aws-cdk-lib 2.200.2__py3-none-any.whl → 2.224.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (569) hide show
  1. aws_cdk/__init__.py +1349 -373
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.200.2.jsii.tgz → aws-cdk-lib@2.224.0.jsii.tgz} +0 -0
  4. aws_cdk/alexa_ask/__init__.py +12 -2
  5. aws_cdk/aws_accessanalyzer/__init__.py +323 -6
  6. aws_cdk/aws_acmpca/__init__.py +53 -10
  7. aws_cdk/aws_aiops/__init__.py +1019 -0
  8. aws_cdk/aws_amazonmq/__init__.py +357 -313
  9. aws_cdk/aws_amplify/__init__.py +173 -17
  10. aws_cdk/aws_amplifyuibuilder/__init__.py +35 -6
  11. aws_cdk/aws_apigateway/__init__.py +1017 -155
  12. aws_cdk/aws_apigatewayv2/__init__.py +2796 -379
  13. aws_cdk/aws_apigatewayv2_integrations/__init__.py +94 -16
  14. aws_cdk/aws_appconfig/__init__.py +298 -43
  15. aws_cdk/aws_appflow/__init__.py +151 -6
  16. aws_cdk/aws_appintegrations/__init__.py +546 -6
  17. aws_cdk/aws_applicationautoscaling/__init__.py +29 -6
  18. aws_cdk/aws_applicationinsights/__init__.py +13 -2
  19. aws_cdk/aws_applicationsignals/__init__.py +374 -6
  20. aws_cdk/aws_appmesh/__init__.py +94 -26
  21. aws_cdk/aws_apprunner/__init__.py +66 -18
  22. aws_cdk/aws_appstream/__init__.py +309 -55
  23. aws_cdk/aws_appsync/__init__.py +227 -53
  24. aws_cdk/aws_apptest/__init__.py +71 -2
  25. aws_cdk/aws_aps/__init__.py +1875 -132
  26. aws_cdk/aws_arcregionswitch/__init__.py +5095 -0
  27. aws_cdk/aws_arczonalshift/__init__.py +39 -12
  28. aws_cdk/aws_athena/__init__.py +365 -29
  29. aws_cdk/aws_auditmanager/__init__.py +71 -2
  30. aws_cdk/aws_autoscaling/__init__.py +135 -55
  31. aws_cdk/aws_autoscaling_common/__init__.py +3 -0
  32. aws_cdk/aws_autoscalingplans/__init__.py +13 -2
  33. aws_cdk/aws_b2bi/__init__.py +1819 -99
  34. aws_cdk/aws_backup/__init__.py +317 -28
  35. aws_cdk/aws_backupgateway/__init__.py +13 -2
  36. aws_cdk/aws_batch/__init__.py +1405 -178
  37. aws_cdk/aws_bcmdataexports/__init__.py +21 -2
  38. aws_cdk/aws_bedrock/__init__.py +6747 -627
  39. aws_cdk/aws_bedrockagentcore/__init__.py +10425 -0
  40. aws_cdk/aws_billingconductor/__init__.py +197 -11
  41. aws_cdk/aws_budgets/__init__.py +42 -4
  42. aws_cdk/aws_cassandra/__init__.py +247 -6
  43. aws_cdk/aws_ce/__init__.py +35 -6
  44. aws_cdk/aws_certificatemanager/__init__.py +237 -32
  45. aws_cdk/aws_chatbot/__init__.py +70 -6
  46. aws_cdk/aws_cleanrooms/__init__.py +709 -206
  47. aws_cdk/aws_cleanroomsml/__init__.py +13 -2
  48. aws_cdk/aws_cloud9/__init__.py +13 -2
  49. aws_cdk/aws_cloudformation/__init__.py +345 -166
  50. aws_cdk/aws_cloudfront/__init__.py +2101 -680
  51. aws_cdk/aws_cloudfront/experimental/__init__.py +108 -16
  52. aws_cdk/aws_cloudfront_origins/__init__.py +614 -73
  53. aws_cdk/aws_cloudtrail/__init__.py +301 -17
  54. aws_cdk/aws_cloudwatch/__init__.py +1414 -153
  55. aws_cdk/aws_codeartifact/__init__.py +35 -6
  56. aws_cdk/aws_codebuild/__init__.py +1103 -118
  57. aws_cdk/aws_codecommit/__init__.py +23 -9
  58. aws_cdk/aws_codeconnections/__init__.py +13 -2
  59. aws_cdk/aws_codedeploy/__init__.py +67 -6
  60. aws_cdk/aws_codeguruprofiler/__init__.py +74 -2
  61. aws_cdk/aws_codegurureviewer/__init__.py +13 -2
  62. aws_cdk/aws_codepipeline/__init__.py +127 -64
  63. aws_cdk/aws_codepipeline_actions/__init__.py +749 -0
  64. aws_cdk/aws_codestar/__init__.py +13 -2
  65. aws_cdk/aws_codestarconnections/__init__.py +35 -6
  66. aws_cdk/aws_codestarnotifications/__init__.py +16 -2
  67. aws_cdk/aws_cognito/__init__.py +814 -80
  68. aws_cdk/aws_cognito_identitypool/__init__.py +17 -12
  69. aws_cdk/aws_comprehend/__init__.py +24 -4
  70. aws_cdk/aws_config/__init__.py +191 -30
  71. aws_cdk/aws_connect/__init__.py +2736 -191
  72. aws_cdk/aws_connectcampaigns/__init__.py +13 -2
  73. aws_cdk/aws_connectcampaignsv2/__init__.py +268 -6
  74. aws_cdk/aws_controltower/__init__.py +35 -6
  75. aws_cdk/aws_cur/__init__.py +100 -4
  76. aws_cdk/aws_customerprofiles/__init__.py +617 -27
  77. aws_cdk/aws_databrew/__init__.py +68 -12
  78. aws_cdk/aws_datapipeline/__init__.py +42 -2
  79. aws_cdk/aws_datasync/__init__.py +723 -203
  80. aws_cdk/aws_datazone/__init__.py +4425 -608
  81. aws_cdk/aws_dax/__init__.py +83 -6
  82. aws_cdk/aws_deadline/__init__.py +321 -32
  83. aws_cdk/aws_detective/__init__.py +35 -6
  84. aws_cdk/aws_devicefarm/__init__.py +68 -12
  85. aws_cdk/aws_devopsguru/__init__.py +37 -6
  86. aws_cdk/aws_directoryservice/__init__.py +53 -4
  87. aws_cdk/aws_dlm/__init__.py +13 -2
  88. aws_cdk/aws_dms/__init__.py +184 -27
  89. aws_cdk/aws_docdb/__init__.py +323 -46
  90. aws_cdk/aws_docdbelastic/__init__.py +13 -2
  91. aws_cdk/aws_dsql/__init__.py +340 -12
  92. aws_cdk/aws_dynamodb/__init__.py +1463 -166
  93. aws_cdk/aws_ec2/__init__.py +9636 -1120
  94. aws_cdk/aws_ecr/__init__.py +631 -43
  95. aws_cdk/aws_ecr_assets/__init__.py +4 -0
  96. aws_cdk/aws_ecs/__init__.py +6524 -497
  97. aws_cdk/aws_ecs_patterns/__init__.py +2 -0
  98. aws_cdk/aws_efs/__init__.py +264 -24
  99. aws_cdk/aws_eks/__init__.py +1050 -218
  100. aws_cdk/aws_elasticache/__init__.py +373 -20
  101. aws_cdk/aws_elasticbeanstalk/__init__.py +75 -8
  102. aws_cdk/aws_elasticloadbalancing/__init__.py +16 -2
  103. aws_cdk/aws_elasticloadbalancingv2/__init__.py +1670 -106
  104. aws_cdk/aws_elasticsearch/__init__.py +282 -9
  105. aws_cdk/aws_emr/__init__.py +187 -20
  106. aws_cdk/aws_emrcontainers/__init__.py +71 -2
  107. aws_cdk/aws_emrserverless/__init__.py +188 -3
