to run this rule relative to all of the rules that are defined for a stateless rule group. Network Firewall evaluates the rules in a rule group starting with the lowest priority setting. You must ensure that the priority settings are unique for the rule group. Each stateless rule group uses exactly one ``StatelessRulesAndCustomActions`` object, and each ``StatelessRulesAndCustomActions`` contains exactly one ``StatelessRules`` object. To ensure unique priority settings for your rule groups, set unique priorities for the stateless rules that you define inside any single ``StatelessRules`` object. You can change the priority settings of your rules at any time. To make it easier to insert rules later, number them so there's a wide range in between, for example use 100, 200, and so on.
4859
5209
  :param rule_definition: Defines the stateless 5-tuple packet inspection criteria and the action to take on a packet that matches the criteria.
@@ -4965,7 +5315,7 @@ class CfnRuleGroup(
4965
5315
  Each stateless rule group uses exactly one of these data types to define its stateless rules.
4966
5316
 
4967
5317
  :param stateless_rules: Defines the set of stateless rules for use in a stateless rule group.
4968
- :param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule ``RuleGroup.RuleDefinition`` ``Actions`` specification.
5318
+ :param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
4969
5319
 
4970
5320
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html
4971
5321
  :exampleMetadata: fixture=_generated
@@ -5048,7 +5398,7 @@ class CfnRuleGroup(
5048
5398
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.CustomActionProperty"]]]]:
5049
5399
  '''Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification.
5050
5400
 
5051
- You name each custom action that you define, and then you can use it by name in your stateless rule ``RuleGroup.RuleDefinition`` ``Actions`` specification.
5401
+ You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
5052
5402
 
5053
5403
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions
5054
5404
  '''
@@ -5067,27 +5417,25 @@ class CfnRuleGroup(
5067
5417
  )
5068
5418
 
5069
5419
  @jsii.data_type(
5070
- jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.TCPFlagFieldProperty",
5420
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.SummaryConfigurationProperty",
5071
5421
  jsii_struct_bases=[],
5072
- name_mapping={"flags": "flags", "masks": "masks"},
5422
+ name_mapping={"rule_options": "ruleOptions"},
5073
5423
  )
5074
- class TCPFlagFieldProperty:
5424
+ class SummaryConfigurationProperty:
5075
5425
  def __init__(
5076
5426
  self,
5077
5427
  *,
5078
- flags: typing.Sequence[builtins.str],
5079
- masks: typing.Optional[typing.Sequence[builtins.str]] = None,
5428
+ rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
5080
5429
  ) -> None:
5081
- '''TCP flags and masks to inspect packets for. This is used in the ``RuleGroup.MatchAttributes`` specification.
5430
+ '''A complex type that specifies which Suricata rule metadata fields to use when displaying threat information. Contains:.
5082
5431
 
5083
- For example:
5432
+ - ``RuleOptions`` - The Suricata rule options fields to extract and display
5084
5433
 
5085
- ``"TCPFlags": [ { "Flags": [ "ECE", "SYN" ], "Masks": [ "SYN", "ECE" ] } ]``
5434
+ These settings affect how threat information appears in both the console and API responses. Summaries are available for rule groups you manage and for active threat defense AWS managed rule groups.
5086
5435
 
5087
- :param flags: Used in conjunction with the ``Masks`` setting to define the flags that must be set and flags that must not be set in order for the packet to match. This setting can only specify values that are also specified in the ``Masks`` setting. For the flags that are specified in the masks setting, the following must be true for the packet to match: - The ones that are set in this flags setting must be set in the packet. - The ones that are not set in this flags setting must also not be set in the packet.
5088
- :param masks: The set of flags to consider in the inspection. To inspect all flags in the valid values list, leave this with no setting.
5436
+ :param rule_options: Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
5089
5437
 
5090
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-tcpflagfield.html
5438
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html
5091
5439
  :exampleMetadata: fixture=_generated
5092
5440
 
5093
5441
  Example::
@@ -5096,7 +5444,68 @@ class CfnRuleGroup(
5096
5444
  # The values are placeholders you should change.
5097
5445
  from aws_cdk import aws_networkfirewall as networkfirewall
5098
5446
 