  108. aws_cdk/aws_entityresolution/__init__.py +585 -58
  109. aws_cdk/aws_events/__init__.py +969 -124
  110. aws_cdk/aws_events_targets/__init__.py +310 -54
  111. aws_cdk/aws_eventschemas/__init__.py +46 -8
  112. aws_cdk/aws_evidently/__init__.py +57 -10
  113. aws_cdk/aws_evs/__init__.py +2244 -0
  114. aws_cdk/aws_finspace/__init__.py +71 -2
  115. aws_cdk/aws_fis/__init__.py +26 -4
  116. aws_cdk/aws_fms/__init__.py +35 -6
  117. aws_cdk/aws_forecast/__init__.py +24 -4
  118. aws_cdk/aws_frauddetector/__init__.py +79 -14
  119. aws_cdk/aws_fsx/__init__.py +1236 -142
  120. aws_cdk/aws_gamelift/__init__.py +653 -78
  121. aws_cdk/aws_gameliftstreams/__init__.py +38 -16
  122. aws_cdk/aws_globalaccelerator/__init__.py +55 -14
  123. aws_cdk/aws_glue/__init__.py +1368 -320
  124. aws_cdk/aws_grafana/__init__.py +13 -2
  125. aws_cdk/aws_greengrass/__init__.py +654 -32
  126. aws_cdk/aws_greengrassv2/__init__.py +53 -4
  127. aws_cdk/aws_groundstation/__init__.py +122 -6
  128. aws_cdk/aws_guardduty/__init__.py +1613 -123
  129. aws_cdk/aws_healthimaging/__init__.py +71 -2
  130. aws_cdk/aws_healthlake/__init__.py +42 -2
  131. aws_cdk/aws_iam/__init__.py +480 -140
  132. aws_cdk/aws_identitystore/__init__.py +24 -4
  133. aws_cdk/aws_imagebuilder/__init__.py +1433 -183
  134. aws_cdk/aws_inspector/__init__.py +38 -6
  135. aws_cdk/aws_inspectorv2/__init__.py +2285 -243
  136. aws_cdk/aws_internetmonitor/__init__.py +71 -2
  137. aws_cdk/aws_invoicing/__init__.py +13 -2
  138. aws_cdk/aws_iot/__init__.py +1730 -86
  139. aws_cdk/aws_iotanalytics/__init__.py +162 -8
  140. aws_cdk/aws_iotcoredeviceadvisor/__init__.py +106 -40
  141. aws_cdk/aws_iotevents/__init__.py +122 -6
  142. aws_cdk/aws_iotfleethub/__init__.py +71 -2
  143. aws_cdk/aws_iotfleetwise/__init__.py +195 -14
  144. aws_cdk/aws_iotsitewise/__init__.py +1837 -89
  145. aws_cdk/aws_iotthingsgraph/__init__.py +13 -2
  146. aws_cdk/aws_iottwinmaker/__init__.py +115 -10
  147. aws_cdk/aws_iotwireless/__init__.py +649 -22
  148. aws_cdk/aws_ivs/__init__.py +561 -57
  149. aws_cdk/aws_ivschat/__init__.py +24 -4
  150. aws_cdk/aws_kafkaconnect/__init__.py +35 -6
  151. aws_cdk/aws_kendra/__init__.py +120 -28
  152. aws_cdk/aws_kendraranking/__init__.py +13 -2
  153. aws_cdk/aws_kinesis/__init__.py +622 -22
  154. aws_cdk/aws_kinesisanalytics/__init__.py +467 -94
  155. aws_cdk/aws_kinesisanalyticsv2/__init__.py +201 -11
  156. aws_cdk/aws_kinesisfirehose/__init__.py +3077 -295
  157. aws_cdk/aws_kinesisvideo/__init__.py +24 -4
  158. aws_cdk/aws_kms/__init__.py +188 -41
  159. aws_cdk/aws_lakeformation/__init__.py +80 -15
  160. aws_cdk/aws_lambda/__init__.py +2101 -252
  161. aws_cdk/aws_lambda_event_sources/__init__.py +638 -1
  162. aws_cdk/aws_lambda_nodejs/__init__.py +63 -24
  163. aws_cdk/aws_launchwizard/__init__.py +13 -2
  164. aws_cdk/aws_lex/__init__.py +871 -8
  165. aws_cdk/aws_licensemanager/__init__.py +24 -4
  166. aws_cdk/aws_lightsail/__init__.py +2159 -975
  167. aws_cdk/aws_location/__init__.py +618 -14
  168. aws_cdk/aws_logs/__init__.py +5904 -956
  169. aws_cdk/aws_lookoutequipment/__init__.py +13 -2
  170. aws_cdk/aws_lookoutmetrics/__init__.py +38 -6
  171. aws_cdk/aws_lookoutvision/__init__.py +71 -2
  172. aws_cdk/aws_m2/__init__.py +94 -19
  173. aws_cdk/aws_macie/__init__.py +49 -11
  174. aws_cdk/aws_managedblockchain/__init__.py +180 -6
  175. aws_cdk/aws_mediaconnect/__init__.py +101 -18
  176. aws_cdk/aws_mediaconvert/__init__.py +35 -6
  177. aws_cdk/aws_medialive/__init__.py +1239 -35
  178. aws_cdk/aws_mediapackage/__init__.py +59 -12
  179. aws_cdk/aws_mediapackagev2/__init__.py +1607 -225
  180. aws_cdk/aws_mediastore/__init__.py +13 -2
  181. aws_cdk/aws_mediatailor/__init__.py +583 -12
  182. aws_cdk/aws_memorydb/__init__.py +271 -12
  183. aws_cdk/aws_mpa/__init__.py +1495 -0
  184. aws_cdk/aws_msk/__init__.py +104 -18
  185. aws_cdk/aws_mwaa/__init__.py +121 -9
  186. aws_cdk/aws_neptune/__init__.py +290 -78
  187. aws_cdk/aws_neptunegraph/__init__.py +24 -4
  188. aws_cdk/aws_networkfirewall/__init__.py +1289 -273
  189. aws_cdk/aws_networkmanager/__init__.py +349 -33
  190. aws_cdk/aws_nimblestudio/__init__.py +75 -8
  191. aws_cdk/aws_notifications/__init__.py +317 -12
  192. aws_cdk/aws_notificationscontacts/__init__.py +13 -2
  193. aws_cdk/aws_oam/__init__.py +24 -4
  194. aws_cdk/aws_observabilityadmin/__init__.py +2561 -0
  195. aws_cdk/aws_odb/__init__.py +5872 -0
  196. aws_cdk/aws_omics/__init__.py +2495 -529
  197. aws_cdk/aws_opensearchserverless/__init__.py +312 -37
  198. aws_cdk/aws_opensearchservice/__init__.py +495 -19
  199. aws_cdk/aws_opsworks/__init__.py +235 -139
  200. aws_cdk/aws_opsworkscm/__init__.py +16 -52
  201. aws_cdk/aws_organizations/__init__.py +70 -10
  202. aws_cdk/aws_osis/__init__.py +167 -2
  203. aws_cdk/aws_panorama/__init__.py +151 -6
  204. aws_cdk/aws_paymentcryptography/__init__.py +24 -4
  205. aws_cdk/aws_pcaconnectorad/__init__.py +59 -10
  206. aws_cdk/aws_pcaconnectorscep/__init__.py +24 -4
  207. aws_cdk/aws_pcs/__init__.py +387 -68
  208. aws_cdk/aws_personalize/__init__.py +46 -8
  209. aws_cdk/aws_pinpoint/__init__.py +329 -38
  210. aws_cdk/aws_pinpointemail/__init__.py +48 -8
  211. aws_cdk/aws_pipes/__init__.py +12 -2
  212. aws_cdk/aws_proton/__init__.py +37 -6
  213. aws_cdk/aws_qbusiness/__init__.py +635 -34
  214. aws_cdk/aws_qldb/__init__.py +24 -4
  215. aws_cdk/aws_quicksight/__init__.py +7900 -1160
  216. aws_cdk/aws_ram/__init__.py +24 -4
  217. aws_cdk/aws_rbin/__init__.py +12 -2
  218. aws_cdk/aws_rds/__init__.py +3345 -512
  219. aws_cdk/aws_redshift/__init__.py +143 -20
  220. aws_cdk/aws_redshiftserverless/__init__.py +692 -4
  221. aws_cdk/aws_refactorspaces/__init__.py +64 -14
  222. aws_cdk/aws_rekognition/__init__.py +93 -6
  223. aws_cdk/aws_resiliencehub/__init__.py +24 -4
  224. aws_cdk/aws_resourceexplorer2/__init__.py +35 -6
  225. aws_cdk/aws_resourcegroups/__init__.py +82 -4
  226. aws_cdk/aws_robomaker/__init__.py +72 -12
  227. aws_cdk/aws_rolesanywhere/__init__.py +180 -6
  228. aws_cdk/aws_route53/__init__.py +3273 -1442
  229. aws_cdk/aws_route53_targets/__init__.py +3 -0
  230. aws_cdk/aws_route53profiles/__init__.py +37 -6
  231. aws_cdk/aws_route53recoverycontrol/__init__.py +46 -8
  232. aws_cdk/aws_route53recoveryreadiness/__init__.py +104 -8
  233. aws_cdk/aws_route53resolver/__init__.py +226 -36
  234. aws_cdk/aws_rtbfabric/__init__.py +3498 -0
  235. aws_cdk/aws_rum/__init__.py +13 -2
  236. aws_cdk/aws_s3/__init__.py +1291 -158
  237. aws_cdk/aws_s3_assets/__init__.py +11 -11
  238. aws_cdk/aws_s3_deployment/__init__.py +147 -11
  239. aws_cdk/aws_s3_notifications/__init__.py +7 -7
  240. aws_cdk/aws_s3express/__init__.py +266 -8
  241. aws_cdk/aws_s3objectlambda/__init__.py +68 -16
  242. aws_cdk/aws_s3outposts/__init__.py +46 -8
  243. aws_cdk/aws_s3tables/__init__.py +2000 -323
  244. aws_cdk/aws_s3vectors/__init__.py +1378 -0
  245. aws_cdk/aws_sagemaker/__init__.py +6617 -363
  246. aws_cdk/aws_sam/__init__.py +79 -14
  247. aws_cdk/aws_scheduler/__init__.py +237 -4
  248. aws_cdk/aws_sdb/__init__.py +12 -2
  249. aws_cdk/aws_secretsmanager/__init__.py +170 -14
  250. aws_cdk/aws_securityhub/__init__.py +3121 -176
  251. aws_cdk/aws_securitylake/__init__.py +46 -8
  252. aws_cdk/aws_servicecatalog/__init__.py +405 -246
  253. aws_cdk/aws_servicecatalogappregistry/__init__.py +164 -8
  254. aws_cdk/aws_servicediscovery/__init__.py +140 -47
  255. aws_cdk/aws_ses/__init__.py +1231 -140
  256. aws_cdk/aws_shield/__init__.py +46 -8
  257. aws_cdk/aws_signer/__init__.py +27 -4
  258. aws_cdk/aws_simspaceweaver/__init__.py +42 -2
  259. aws_cdk/aws_smsvoice/__init__.py +4716 -0
  260. aws_cdk/aws_sns/__init__.py +245 -29
  261. aws_cdk/aws_sns_subscriptions/__init__.py +3 -1
  262. aws_cdk/aws_sqs/__init__.py +211 -14
  263. aws_cdk/aws_ssm/__init__.py +401 -58
  264. aws_cdk/aws_ssmcontacts/__init__.py +46 -8
  265. aws_cdk/aws_ssmguiconnect/__init__.py +13 -2
  266. aws_cdk/aws_ssmincidents/__init__.py +24 -4
  267. aws_cdk/aws_ssmquicksetup/__init__.py +383 -6
  268. aws_cdk/aws_sso/__init__.py +70 -12
  269. aws_cdk/aws_stepfunctions/__init__.py +615 -70
  270. aws_cdk/aws_stepfunctions_tasks/__init__.py +781 -144
  271. aws_cdk/aws_supportapp/__init__.py +39 -6
  272. aws_cdk/aws_synthetics/__init__.py +861 -75
  273. aws_cdk/aws_systemsmanagersap/__init__.py +13 -2
  274. aws_cdk/aws_timestream/__init__.py +104 -8
  275. aws_cdk/aws_transfer/__init__.py +784 -87
  276. aws_cdk/aws_verifiedpermissions/__init__.py +145 -17
  277. aws_cdk/aws_voiceid/__init__.py +41 -2
  278. aws_cdk/aws_vpclattice/__init__.py +376 -30
  279. aws_cdk/aws_waf/__init__.py +79 -14
  280. aws_cdk/aws_wafregional/__init__.py +123 -22
  281. aws_cdk/aws_wafv2/__init__.py +1179 -60
  282. aws_cdk/aws_wisdom/__init__.py +1401 -90
  283. aws_cdk/aws_workspaces/__init__.py +93 -6
  284. aws_cdk/aws_workspacesinstances/__init__.py +3940 -0
  285. aws_cdk/aws_workspacesthinclient/__init__.py +79 -10
  286. aws_cdk/aws_workspacesweb/__init__.py +1057 -141
  287. aws_cdk/aws_xray/__init__.py +48 -8
  288. aws_cdk/cloud_assembly_schema/__init__.py +231 -6
  289. aws_cdk/custom_resources/__init__.py +40 -12
  290. aws_cdk/cx_api/__init__.py +85 -14
  291. aws_cdk/interfaces/__init__.py +739 -0
  292. aws_cdk/interfaces/alexa_ask/__init__.py +146 -0
  293. aws_cdk/interfaces/aws_accessanalyzer/__init__.py +146 -0
  294. aws_cdk/interfaces/aws_acmpca/__init__.py +501 -0
  295. aws_cdk/interfaces/aws_aiops/__init__.py +146 -0
  296. aws_cdk/interfaces/aws_amazonmq/__init__.py +386 -0
  297. aws_cdk/interfaces/aws_amplify/__init__.py +352 -0
  298. aws_cdk/interfaces/aws_amplifyuibuilder/__init__.py +454 -0
  299. aws_cdk/interfaces/aws_apigateway/__init__.py +2486 -0
  300. aws_cdk/interfaces/aws_apigatewayv2/__init__.py +1651 -0
  301. aws_cdk/interfaces/aws_appconfig/__init__.py +1020 -0
  302. aws_cdk/interfaces/aws_appflow/__init__.py +404 -0
  303. aws_cdk/interfaces/aws_appintegrations/__init__.py +396 -0
  304. aws_cdk/interfaces/aws_applicationautoscaling/__init__.py +307 -0
  305. aws_cdk/interfaces/aws_applicationinsights/__init__.py +148 -0
  306. aws_cdk/interfaces/aws_applicationsignals/__init__.py +358 -0
  307. aws_cdk/interfaces/aws_appmesh/__init__.py +888 -0
  308. aws_cdk/interfaces/aws_apprunner/__init__.py +564 -0
  309. aws_cdk/interfaces/aws_appstream/__init__.py +1482 -0
  310. aws_cdk/interfaces/aws_appsync/__init__.py +1326 -0
  311. aws_cdk/interfaces/aws_apptest/__init__.py +163 -0
  312. aws_cdk/interfaces/aws_aps/__init__.py +558 -0
  313. aws_cdk/interfaces/aws_arcregionswitch/__init__.py +146 -0
  314. aws_cdk/interfaces/aws_arczonalshift/__init__.py +273 -0
  315. aws_cdk/interfaces/aws_athena/__init__.py +575 -0
  316. aws_cdk/interfaces/aws_auditmanager/__init__.py +163 -0
  317. aws_cdk/interfaces/aws_autoscaling/__init__.py +705 -0