5099
- t_cPFlag_field_property = networkfirewall.CfnRuleGroup.TCPFlagFieldProperty(
5447
+ summary_configuration_property = networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
5448
+ rule_options=["ruleOptions"]
5449
+ )
5450
+ '''
5451
+ if __debug__:
5452
+ type_hints = typing.get_type_hints(_typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307)
5453
+ check_type(argname="argument rule_options", value=rule_options, expected_type=type_hints["rule_options"])
5454
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
5455
+ if rule_options is not None:
5456
+ self._values["rule_options"] = rule_options
5457
+
5458
+ @builtins.property
5459
+ def rule_options(self) -> typing.Optional[typing.List[builtins.str]]:
5460
+ '''Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
5461
+
5462
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html#cfn-networkfirewall-rulegroup-summaryconfiguration-ruleoptions
5463
+ '''
5464
+ result = self._values.get("rule_options")
5465
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
5466
+
5467
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
5468
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
5469
+
5470
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
5471
+ return not (rhs == self)
5472
+
5473
+ def __repr__(self) -> str:
5474
+ return "SummaryConfigurationProperty(%s)" % ", ".join(
5475
+ k + "=" + repr(v) for k, v in self._values.items()
5476
+ )
5477
+
5478
+ @jsii.data_type(
5479
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.TCPFlagFieldProperty",
5480
+ jsii_struct_bases=[],
5481
+ name_mapping={"flags": "flags", "masks": "masks"},
5482
+ )
5483
+ class TCPFlagFieldProperty:
5484
+ def __init__(
5485
+ self,
5486
+ *,
5487
+ flags: typing.Sequence[builtins.str],
5488
+ masks: typing.Optional[typing.Sequence[builtins.str]] = None,
5489
+ ) -> None:
5490
+ '''TCP flags and masks to inspect packets for. This is used in the match attributes specification.
5491
+
5492
+ For example:
5493
+
5494
+ ``"TCPFlags": [ { "Flags": [ "ECE", "SYN" ], "Masks": [ "SYN", "ECE" ] } ]``
5495
+
5496
+ :param flags: Used in conjunction with the ``Masks`` setting to define the flags that must be set and flags that must not be set in order for the packet to match. This setting can only specify values that are also specified in the ``Masks`` setting. For the flags that are specified in the masks setting, the following must be true for the packet to match: - The ones that are set in this flags setting must be set in the packet. - The ones that are not set in this flags setting must also not be set in the packet.
5497
+ :param masks: The set of flags to consider in the inspection. To inspect all flags in the valid values list, leave this with no setting.
5498
+
5499
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-tcpflagfield.html
5500
+ :exampleMetadata: fixture=_generated
5501
+
5502
+ Example::
5503
+
5504
+ # The code below shows an example of how to instantiate this type.
5505
+ # The values are placeholders you should change.
5506
+ from aws_cdk import aws_networkfirewall as networkfirewall
5507
+
5508
+ t_cPFlag_field_property = networkfirewall.CfnRuleGroup.TCPFlagFieldProperty(
5100
5509
  flags=["flags"],
5101
5510
 
5102
5511
  # the properties below are optional
@@ -5162,6 +5571,7 @@ class CfnRuleGroup(
5162
5571
  "type": "type",
5163
5572
  "description": "description",
5164
5573
  "rule_group": "ruleGroup",
5574
+ "summary_configuration": "summaryConfiguration",
5165
5575
  "tags": "tags",
5166
5576
  },
5167
5577
  )
@@ -5174,6 +5584,7 @@ class CfnRuleGroupProps:
5174
5584
  type: builtins.str,
5175
5585
  description: typing.Optional[builtins.str] = None,
5176
5586
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5587
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5177
5588
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5178
5589
  ) -> None:
5179
5590
  '''Properties for defining a ``CfnRuleGroup``.
@@ -5183,6 +5594,7 @@ class CfnRuleGroupProps:
5183
5594
  :param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
5184
5595
  :param description: A description of the rule group.
5185
5596
  :param rule_group: An object that defines the rule group rules.
5597
+ :param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
5186
5598
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
5187
5599
 
5188
5600
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
@@ -5295,6 +5707,9 @@ class CfnRuleGroupProps:
5295
5707
  rule_order="ruleOrder"
5296
5708
  )
5297
5709
  ),
5710
+ summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
5711
+ rule_options=["ruleOptions"]
5712
+ ),
5298
5713
  tags=[CfnTag(
5299
5714
  key="key",
5300
5715
  value="value"
@@ -5308,6 +5723,7 @@ class CfnRuleGroupProps:
5308
5723
  check_type(argname="argument type", value=type, expected_type=type_hints["type"])
5309
5724
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
5310
5725
  check_type(argname="argument rule_group", value=rule_group, expected_type=type_hints["rule_group"])
5726
+ check_type(argname="argument summary_configuration", value=summary_configuration, expected_type=type_hints["summary_configuration"])
5311
5727
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
5312
5728
  self._values: typing.Dict[builtins.str, typing.Any] = {
5313
5729
  "capacity": capacity,
@@ -5318,6 +5734,8 @@ class CfnRuleGroupProps:
5318
5734
  self._values["description"] = description
5319
5735
  if rule_group is not None:
5320
5736
  self._values["rule_group"] = rule_group
5737
+ if summary_configuration is not None:
5738
+ self._values["summary_configuration"] = summary_configuration
5321
5739
  if tags is not None:
5322
5740
  self._values["tags"] = tags
5323
5741
 
@@ -5378,6 +5796,20 @@ class CfnRuleGroupProps:
5378
5796
  result = self._values.get("rule_group")
5379
5797
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.RuleGroupProperty]], result)
5380
5798
 
5799
+ @builtins.property
5800
+ def summary_configuration(
5801
+ self,
5802
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]]:
5803
+ '''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .
5804
+
5805
+ - The ``RuleOptions`` specified in ``SummaryConfiguration``
5806
+ - Rule metadata organization preferences
5807
+
5808
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration
5809
+ '''
5810
+ result = self._values.get("summary_configuration")
5811
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]], result)
5812
+
5381
5813
  @builtins.property
5382
5814
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
5383
5815
  '''An array of key-value pairs to apply to this resource.
@@ -5401,7 +5833,7 @@ class CfnRuleGroupProps:
5401
5833
  )
5402
5834
 
5403
5835
 
5404
- @jsii.implements(_IInspectable_c2943556, _ITaggableV2_4e6798f8)
5836
+ @jsii.implements(_IInspectable_c2943556, _ITLSInspectionConfigurationRef_6d0a6d9c, _ITaggableV2_4e6798f8)
5405
5837
  class CfnTLSInspectionConfiguration(
5406
5838
  _CfnResource_9df397a6,
5407
5839
  metaclass=jsii.JSIIMeta,
@@ -5474,10 +5906,11 @@ class CfnTLSInspectionConfiguration(
5474
5906
  description: typing.Optional[builtins.str] = None,
5475
5907
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5476
5908
  ) -> None:
5477
- '''
5909
+ '''Create a new ``AWS::NetworkFirewall::TLSInspectionConfiguration``.
5910
+
5478
5911
  :param scope: Scope in which this resource is defined.
5479
5912
  :param id: Construct identifier for this resource (unique in its scope).
5480
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
5913
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
5481
5914
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
5482
5915
  :param description: A description of the TLS inspection configuration.
5483
5916
  :param tags: The key:value pairs to associate with the resource.
@@ -5556,6 +5989,14 @@ class CfnTLSInspectionConfiguration(
5556
5989
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
5557
5990
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
5558
5991
 