  318. aws_cdk/interfaces/aws_autoscalingplans/__init__.py +148 -0
  319. aws_cdk/interfaces/aws_b2bi/__init__.py +524 -0
  320. aws_cdk/interfaces/aws_backup/__init__.py +955 -0
  321. aws_cdk/interfaces/aws_backupgateway/__init__.py +146 -0
  322. aws_cdk/interfaces/aws_batch/__init__.py +681 -0
  323. aws_cdk/interfaces/aws_bcmdataexports/__init__.py +146 -0
  324. aws_cdk/interfaces/aws_bedrock/__init__.py +1942 -0
  325. aws_cdk/interfaces/aws_bedrockagentcore/__init__.py +934 -0
  326. aws_cdk/interfaces/aws_billing/__init__.py +146 -0
  327. aws_cdk/interfaces/aws_billingconductor/__init__.py +463 -0
  328. aws_cdk/interfaces/aws_budgets/__init__.py +261 -0
  329. aws_cdk/interfaces/aws_cassandra/__init__.py +381 -0
  330. aws_cdk/interfaces/aws_ce/__init__.py +352 -0
  331. aws_cdk/interfaces/aws_certificatemanager/__init__.py +251 -0
  332. aws_cdk/interfaces/aws_chatbot/__init__.py +366 -0
  333. aws_cdk/interfaces/aws_cleanrooms/__init__.py +1103 -0
  334. aws_cdk/interfaces/aws_cleanroomsml/__init__.py +148 -0
  335. aws_cdk/interfaces/aws_cloud9/__init__.py +166 -0
  336. aws_cdk/interfaces/aws_cloudformation/__init__.py +1919 -0
  337. aws_cdk/interfaces/aws_cloudfront/__init__.py +1998 -0
  338. aws_cdk/interfaces/aws_cloudtrail/__init__.py +570 -0
  339. aws_cdk/interfaces/aws_cloudwatch/__init__.py +733 -0
  340. aws_cdk/interfaces/aws_codeartifact/__init__.py +352 -0
  341. aws_cdk/interfaces/aws_codebuild/__init__.py +487 -0
  342. aws_cdk/interfaces/aws_codecommit/__init__.py +163 -0
  343. aws_cdk/interfaces/aws_codeconnections/__init__.py +146 -0
  344. aws_cdk/interfaces/aws_codedeploy/__init__.py +352 -0
  345. aws_cdk/interfaces/aws_codeguruprofiler/__init__.py +168 -0
  346. aws_cdk/interfaces/aws_codegurureviewer/__init__.py +148 -0
  347. aws_cdk/interfaces/aws_codepipeline/__init__.py +388 -0
  348. aws_cdk/interfaces/aws_codestar/__init__.py +146 -0
  349. aws_cdk/interfaces/aws_codestarconnections/__init__.py +370 -0
  350. aws_cdk/interfaces/aws_codestarnotifications/__init__.py +148 -0
  351. aws_cdk/interfaces/aws_cognito/__init__.py +1929 -0
  352. aws_cdk/interfaces/aws_comprehend/__init__.py +251 -0
  353. aws_cdk/interfaces/aws_config/__init__.py +1165 -0
  354. aws_cdk/interfaces/aws_connect/__init__.py +2949 -0
  355. aws_cdk/interfaces/aws_connectcampaigns/__init__.py +146 -0
  356. aws_cdk/interfaces/aws_connectcampaignsv2/__init__.py +146 -0
  357. aws_cdk/interfaces/aws_controltower/__init__.py +394 -0
  358. aws_cdk/interfaces/aws_cur/__init__.py +146 -0
  359. aws_cdk/interfaces/aws_customerprofiles/__init__.py +915 -0
  360. aws_cdk/interfaces/aws_databrew/__init__.py +661 -0
  361. aws_cdk/interfaces/aws_datapipeline/__init__.py +146 -0
  362. aws_cdk/interfaces/aws_datasync/__init__.py +1384 -0
  363. aws_cdk/interfaces/aws_datazone/__init__.py +2238 -0
  364. aws_cdk/interfaces/aws_dax/__init__.py +364 -0
  365. aws_cdk/interfaces/aws_deadline/__init__.py +1303 -0
  366. aws_cdk/interfaces/aws_detective/__init__.py +364 -0
  367. aws_cdk/interfaces/aws_devicefarm/__init__.py +663 -0
  368. aws_cdk/interfaces/aws_devopsguru/__init__.py +362 -0
  369. aws_cdk/interfaces/aws_directoryservice/__init__.py +251 -0
  370. aws_cdk/interfaces/aws_dlm/__init__.py +166 -0
  371. aws_cdk/interfaces/aws_dms/__init__.py +1176 -0
  372. aws_cdk/interfaces/aws_docdb/__init__.py +560 -0
  373. aws_cdk/interfaces/aws_docdbelastic/__init__.py +146 -0
  374. aws_cdk/interfaces/aws_dsql/__init__.py +146 -0
  375. aws_cdk/interfaces/aws_dynamodb/__init__.py +278 -0
  376. aws_cdk/interfaces/aws_ec2/__init__.py +11963 -0
  377. aws_cdk/interfaces/aws_ecr/__init__.py +814 -0
  378. aws_cdk/interfaces/aws_ecs/__init__.py +845 -0
  379. aws_cdk/interfaces/aws_efs/__init__.py +392 -0
  380. aws_cdk/interfaces/aws_eks/__init__.py +948 -0
  381. aws_cdk/interfaces/aws_elasticache/__init__.py +1108 -0
  382. aws_cdk/interfaces/aws_elasticbeanstalk/__init__.py +503 -0
  383. aws_cdk/interfaces/aws_elasticloadbalancing/__init__.py +148 -0
  384. aws_cdk/interfaces/aws_elasticloadbalancingv2/__init__.py +795 -0
  385. aws_cdk/interfaces/aws_elasticsearch/__init__.py +158 -0
  386. aws_cdk/interfaces/aws_emr/__init__.py +913 -0
  387. aws_cdk/interfaces/aws_emrcontainers/__init__.py +168 -0
  388. aws_cdk/interfaces/aws_emrserverless/__init__.py +166 -0
  389. aws_cdk/interfaces/aws_entityresolution/__init__.py +608 -0
  390. aws_cdk/interfaces/aws_events/__init__.py +872 -0
  391. aws_cdk/interfaces/aws_eventschemas/__init__.py +455 -0
  392. aws_cdk/interfaces/aws_evidently/__init__.py +558 -0
  393. aws_cdk/interfaces/aws_evs/__init__.py +166 -0
  394. aws_cdk/interfaces/aws_finspace/__init__.py +166 -0
  395. aws_cdk/interfaces/aws_fis/__init__.py +271 -0
  396. aws_cdk/interfaces/aws_fms/__init__.py +364 -0
  397. aws_cdk/interfaces/aws_forecast/__init__.py +249 -0
  398. aws_cdk/interfaces/aws_frauddetector/__init__.py +764 -0
  399. aws_cdk/interfaces/aws_fsx/__init__.py +663 -0
  400. aws_cdk/interfaces/aws_gamelift/__init__.py +1325 -0
  401. aws_cdk/interfaces/aws_gameliftstreams/__init__.py +249 -0
  402. aws_cdk/interfaces/aws_globalaccelerator/__init__.py +461 -0
  403. aws_cdk/interfaces/aws_glue/__init__.py +2377 -0
  404. aws_cdk/interfaces/aws_grafana/__init__.py +146 -0
  405. aws_cdk/interfaces/aws_greengrass/__init__.py +1871 -0
  406. aws_cdk/interfaces/aws_greengrassv2/__init__.py +251 -0
  407. aws_cdk/interfaces/aws_groundstation/__init__.py +396 -0
  408. aws_cdk/interfaces/aws_guardduty/__init__.py +1225 -0
  409. aws_cdk/interfaces/aws_healthimaging/__init__.py +163 -0
  410. aws_cdk/interfaces/aws_healthlake/__init__.py +146 -0
  411. aws_cdk/interfaces/aws_iam/__init__.py +1803 -0
  412. aws_cdk/interfaces/aws_identitystore/__init__.py +288 -0
  413. aws_cdk/interfaces/aws_imagebuilder/__init__.py +984 -0
  414. aws_cdk/interfaces/aws_inspector/__init__.py +354 -0
  415. aws_cdk/interfaces/aws_inspectorv2/__init__.py +467 -0
  416. aws_cdk/interfaces/aws_internetmonitor/__init__.py +163 -0
  417. aws_cdk/interfaces/aws_invoicing/__init__.py +146 -0
  418. aws_cdk/interfaces/aws_iot/__init__.py +3483 -0
  419. aws_cdk/interfaces/aws_iotanalytics/__init__.py +455 -0
  420. aws_cdk/interfaces/aws_iotcoredeviceadvisor/__init__.py +168 -0
  421. aws_cdk/interfaces/aws_iotevents/__init__.py +352 -0
  422. aws_cdk/interfaces/aws_iotfleethub/__init__.py +166 -0
  423. aws_cdk/interfaces/aws_iotfleetwise/__init__.py +892 -0
  424. aws_cdk/interfaces/aws_iotsitewise/__init__.py +1097 -0
  425. aws_cdk/interfaces/aws_iotthingsgraph/__init__.py +146 -0
  426. aws_cdk/interfaces/aws_iottwinmaker/__init__.py +711 -0
  427. aws_cdk/interfaces/aws_iotwireless/__init__.py +1401 -0
  428. aws_cdk/interfaces/aws_ivs/__init__.py +1075 -0
  429. aws_cdk/interfaces/aws_ivschat/__init__.py +251 -0
  430. aws_cdk/interfaces/aws_kafkaconnect/__init__.py +354 -0
  431. aws_cdk/interfaces/aws_kendra/__init__.py +428 -0
  432. aws_cdk/interfaces/aws_kendraranking/__init__.py +166 -0
  433. aws_cdk/interfaces/aws_kinesis/__init__.py +364 -0
  434. aws_cdk/interfaces/aws_kinesisanalytics/__init__.py +364 -0
  435. aws_cdk/interfaces/aws_kinesisanalyticsv2/__init__.py +479 -0
  436. aws_cdk/interfaces/aws_kinesisfirehose/__init__.py +168 -0
  437. aws_cdk/interfaces/aws_kinesisvideo/__init__.py +283 -0
  438. aws_cdk/interfaces/aws_kms/__init__.py +376 -0
  439. aws_cdk/interfaces/aws_lakeformation/__init__.py +860 -0
  440. aws_cdk/interfaces/aws_lambda/__init__.py +1141 -0
  441. aws_cdk/interfaces/aws_launchwizard/__init__.py +146 -0
  442. aws_cdk/interfaces/aws_lex/__init__.py +513 -0
  443. aws_cdk/interfaces/aws_licensemanager/__init__.py +249 -0
  444. aws_cdk/interfaces/aws_lightsail/__init__.py +1744 -0
  445. aws_cdk/interfaces/aws_location/__init__.py +879 -0
  446. aws_cdk/interfaces/aws_logs/__init__.py +1667 -0
  447. aws_cdk/interfaces/aws_lookoutequipment/__init__.py +168 -0
  448. aws_cdk/interfaces/aws_lookoutmetrics/__init__.py +251 -0
  449. aws_cdk/interfaces/aws_lookoutvision/__init__.py +163 -0
  450. aws_cdk/interfaces/aws_m2/__init__.py +352 -0
  451. aws_cdk/interfaces/aws_macie/__init__.py +512 -0
  452. aws_cdk/interfaces/aws_managedblockchain/__init__.py +381 -0
  453. aws_cdk/interfaces/aws_mediaconnect/__init__.py +1028 -0
  454. aws_cdk/interfaces/aws_mediaconvert/__init__.py +396 -0
  455. aws_cdk/interfaces/aws_medialive/__init__.py +1755 -0
  456. aws_cdk/interfaces/aws_mediapackage/__init__.py +644 -0
  457. aws_cdk/interfaces/aws_mediapackagev2/__init__.py +618 -0
  458. aws_cdk/interfaces/aws_mediastore/__init__.py +146 -0
  459. aws_cdk/interfaces/aws_mediatailor/__init__.py +788 -0
  460. aws_cdk/interfaces/aws_memorydb/__init__.py +685 -0
  461. aws_cdk/interfaces/aws_mpa/__init__.py +249 -0
  462. aws_cdk/interfaces/aws_msk/__init__.py +764 -0
  463. aws_cdk/interfaces/aws_mwaa/__init__.py +166 -0
  464. aws_cdk/interfaces/aws_neptune/__init__.py +663 -0
  465. aws_cdk/interfaces/aws_neptunegraph/__init__.py +265 -0
  466. aws_cdk/interfaces/aws_networkfirewall/__init__.py +669 -0
  467. aws_cdk/interfaces/aws_networkmanager/__init__.py +1832 -0
  468. aws_cdk/interfaces/aws_nimblestudio/__init__.py +388 -0
  469. aws_cdk/interfaces/aws_notifications/__init__.py +868 -0
  470. aws_cdk/interfaces/aws_notificationscontacts/__init__.py +148 -0
  471. aws_cdk/interfaces/aws_oam/__init__.py +249 -0
  472. aws_cdk/interfaces/aws_observabilityadmin/__init__.py +362 -0
  473. aws_cdk/interfaces/aws_odb/__init__.py +562 -0
  474. aws_cdk/interfaces/aws_omics/__init__.py +838 -0
  475. aws_cdk/interfaces/aws_opensearchserverless/__init__.py +859 -0
  476. aws_cdk/interfaces/aws_opensearchservice/__init__.py +283 -0
  477. aws_cdk/interfaces/aws_opsworks/__init__.py +772 -0
  478. aws_cdk/interfaces/aws_opsworkscm/__init__.py +146 -0
  479. aws_cdk/interfaces/aws_organizations/__init__.py +646 -0
  480. aws_cdk/interfaces/aws_osis/__init__.py +146 -0
  481. aws_cdk/interfaces/aws_panorama/__init__.py +420 -0
  482. aws_cdk/interfaces/aws_paymentcryptography/__init__.py +249 -0
  483. aws_cdk/interfaces/aws_pcaconnectorad/__init__.py +608 -0
  484. aws_cdk/interfaces/aws_pcaconnectorscep/__init__.py +249 -0
  485. aws_cdk/interfaces/aws_pcs/__init__.py +352 -0
  486. aws_cdk/interfaces/aws_personalize/__init__.py +455 -0
  487. aws_cdk/interfaces/aws_pinpoint/__init__.py +2125 -0
  488. aws_cdk/interfaces/aws_pinpointemail/__init__.py +467 -0
  489. aws_cdk/interfaces/aws_pipes/__init__.py +158 -0
  490. aws_cdk/interfaces/aws_proton/__init__.py +360 -0
  491. aws_cdk/interfaces/aws_qbusiness/__init__.py +1122 -0
  492. aws_cdk/interfaces/aws_qldb/__init__.py +283 -0
  493. aws_cdk/interfaces/aws_quicksight/__init__.py +1566 -0
  494. aws_cdk/interfaces/aws_ram/__init__.py +249 -0
  495. aws_cdk/interfaces/aws_rbin/__init__.py +146 -0
  496. aws_cdk/interfaces/aws_rds/__init__.py +1780 -0
  497. aws_cdk/interfaces/aws_redshift/__init__.py +1104 -0