5992
+ @builtins.property
5993
+ @jsii.member(jsii_name="tlsInspectionConfigurationRef")
5994
+ def tls_inspection_configuration_ref(
5995
+ self,
5996
+ ) -> _TLSInspectionConfigurationReference_52bd7dd3:
5997
+ '''A reference to a TLSInspectionConfiguration resource.'''
5998
+ return typing.cast(_TLSInspectionConfigurationReference_52bd7dd3, jsii.get(self, "tlsInspectionConfigurationRef"))
5999
+
5559
6000
  @builtins.property
5560
6001
  @jsii.member(jsii_name="tlsInspectionConfiguration")
5561
6002
  def tls_inspection_configuration(
@@ -5695,7 +6136,7 @@ class CfnTLSInspectionConfiguration(
5695
6136
  ) -> None:
5696
6137
  '''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
5697
6138
 
5698
- If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6139
+ If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5699
6140
 
5700
6141
  :param revoked_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
5701
6142
  :param unknown_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
@@ -5852,14 +6293,14 @@ class CfnTLSInspectionConfiguration(
5852
6293
  scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
5853
6294
  server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
5854
6295
  ) -> None:
5855
- '''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
6296
+ '''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
5856
6297
 
5857
6298
  .. epigraph::
5858
6299
 
5859
- If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
6300
+ If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
5860
6301
 
5861
- :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
5862
- :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6302
+ :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
6303
+ :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5863
6304
  :param scopes: A list of scopes.
5864
6305
  :param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
5865
6306
 
@@ -5918,16 +6359,16 @@ class CfnTLSInspectionConfiguration(
5918
6359
 
5919
6360
  @builtins.property
5920
6361
  def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
5921
- '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
6362
+ '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
5922
6363
 
5923
6364
  The following limitations apply:
5924
6365
 
5925
6366
  - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
5926
6367
  - You can't use certificates issued by AWS Private Certificate Authority .
5927
6368
 
5928
- For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
6369
+ For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
5929
6370
 
5930
- For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
6371
+ For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
5931
6372
 
5932
6373
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
5933
6374
  '''
@@ -5940,7 +6381,7 @@ class CfnTLSInspectionConfiguration(
5940
6381
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.CheckCertificateRevocationStatusProperty"]]:
5941
6382
  '''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
5942
6383
 
5943
- If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6384
+ If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5944
6385
 
5945
6386
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-checkcertificaterevocationstatus
5946
6387
  '''
@@ -5991,9 +6432,9 @@ class CfnTLSInspectionConfiguration(
5991
6432
  *,
5992
6433
  resource_arn: typing.Optional[builtins.str] = None,
5993
6434
  ) -> None:
5994
- '''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in AWS Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
6435
+ '''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
5995
6436
 
5996
- :param resource_arn: The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6437
+ :param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
5997
6438
 
5998
6439
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
5999
6440
  :exampleMetadata: fixture=_generated
@@ -6017,7 +6458,7 @@ class CfnTLSInspectionConfiguration(
6017
6458
 
6018
6459
  @builtins.property
6019
6460
  def resource_arn(self) -> typing.Optional[builtins.str]:
6020
- '''The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6461
+ '''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6021
6462
 
6022
6463
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
6023
6464
  '''
@@ -6305,7 +6746,7 @@ class CfnTLSInspectionConfigurationProps:
6305
6746
  ) -> None:
6306
6747
  '''Properties for defining a ``CfnTLSInspectionConfiguration``.
6307
6748
 
6308
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6749
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6309
6750
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
6310
6751
  :param description: A description of the TLS inspection configuration.
6311
6752
  :param tags: The key:value pairs to associate with the resource.
@@ -6380,7 +6821,7 @@ class CfnTLSInspectionConfigurationProps:
6380
6821
  ) -> typing.Union[_IResolvable_da3f097b, CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty]:
6381
6822
  '''The object that defines a TLS inspection configuration.
6382
6823
 
6383
- AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6824
+ AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6384
6825
 
6385
6826
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
6386
6827
  '''
@@ -6430,6 +6871,453 @@ class CfnTLSInspectionConfigurationProps:
6430
6871
  )
6431
6872
 