  498. aws_cdk/interfaces/aws_redshiftserverless/__init__.py +356 -0
  499. aws_cdk/interfaces/aws_refactorspaces/__init__.py +605 -0
  500. aws_cdk/interfaces/aws_rekognition/__init__.py +406 -0
  501. aws_cdk/interfaces/aws_resiliencehub/__init__.py +251 -0
  502. aws_cdk/interfaces/aws_resourceexplorer2/__init__.py +354 -0
  503. aws_cdk/interfaces/aws_resourcegroups/__init__.py +261 -0
  504. aws_cdk/interfaces/aws_robomaker/__init__.py +673 -0
  505. aws_cdk/interfaces/aws_rolesanywhere/__init__.py +384 -0
  506. aws_cdk/interfaces/aws_route53/__init__.py +804 -0
  507. aws_cdk/interfaces/aws_route53profiles/__init__.py +368 -0
  508. aws_cdk/interfaces/aws_route53recoverycontrol/__init__.py +463 -0
  509. aws_cdk/interfaces/aws_route53recoveryreadiness/__init__.py +535 -0
  510. aws_cdk/interfaces/aws_route53resolver/__init__.py +1356 -0
  511. aws_cdk/interfaces/aws_rtbfabric/__init__.py +352 -0
  512. aws_cdk/interfaces/aws_rum/__init__.py +146 -0
  513. aws_cdk/interfaces/aws_s3/__init__.py +1171 -0
  514. aws_cdk/interfaces/aws_s3express/__init__.py +392 -0
  515. aws_cdk/interfaces/aws_s3objectlambda/__init__.py +271 -0
  516. aws_cdk/interfaces/aws_s3outposts/__init__.py +455 -0
  517. aws_cdk/interfaces/aws_s3tables/__init__.py +575 -0
  518. aws_cdk/interfaces/aws_s3vectors/__init__.py +354 -0
  519. aws_cdk/interfaces/aws_sagemaker/__init__.py +3797 -0
  520. aws_cdk/interfaces/aws_sam/__init__.py +603 -0
  521. aws_cdk/interfaces/aws_scheduler/__init__.py +286 -0
  522. aws_cdk/interfaces/aws_sdb/__init__.py +146 -0
  523. aws_cdk/interfaces/aws_secretsmanager/__init__.py +461 -0
  524. aws_cdk/interfaces/aws_securityhub/__init__.py +1499 -0
  525. aws_cdk/interfaces/aws_securitylake/__init__.py +474 -0
  526. aws_cdk/interfaces/aws_servicecatalog/__init__.py +1829 -0
  527. aws_cdk/interfaces/aws_servicecatalogappregistry/__init__.py +557 -0
  528. aws_cdk/interfaces/aws_servicediscovery/__init__.py +636 -0
  529. aws_cdk/interfaces/aws_ses/__init__.py +2018 -0
  530. aws_cdk/interfaces/aws_shield/__init__.py +455 -0
  531. aws_cdk/interfaces/aws_signer/__init__.py +266 -0
  532. aws_cdk/interfaces/aws_simspaceweaver/__init__.py +146 -0
  533. aws_cdk/interfaces/aws_smsvoice/__init__.py +892 -0
  534. aws_cdk/interfaces/aws_sns/__init__.py +455 -0
  535. aws_cdk/interfaces/aws_sqs/__init__.py +364 -0
  536. aws_cdk/interfaces/aws_ssm/__init__.py +982 -0
  537. aws_cdk/interfaces/aws_ssmcontacts/__init__.py +455 -0
  538. aws_cdk/interfaces/aws_ssmguiconnect/__init__.py +146 -0
  539. aws_cdk/interfaces/aws_ssmincidents/__init__.py +249 -0
  540. aws_cdk/interfaces/aws_ssmquicksetup/__init__.py +253 -0
  541. aws_cdk/interfaces/aws_sso/__init__.py +797 -0
  542. aws_cdk/interfaces/aws_stepfunctions/__init__.py +459 -0
  543. aws_cdk/interfaces/aws_supportapp/__init__.py +372 -0
  544. aws_cdk/interfaces/aws_synthetics/__init__.py +249 -0
  545. aws_cdk/interfaces/aws_systemsmanagersap/__init__.py +148 -0
  546. aws_cdk/interfaces/aws_timestream/__init__.py +526 -0
  547. aws_cdk/interfaces/aws_transfer/__init__.py +967 -0
  548. aws_cdk/interfaces/aws_verifiedpermissions/__init__.py +538 -0
  549. aws_cdk/interfaces/aws_voiceid/__init__.py +146 -0
  550. aws_cdk/interfaces/aws_vpclattice/__init__.py +1418 -0
  551. aws_cdk/interfaces/aws_waf/__init__.py +764 -0
  552. aws_cdk/interfaces/aws_wafregional/__init__.py +1182 -0
  553. aws_cdk/interfaces/aws_wafv2/__init__.py +870 -0
  554. aws_cdk/interfaces/aws_wisdom/__init__.py +1556 -0
  555. aws_cdk/interfaces/aws_workspaces/__init__.py +352 -0
  556. aws_cdk/interfaces/aws_workspacesinstances/__init__.py +390 -0
  557. aws_cdk/interfaces/aws_workspacesthinclient/__init__.py +168 -0
  558. aws_cdk/interfaces/aws_workspacesweb/__init__.py +1085 -0
  559. aws_cdk/interfaces/aws_xray/__init__.py +457 -0
  560. aws_cdk/pipelines/__init__.py +192 -42
  561. aws_cdk/region_info/__init__.py +3 -0
  562. aws_cdk/triggers/__init__.py +60 -18
  563. {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/METADATA +338 -16
  564. aws_cdk_lib-2.224.0.dist-info/RECORD +584 -0
  565. aws_cdk_lib-2.200.2.dist-info/RECORD +0 -304
  566. {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/LICENSE +0 -0
  567. {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/NOTICE +0 -0
  568. {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/WHEEL +0 -0
  569. {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/top_level.txt +0 -0
@@ -68,15 +68,29 @@ from .. import (
68
68
  TagManager as _TagManager_0a598cb3,
69
69
  TreeInspector as _TreeInspector_488e0dd5,
70
70
  )
71
+ from ..interfaces.aws_networkfirewall import (
72
+ FirewallPolicyReference as _FirewallPolicyReference_590b2e0a,
73
+ FirewallReference as _FirewallReference_2bf55714,
74
+ IFirewallPolicyRef as _IFirewallPolicyRef_bd446a4d,
75
+ IFirewallRef as _IFirewallRef_31769805,
76
+ ILoggingConfigurationRef as _ILoggingConfigurationRef_1588c620,
77
+ IRuleGroupRef as _IRuleGroupRef_f1ee71d3,
78
+ ITLSInspectionConfigurationRef as _ITLSInspectionConfigurationRef_6d0a6d9c,
79
+ IVpcEndpointAssociationRef as _IVpcEndpointAssociationRef_bd0818d9,
80
+ LoggingConfigurationReference as _LoggingConfigurationReference_f6c32f6c,
81
+ RuleGroupReference as _RuleGroupReference_b514c132,
82
+ TLSInspectionConfigurationReference as _TLSInspectionConfigurationReference_52bd7dd3,
83
+ VpcEndpointAssociationReference as _VpcEndpointAssociationReference_d627bc37,
84
+ )
71
85
 