6432
6873
 
6874
+ @jsii.implements(_IInspectable_c2943556, _IVpcEndpointAssociationRef_bd0818d9, _ITaggableV2_4e6798f8)
6875
+ class CfnVpcEndpointAssociation(
6876
+ _CfnResource_9df397a6,
6877
+ metaclass=jsii.JSIIMeta,
6878
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation",
6879
+ ):
6880
+ '''A VPC endpoint association defines a single subnet to use for a firewall endpoint for a ``Firewall`` .
6881
+
6882
+ You can define VPC endpoint associations only in the Availability Zones that already have a subnet mapping defined in the ``Firewall`` resource.
6883
+ .. epigraph::
6884
+
6885
+ You can retrieve the list of Availability Zones that are available for use by calling ``DescribeFirewallMetadata`` .
6886
+
6887
+ To manage firewall endpoints, first, in the ``Firewall`` specification, you specify a single VPC and one subnet for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as VPC endpoint associations.
6888
+
6889
+ You can use VPC endpoint associations to expand the protections of the firewall as follows:
6890
+
6891
+ - *Protect multiple VPCs with a single firewall* - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the ``Firewall`` subnet mappings.
6892
+ - *Define multiple firewall endpoints for a VPC in an Availability Zone* - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the ``Firewall`` subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.
6893
+
6894
+ You can use AWS Resource Access Manager to share a ``Firewall`` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see ``PutResourcePolicy`` in this guide and see `Sharing Network Firewall resources <https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html>`_ in the *AWS Network Firewall Developer Guide* .
6895
+
6896
+ The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling ``DescribeVpcEndpointAssociation`` .
6897
+
6898
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
6899
+ :cloudformationResource: AWS::NetworkFirewall::VpcEndpointAssociation
6900
+ :exampleMetadata: fixture=_generated
6901
+
6902
+ Example::
6903
+
6904
+ # The code below shows an example of how to instantiate this type.
6905
+ # The values are placeholders you should change.
6906
+ from aws_cdk import aws_networkfirewall as networkfirewall
6907
+
6908
+ cfn_vpc_endpoint_association = networkfirewall.CfnVpcEndpointAssociation(self, "MyCfnVpcEndpointAssociation",
6909
+ firewall_arn="firewallArn",
6910
+ subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
6911
+ subnet_id="subnetId",
6912
+
6913
+ # the properties below are optional
6914
+ ip_address_type="ipAddressType"
6915
+ ),
6916
+ vpc_id="vpcId",
6917
+
6918
+ # the properties below are optional
6919
+ description="description",
6920
+ tags=[CfnTag(
6921
+ key="key",
6922
+ value="value"
6923
+ )]
6924
+ )
6925
+ '''
6926
+
6927
+ def __init__(
6928
+ self,
6929
+ scope: _constructs_77d1e7e8.Construct,
6930
+ id: builtins.str,
6931
+ *,
6932
+ firewall_arn: builtins.str,
6933
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union["CfnVpcEndpointAssociation.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]],
6934
+ vpc_id: builtins.str,
6935
+ description: typing.Optional[builtins.str] = None,
6936
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6937
+ ) -> None:
6938
+ '''Create a new ``AWS::NetworkFirewall::VpcEndpointAssociation``.
6939
+
6940
+ :param scope: Scope in which this resource is defined.
6941
+ :param id: Construct identifier for this resource (unique in its scope).
6942
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
6943
+ :param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
6944
+ :param vpc_id: The unique identifier of the VPC for the endpoint association.
6945
+ :param description: A description of the VPC endpoint association.
6946
+ :param tags: The key:value pairs to associate with the resource.
6947
+ '''
6948
+ if __debug__:
6949
+ type_hints = typing.get_type_hints(_typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3)
6950
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
6951
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
6952
+ props = CfnVpcEndpointAssociationProps(
6953
+ firewall_arn=firewall_arn,
6954
+ subnet_mapping=subnet_mapping,
6955
+ vpc_id=vpc_id,
6956
+ description=description,
6957
+ tags=tags,
6958
+ )
6959
+
6960
+ jsii.create(self.__class__, self, [scope, id, props])
6961
+
6962
+ @jsii.member(jsii_name="inspect")
6963
+ def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
6964
+ '''Examines the CloudFormation resource and discloses attributes.
6965
+
6966
+ :param inspector: tree inspector to collect and process attributes.
6967
+ '''
6968
+ if __debug__:
6969
+ type_hints = typing.get_type_hints(_typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac)
6970
+ check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
6971
+ return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
6972
+
6973
+ @jsii.member(jsii_name="renderProperties")
6974
+ def _render_properties(
6975
+ self,
6976
+ props: typing.Mapping[builtins.str, typing.Any],
6977
+ ) -> typing.Mapping[builtins.str, typing.Any]:
6978
+ '''
6979
+ :param props: -
6980
+ '''
6981
+ if __debug__:
6982
+ type_hints = typing.get_type_hints(_typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036)
6983
+ check_type(argname="argument props", value=props, expected_type=type_hints["props"])
6984
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
6985
+
6986
+ @jsii.python.classproperty
6987
+ @jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
6988
+ def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
6989
+ '''The CloudFormation resource type name for this resource class.'''
6990
+ return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
6991
+
6992
+ @builtins.property
6993
+ @jsii.member(jsii_name="attrEndpointId")
6994
+ def attr_endpoint_id(self) -> builtins.str:
6995
+ '''The unique ID of the firewall endpoint for the subnet that you attached to the firewall.For example: "vpce-111122223333".
6996
+
6997
+ :cloudformationAttribute: EndpointId
6998
+ '''
6999
+ return typing.cast(builtins.str, jsii.get(self, "attrEndpointId"))
7000
+
7001
+ @builtins.property
7002
+ @jsii.member(jsii_name="attrVpcEndpointAssociationArn")
7003
+ def attr_vpc_endpoint_association_arn(self) -> builtins.str:
7004
+ '''The Amazon Resource Name (ARN) of a VPC endpoint association.
7005
+
7006
+ :cloudformationAttribute: VpcEndpointAssociationArn
7007
+ '''
7008
+ return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationArn"))
7009
+
7010
+ @builtins.property
7011
+ @jsii.member(jsii_name="attrVpcEndpointAssociationId")
7012
+ def attr_vpc_endpoint_association_id(self) -> builtins.str:
7013
+ '''The unique identifier of the VPC endpoint association.
7014
+
7015
+ :cloudformationAttribute: VpcEndpointAssociationId
7016
+ '''
7017
+ return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationId"))
7018
+
7019
+ @builtins.property
7020
+ @jsii.member(jsii_name="cdkTagManager")
7021
+ def cdk_tag_manager(self) -> _TagManager_0a598cb3:
7022
+ '''Tag Manager which manages the tags for this resource.'''
7023
+ return typing.cast(_TagManager_0a598cb3, jsii.get(self, "cdkTagManager"))
7024
+
7025
+ @builtins.property
7026
+ @jsii.member(jsii_name="cfnProperties")
7027
+ def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
7028
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
7029
+
7030
+ @builtins.property
7031
+ @jsii.member(jsii_name="vpcEndpointAssociationRef")
7032
+ def vpc_endpoint_association_ref(self) -> _VpcEndpointAssociationReference_d627bc37:
7033
+ '''A reference to a VpcEndpointAssociation resource.'''
7034
+ return typing.cast(_VpcEndpointAssociationReference_d627bc37, jsii.get(self, "vpcEndpointAssociationRef"))
7035
+
7036
+ @builtins.property
7037
+ @jsii.member(jsii_name="firewallArn")
7038
+ def firewall_arn(self) -> builtins.str:
7039
+ '''The Amazon Resource Name (ARN) of the firewall.'''
7040
+ return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
7041
+
7042
+ @firewall_arn.setter
7043
+ def firewall_arn(self, value: builtins.str) -> None:
7044
+ if __debug__:
7045
+ type_hints = typing.get_type_hints(_typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3)
7046
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7047
+ jsii.set(self, "firewallArn", value) # pyright: ignore[reportArgumentType]
7048
+
7049
+ @builtins.property
7050
+ @jsii.member(jsii_name="subnetMapping")
7051
+ def subnet_mapping(
7052
+ self,
7053
+ ) -> typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"]:
7054
+ '''The ID for a subnet that's used in an association with a firewall.'''
7055
+ return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"], jsii.get(self, "subnetMapping"))
7056
+
7057
+ @subnet_mapping.setter
7058
+ def subnet_mapping(
7059
+ self,
7060
+ value: typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"],
7061
+ ) -> None:
7062
+ if __debug__:
7063
+ type_hints = typing.get_type_hints(_typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593)
7064
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7065
+ jsii.set(self, "subnetMapping", value) # pyright: ignore[reportArgumentType]
7066
+
7067
+ @builtins.property
7068
+ @jsii.member(jsii_name="vpcId")
7069
+ def vpc_id(self) -> builtins.str:
7070
+ '''The unique identifier of the VPC for the endpoint association.'''
7071
+ return typing.cast(builtins.str, jsii.get(self, "vpcId"))
7072
+
7073
+ @vpc_id.setter
7074
+ def vpc_id(self, value: builtins.str) -> None:
7075
+ if __debug__:
7076
+ type_hints = typing.get_type_hints(_typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767)
7077
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7078
+ jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
7079
+
7080
+ @builtins.property
7081
+ @jsii.member(jsii_name="description")
7082
+ def description(self) -> typing.Optional[builtins.str]:
7083
+ '''A description of the VPC endpoint association.'''
7084
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "description"))
7085
+
7086
+ @description.setter
7087
+ def description(self, value: typing.Optional[builtins.str]) -> None:
7088
+ if __debug__:
7089
+ type_hints = typing.get_type_hints(_typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80)
7090
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7091
+ jsii.set(self, "description", value) # pyright: ignore[reportArgumentType]
7092
+
7093
+ @builtins.property
7094
+ @jsii.member(jsii_name="tags")
7095
+ def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
7096
+ '''The key:value pairs to associate with the resource.'''
7097
+ return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
7098
+
7099
+ @tags.setter
7100
+ def tags(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
7101
+ if __debug__:
7102
+ type_hints = typing.get_type_hints(_typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2)
7103
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7104
+ jsii.set(self, "tags", value) # pyright: ignore[reportArgumentType]
7105
+
7106
+ @jsii.data_type(
7107
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty",
7108
+ jsii_struct_bases=[],
7109
+ name_mapping={"subnet_id": "subnetId", "ip_address_type": "ipAddressType"},
7110
+ )
7111
+ class SubnetMappingProperty:
7112
+ def __init__(
7113
+ self,
7114
+ *,
7115
+ subnet_id: builtins.str,
7116
+ ip_address_type: typing.Optional[builtins.str] = None,
7117
+ ) -> None:
7118
+ '''The ID for a subnet that's used in an association with a firewall.
7119
+
7120
+ This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7121
+
7122
+ :param subnet_id: The unique identifier for the subnet.
7123
+ :param ip_address_type: The subnet's IP address type. You can't change the IP address type after you create the subnet.
7124
+
7125
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html
7126
+ :exampleMetadata: fixture=_generated
7127
+
7128
+ Example::
7129
+
7130
+ # The code below shows an example of how to instantiate this type.
7131
+ # The values are placeholders you should change.
7132
+ from aws_cdk import aws_networkfirewall as networkfirewall
7133
+
7134
+ subnet_mapping_property = networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
7135
+ subnet_id="subnetId",
7136
+
7137
+ # the properties below are optional
7138
+ ip_address_type="ipAddressType"
7139
+ )
7140
+ '''
7141
+ if __debug__:
7142
+ type_hints = typing.get_type_hints(_typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015)
7143
+ check_type(argname="argument subnet_id", value=subnet_id, expected_type=type_hints["subnet_id"])
7144
+ check_type(argname="argument ip_address_type", value=ip_address_type, expected_type=type_hints["ip_address_type"])
7145
+ self._values: typing.Dict[builtins.str, typing.Any] = {
7146
+ "subnet_id": subnet_id,
7147
+ }
7148
+ if ip_address_type is not None:
7149
+ self._values["ip_address_type"] = ip_address_type
7150
+
7151
+ @builtins.property
7152
+ def subnet_id(self) -> builtins.str:
7153
+ '''The unique identifier for the subnet.
7154
+
7155
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-subnetid
7156
+ '''
7157
+ result = self._values.get("subnet_id")
7158
+ assert result is not None, "Required property 'subnet_id' is missing"