72
86
 
73
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
87
+ @jsii.implements(_IInspectable_c2943556, _IFirewallRef_31769805, _ITaggable_36806126)
74
88
  class CfnFirewall(
75
89
  _CfnResource_9df397a6,
76
90
  metaclass=jsii.JSIIMeta,
77
91
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall",
78
92
  ):
79
- '''Use the ``Firewall`` to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
93
+ '''Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
80
94
 
81
95
  The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
82
96
 
@@ -93,24 +107,29 @@ class CfnFirewall(
93
107
  cfn_firewall = networkfirewall.CfnFirewall(self, "MyCfnFirewall",
94
108
  firewall_name="firewallName",
95
109
  firewall_policy_arn="firewallPolicyArn",
96
- subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
97
- subnet_id="subnetId",
98
-
99
- # the properties below are optional
100
- ip_address_type="ipAddressType"
101
- )],
102
- vpc_id="vpcId",
103
110
 
104
111
  # the properties below are optional
112
+ availability_zone_change_protection=False,
113
+ availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
114
+ availability_zone="availabilityZone"
115
+ )],
105
116
  delete_protection=False,
106
117
  description="description",
107
118
  enabled_analysis_types=["enabledAnalysisTypes"],
108
119
  firewall_policy_change_protection=False,
109
120
  subnet_change_protection=False,
121
+ subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
122
+ subnet_id="subnetId",
123
+
124
+ # the properties below are optional
125
+ ip_address_type="ipAddressType"
126
+ )],
110
127
  tags=[CfnTag(
111
128
  key="key",
112
129
  value="value"
113
- )]
130
+ )],
131
+ transit_gateway_id="transitGatewayId",
132
+ vpc_id="vpcId"
114
133
  )
115
134
  '''
116
135
 