7159
+ return typing.cast(builtins.str, result)
7160
+
7161
+ @builtins.property
7162
+ def ip_address_type(self) -> typing.Optional[builtins.str]:
7163
+ '''The subnet's IP address type.
7164
+
7165
+ You can't change the IP address type after you create the subnet.
7166
+
7167
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-ipaddresstype
7168
+ '''
7169
+ result = self._values.get("ip_address_type")
7170
+ return typing.cast(typing.Optional[builtins.str], result)
7171
+
7172
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
7173
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
7174
+
7175
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
7176
+ return not (rhs == self)
7177
+
7178
+ def __repr__(self) -> str:
7179
+ return "SubnetMappingProperty(%s)" % ", ".join(
7180
+ k + "=" + repr(v) for k, v in self._values.items()
7181
+ )
7182
+
7183
+
7184
+ @jsii.data_type(
7185
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociationProps",
7186
+ jsii_struct_bases=[],
7187
+ name_mapping={
7188
+ "firewall_arn": "firewallArn",
7189
+ "subnet_mapping": "subnetMapping",
7190
+ "vpc_id": "vpcId",
7191
+ "description": "description",
7192
+ "tags": "tags",
7193
+ },
7194
+ )
7195
+ class CfnVpcEndpointAssociationProps:
7196
+ def __init__(
7197
+ self,
7198
+ *,
7199
+ firewall_arn: builtins.str,
7200
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
7201
+ vpc_id: builtins.str,
7202
+ description: typing.Optional[builtins.str] = None,
7203
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7204
+ ) -> None:
7205
+ '''Properties for defining a ``CfnVpcEndpointAssociation``.
7206
+
7207
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
7208
+ :param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7209
+ :param vpc_id: The unique identifier of the VPC for the endpoint association.
7210
+ :param description: A description of the VPC endpoint association.
7211
+ :param tags: The key:value pairs to associate with the resource.
7212
+
7213
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
7214
+ :exampleMetadata: fixture=_generated
7215
+
7216
+ Example::
7217
+
7218
+ # The code below shows an example of how to instantiate this type.
7219
+ # The values are placeholders you should change.
7220
+ from aws_cdk import aws_networkfirewall as networkfirewall
7221
+
7222
+ cfn_vpc_endpoint_association_props = networkfirewall.CfnVpcEndpointAssociationProps(
7223
+ firewall_arn="firewallArn",
7224
+ subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
7225
+ subnet_id="subnetId",
7226
+
7227
+ # the properties below are optional
7228
+ ip_address_type="ipAddressType"
7229
+ ),
7230
+ vpc_id="vpcId",
7231
+
7232
+ # the properties below are optional
7233
+ description="description",
7234
+ tags=[CfnTag(
7235
+ key="key",
7236
+ value="value"
7237
+ )]
7238
+ )
7239
+ '''
7240
+ if __debug__:
7241
+ type_hints = typing.get_type_hints(_typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76)
7242
+ check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
7243
+ check_type(argname="argument subnet_mapping", value=subnet_mapping, expected_type=type_hints["subnet_mapping"])
7244
+ check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
7245
+ check_type(argname="argument description", value=description, expected_type=type_hints["description"])
7246
+ check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
7247
+ self._values: typing.Dict[builtins.str, typing.Any] = {
7248
+ "firewall_arn": firewall_arn,
7249
+ "subnet_mapping": subnet_mapping,
7250
+ "vpc_id": vpc_id,
7251
+ }
7252
+ if description is not None:
7253
+ self._values["description"] = description
7254
+ if tags is not None:
7255
+ self._values["tags"] = tags
7256
+
7257
+ @builtins.property
7258
+ def firewall_arn(self) -> builtins.str:
7259
+ '''The Amazon Resource Name (ARN) of the firewall.
7260
+
7261
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-firewallarn
7262
+ '''
7263
+ result = self._values.get("firewall_arn")
7264
+ assert result is not None, "Required property 'firewall_arn' is missing"
7265
+ return typing.cast(builtins.str, result)
7266
+
7267
+ @builtins.property
7268
+ def subnet_mapping(
7269
+ self,
7270
+ ) -> typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty]:
7271
+ '''The ID for a subnet that's used in an association with a firewall.
7272
+
7273
+ This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7274
+
7275
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping
7276
+ '''
7277
+ result = self._values.get("subnet_mapping")
7278
+ assert result is not None, "Required property 'subnet_mapping' is missing"
7279
+ return typing.cast(typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty], result)
7280
+
7281
+ @builtins.property
7282
+ def vpc_id(self) -> builtins.str:
7283
+ '''The unique identifier of the VPC for the endpoint association.
7284
+
7285
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-vpcid
7286
+ '''
7287
+ result = self._values.get("vpc_id")
7288
+ assert result is not None, "Required property 'vpc_id' is missing"
7289
+ return typing.cast(builtins.str, result)
7290
+
7291
+ @builtins.property
7292
+ def description(self) -> typing.Optional[builtins.str]:
7293
+ '''A description of the VPC endpoint association.
7294
+
7295
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-description
7296
+ '''
7297
+ result = self._values.get("description")
7298
+ return typing.cast(typing.Optional[builtins.str], result)
7299
+
7300
+ @builtins.property
7301
+ def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
7302
+ '''The key:value pairs to associate with the resource.
7303
+
7304
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-tags
7305
+ '''
7306
+ result = self._values.get("tags")
7307
+ return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
7308
+
7309
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
7310
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
7311
+
7312
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
7313
+ return not (rhs == self)
7314
+
7315
+ def __repr__(self) -> str:
7316
+ return "CfnVpcEndpointAssociationProps(%s)" % ", ".join(
7317
+ k + "=" + repr(v) for k, v in self._values.items()
7318
+ )
7319
+
7320
+
6433
7321
  __all__ = [
6434
7322
  "CfnFirewall",
6435
7323
  "CfnFirewallPolicy",
@@ -6441,6 +7329,8 @@ __all__ = [
6441
7329
  "CfnRuleGroupProps",
6442
7330
  "CfnTLSInspectionConfiguration",
6443
7331
  "CfnTLSInspectionConfigurationProps",
7332
+ "CfnVpcEndpointAssociation",
7333
+ "CfnVpcEndpointAssociationProps",
6444
7334
  ]
6445
7335
 
6446
7336
  publication.publish()
@@ -6451,14 +7341,17 @@ def _typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b
6451
7341
  *,
6452
7342
  firewall_name: builtins.str,
6453
7343
  firewall_policy_arn: builtins.str,
6454
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
6455
- vpc_id: builtins.str,
7344
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7345
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6456
7346
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6457
7347
  description: typing.Optional[builtins.str] = None,
6458
7348
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
6459
7349
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6460
7350
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7351
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6461
7352
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7353
+ transit_gateway_id: typing.Optional[builtins.str] = None,
7354
+ vpc_id: typing.Optional[builtins.str] = None,
6462
7355
  ) -> None:
6463
7356
  """Type checking stubs"""
6464
7357
  pass
@@ -6487,14 +7380,14 @@ def _typecheckingstub__c711ef7af7567ab69b12f083b26c4033f7cdf1593bf27227f989d7c73
6487
7380
  """Type checking stubs"""
6488
7381
  pass
6489
7382
 
6490
- def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
6491
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]],
7383
+ def _typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1(
7384
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
6492
7385
  ) -> None:
6493
7386
  """Type checking stubs"""
6494
7387
  pass
6495
7388
 
6496
- def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
6497
- value: builtins.str,
7389
+ def _typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77(
7390
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]],
6498
7391
  ) -> None:
6499
7392
  """Type checking stubs"""
6500
7393
  pass
@@ -6529,12 +7422,37 @@ def _typecheckingstub__3edeae6cf81be7cb1d87c21080d7c060fb1fdbd872b4292af576701d5
6529
7422
  """Type checking stubs"""
6530
7423
  pass
6531
7424
 
7425
+ def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
7426
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]],
7427
+ ) -> None:
7428
+ """Type checking stubs"""
7429
+ pass
7430
+
6532
7431
  def _typecheckingstub__e1b2b141c4b9a04d63365f9d8a2a5636d417c4a087ebfbfd40be7336d4d258da(
6533
7432
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
6534
7433
  ) -> None:
6535
7434
  """Type checking stubs"""
6536
7435
  pass
6537
7436
 
7437
+ def _typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6(
7438
+ value: typing.Optional[builtins.str],
7439
+ ) -> None:
7440
+ """Type checking stubs"""
7441
+ pass
7442
+
7443
+ def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
7444
+ value: typing.Optional[builtins.str],
7445
+ ) -> None:
7446
+ """Type checking stubs"""
7447
+ pass
7448
+
7449
+ def _typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf(
7450
+ *,
7451
+ availability_zone: builtins.str,
7452
+ ) -> None:
7453
+ """Type checking stubs"""
7454
+ pass
7455
+
6538
7456
  def _typecheckingstub__cf86d50b8eec902ee512afbe0dfd3b1ee2bc8f0b9f4fb9acb4ac637ae3662fc0(
6539
7457
  *,
6540
7458
  subnet_id: builtins.str,
@@ -6617,6 +7535,7 @@ def _typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2d
6617
7535
  *,
6618
7536
  stateless_default_actions: typing.Sequence[builtins.str],
6619
7537
  stateless_fragment_default_actions: typing.Sequence[builtins.str],
7538
+ enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6620
7539
  policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.PolicyVariablesProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6621
7540
  stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
6622
7541
  stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulEngineOptionsProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -6675,6 +7594,7 @@ def _typecheckingstub__62be7baa7c0ae22655f34e1d3316236c114457fe368caf2a958ba1fd9
6675
7594
  def _typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8(
6676
7595
  *,
6677
7596
  resource_arn: builtins.str,
7597
+ deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6678
7598
  override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulRuleGroupOverrideProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6679
7599
  priority: typing.Optional[jsii.Number] = None,
6680
7600
  ) -> None:
@@ -6703,14 +7623,17 @@ def _typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57b
6703
7623
  *,
6704
7624
  firewall_name: builtins.str,
6705
7625
  firewall_policy_arn: builtins.str,
6706
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
6707
- vpc_id: builtins.str,
7626
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7627
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6708
7628
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6709
7629
  description: typing.Optional[builtins.str] = None,
6710
7630
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
6711
7631
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6712
7632
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7633
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6713
7634
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7635
+ transit_gateway_id: typing.Optional[builtins.str] = None,
7636
+ vpc_id: typing.Optional[builtins.str] = None,
6714
7637
  ) -> None:
6715
7638
  """Type checking stubs"""
6716
7639
  pass
@@ -6721,6 +7644,7 @@ def _typecheckingstub__71487a7865ce1877156cecd1cb83afa7ffd5f6428fa2611a7537c9ccf
6721
7644
  *,
6722
7645
  firewall_arn: builtins.str,
6723
7646
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
7647
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6724
7648
  firewall_name: typing.Optional[builtins.str] = None,
6725
7649
  ) -> None:
6726
7650
  """Type checking stubs"""
@@ -6750,6 +7674,12 @@ def _typecheckingstub__6379a583f20adcddf04ea938455ca9e96ed6e0a2293ffa4b839685154
6750
7674
  """Type checking stubs"""
6751
7675
  pass
6752
7676
 
7677
+ def _typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe(
7678
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7679
+ ) -> None:
7680
+ """Type checking stubs"""
7681
+ pass
7682
+
6753
7683
  def _typecheckingstub__1e3640e7313e33945bc2b7c00caa777b47e14239e160ded6a349405aeb0b47da(
6754
7684
  value: typing.Optional[builtins.str],
6755
7685
  ) -> None:
@@ -6776,6 +7706,7 @@ def _typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d6217
6776
7706
  *,
6777
7707
  firewall_arn: builtins.str,
6778
7708
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
7709
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6779
7710
  firewall_name: typing.Optional[builtins.str] = None,
6780
7711
  ) -> None:
6781
7712
  """Type checking stubs"""
@@ -6790,6 +7721,7 @@ def _typecheckingstub__2f1d19cebb2e7dfe2bb3a674253e22bfdb540bd48dc9cd243370420d8
6790
7721
  type: builtins.str,
6791
7722
  description: typing.Optional[builtins.str] = None,
6792
7723
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7724
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6793
7725
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6794
7726
  ) -> None:
6795
7727
  """Type checking stubs"""
@@ -6837,6 +7769,12 @@ def _typecheckingstub__6ed6ac96ae6360b92bfdf6614d9832ba1cad5080dce3a3257a75537c9
6837
7769
  """Type checking stubs"""
6838
7770
  pass
6839
7771
 
7772
+ def _typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0(
7773
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]],
7774
+ ) -> None:
7775
+ """Type checking stubs"""
7776
+ pass
7777
+
6840
7778
  def _typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5(
6841
7779
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
6842
7780
  ) -> None:
@@ -7024,6 +7962,13 @@ def _typecheckingstub__71d7a12c23bdb40d0d25319bf80720d55c4205129c386e8de5676df43
7024
7962
  """Type checking stubs"""
7025
7963
  pass
7026
7964
 
7965
+ def _typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307(
7966
+ *,
7967
+ rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
7968
+ ) -> None:
7969
+ """Type checking stubs"""
7970
+ pass
7971
+
7027
7972
  def _typecheckingstub__775fa1817d39168a6b1883b9e449352da902edc72fb398c55cda18aa8ead3039(
7028
7973
  *,
7029
7974
  flags: typing.Sequence[builtins.str],
@@ -7039,6 +7984,7 @@ def _typecheckingstub__775b93be404fbe10bf6b023b8192636307852f30e49da9892d7e20aa4
7039
7984
  type: builtins.str,
7040
7985
  description: typing.Optional[builtins.str] = None,
7041
7986
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7987
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7042
7988
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7043
7989
  ) -> None:
7044
7990
  """Type checking stubs"""
@@ -7159,3 +8105,77 @@ def _typecheckingstub__f05137012f831af07bffb09e4ece1302036a8c7c23718d26dcb08f4bf
7159
8105
  ) -> None:
7160
8106
  """Type checking stubs"""
7161
8107
  pass
8108
+
8109
+ def _typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3(
8110
+ scope: _constructs_77d1e7e8.Construct,
8111
+ id: builtins.str,
8112
+ *,
8113
+ firewall_arn: builtins.str,
8114
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
8115
+ vpc_id: builtins.str,
8116
+ description: typing.Optional[builtins.str] = None,
8117
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
8118
+ ) -> None:
8119
+ """Type checking stubs"""
8120
+ pass
8121
+
8122
+ def _typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac(
8123
+ inspector: _TreeInspector_488e0dd5,
8124
+ ) -> None:
8125
+ """Type checking stubs"""
8126
+ pass
8127
+
8128
+ def _typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036(
8129
+ props: typing.Mapping[builtins.str, typing.Any],
8130
+ ) -> None:
8131
+ """Type checking stubs"""
8132
+ pass
8133
+
8134
+ def _typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3(
8135
+ value: builtins.str,
8136
+ ) -> None:
8137
+ """Type checking stubs"""
8138
+ pass
8139
+
8140
+ def _typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593(
8141
+ value: typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty],
8142
+ ) -> None:
8143
+ """Type checking stubs"""
8144
+ pass
8145
+
8146
+ def _typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767(
8147
+ value: builtins.str,
8148
+ ) -> None:
8149
+ """Type checking stubs"""
8150
+ pass
8151
+
8152
+ def _typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80(
8153
+ value: typing.Optional[builtins.str],
8154
+ ) -> None:
8155
+ """Type checking stubs"""
8156
+ pass
8157
+
8158
+ def _typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2(
8159
+ value: typing.Optional[typing.List[_CfnTag_f6864754]],
8160
+ ) -> None:
8161
+ """Type checking stubs"""
8162
+ pass
8163
+
8164
+ def _typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015(
8165
+ *,
8166
+ subnet_id: builtins.str,
8167
+ ip_address_type: typing.Optional[builtins.str] = None,
8168
+ ) -> None:
8169
+ """Type checking stubs"""
8170
+ pass
8171
+
8172
+ def _typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76(
8173
+ *,
8174
+ firewall_arn: builtins.str,
8175
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
8176
+ vpc_id: builtins.str,
8177
+ description: typing.Optional[builtins.str] = None,
8178
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
8179
+ ) -> None:
8180
+ """Type checking stubs"""
8181
+ pass