@@ -121,28 +140,35 @@ class CfnFirewall(
121
140
  *,
122
141
  firewall_name: builtins.str,
123
142
  firewall_policy_arn: builtins.str,
124
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]],
125
- vpc_id: builtins.str,
143
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
144
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.AvailabilityZoneMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
126
145
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
127
146
  description: typing.Optional[builtins.str] = None,
128
147
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
129
148
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
130
149
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
150
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
131
151
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
152
+ transit_gateway_id: typing.Optional[builtins.str] = None,
153
+ vpc_id: typing.Optional[builtins.str] = None,
132
154
  ) -> None:
133
- '''
155
+ '''Create a new ``AWS::NetworkFirewall::Firewall``.
156
+
134
157
  :param scope: Scope in which this resource is defined.
135
158
  :param id: Construct identifier for this resource (unique in its scope).
136
159
  :param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
137
160
  :param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
138
- :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
139
- :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
161
+ :param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
162
+ :param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
140
163
  :param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
141
164
  :param description: A description of the firewall.
142
165
  :param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
143
166
  :param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
144
167
  :param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
168
+ :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
145
169
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
170
+ :param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
171
+ :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
146
172
  '''
147
173
  if __debug__:
148
174
  type_hints = typing.get_type_hints(_typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56)
@@ -151,14 +177,17 @@ class CfnFirewall(
151
177
  props = CfnFirewallProps(
152
178
  firewall_name=firewall_name,
153
179
  firewall_policy_arn=firewall_policy_arn,
154
- subnet_mappings=subnet_mappings,
155
- vpc_id=vpc_id,
180
+ availability_zone_change_protection=availability_zone_change_protection,
181
+ availability_zone_mappings=availability_zone_mappings,
156
182
  delete_protection=delete_protection,
157
183
  description=description,
158
184
  enabled_analysis_types=enabled_analysis_types,
159
185
  firewall_policy_change_protection=firewall_policy_change_protection,
160
186
  subnet_change_protection=subnet_change_protection,
187
+ subnet_mappings=subnet_mappings,
161
188
  tags=tags,
189
+ transit_gateway_id=transit_gateway_id,
190
+ vpc_id=vpc_id,
162
191
  )
163
192
 
164
193
  jsii.create(self.__class__, self, [scope, id, props])
@@ -207,7 +236,7 @@ class CfnFirewall(
207
236
  @builtins.property
208
237
  @jsii.member(jsii_name="attrFirewallArn")
209
238
  def attr_firewall_arn(self) -> builtins.str:
210
- '''The Amazon Resource Name (ARN) of the ``Firewall`` .
239
+ '''The Amazon Resource Name (ARN) of the firewall.
211
240
 
212
241
  :cloudformationAttribute: FirewallArn
213
242
  '''
@@ -216,17 +245,34 @@ class CfnFirewall(
216
245
  @builtins.property
217
246
  @jsii.member(jsii_name="attrFirewallId")
218
247
  def attr_firewall_id(self) -> builtins.str:
219
- '''The name of the ``Firewall`` resource.
248
+ '''The name of the firewallresource.
220
249
 
221
250
  :cloudformationAttribute: FirewallId
222
251
  '''
223
252
  return typing.cast(builtins.str, jsii.get(self, "attrFirewallId"))
224
253
 
254
+ @builtins.property
255
+ @jsii.member(jsii_name="attrTransitGatewayAttachmentId")
256
+ def attr_transit_gateway_attachment_id(self) -> builtins.str:
257
+ '''The unique identifier of the transit gateway attachment associated with this firewall.
258
+
259
+ This field is only present for transit gateway-attached firewalls.
260
+
261
+ :cloudformationAttribute: TransitGatewayAttachmentId
262
+ '''
263
+ return typing.cast(builtins.str, jsii.get(self, "attrTransitGatewayAttachmentId"))
264
+
225
265
  @builtins.property
226
266
  @jsii.member(jsii_name="cfnProperties")
227
267
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
228
268
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
229
269
 
270
+ @builtins.property
271
+ @jsii.member(jsii_name="firewallRef")
272
+ def firewall_ref(self) -> _FirewallReference_2bf55714:
273
+ '''A reference to a Firewall resource.'''
274
+ return typing.cast(_FirewallReference_2bf55714, jsii.get(self, "firewallRef"))
275
+
230
276
  @builtins.property
231
277
  @jsii.member(jsii_name="tags")
232
278
  def tags(self) -> _TagManager_0a598cb3:
@@ -260,35 +306,40 @@ class CfnFirewall(
260
306
  jsii.set(self, "firewallPolicyArn", value) # pyright: ignore[reportArgumentType]
261
307
 
262
308
  @builtins.property
263
- @jsii.member(jsii_name="subnetMappings")
264
- def subnet_mappings(
309
+ @jsii.member(jsii_name="availabilityZoneChangeProtection")
310
+ def availability_zone_change_protection(
265
311
  self,
266
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]:
267
- '''The primary public subnets that Network Firewall is using for the firewall.'''
268
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]], jsii.get(self, "subnetMappings"))
312
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
313
+ '''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.'''
314
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "availabilityZoneChangeProtection"))
269
315
 
270
- @subnet_mappings.setter
271
- def subnet_mappings(
316
+ @availability_zone_change_protection.setter
317
+ def availability_zone_change_protection(
272
318
  self,
273
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]],
319
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
274
320
  ) -> None:
275
321
  if __debug__:
276
- type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
322
+ type_hints = typing.get_type_hints(_typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1)
277
323
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
278
- jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
324
+ jsii.set(self, "availabilityZoneChangeProtection", value) # pyright: ignore[reportArgumentType]
279
325
 
280
326
  @builtins.property
281
- @jsii.member(jsii_name="vpcId")
282
- def vpc_id(self) -> builtins.str:
283
- '''The unique identifier of the VPC where the firewall is in use.'''
284
- return typing.cast(builtins.str, jsii.get(self, "vpcId"))
327
+ @jsii.member(jsii_name="availabilityZoneMappings")
328
+ def availability_zone_mappings(
329
+ self,
330
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]]:
331
+ '''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.'''
332
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]], jsii.get(self, "availabilityZoneMappings"))
285
333
 
286
- @vpc_id.setter
287
- def vpc_id(self, value: builtins.str) -> None:
334
+ @availability_zone_mappings.setter
335
+ def availability_zone_mappings(
336
+ self,
337
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]],
338
+ ) -> None:
288
339
  if __debug__:
289
- type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
340
+ type_hints = typing.get_type_hints(_typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77)
290
341
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
291
- jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
342
+ jsii.set(self, "availabilityZoneMappings", value) # pyright: ignore[reportArgumentType]
292
343
 
293
344
  @builtins.property
294
345
  @jsii.member(jsii_name="deleteProtection")
@@ -373,6 +424,24 @@ class CfnFirewall(
373
424
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
374
425
  jsii.set(self, "subnetChangeProtection", value) # pyright: ignore[reportArgumentType]
375
426
 
427
+ @builtins.property
428
+ @jsii.member(jsii_name="subnetMappings")
429
+ def subnet_mappings(
430
+ self,
431
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]]:
432
+ '''The primary public subnets that Network Firewall is using for the firewall.'''
433
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]], jsii.get(self, "subnetMappings"))
434
+
435
+ @subnet_mappings.setter
436
+ def subnet_mappings(
437
+ self,
438
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]],
439
+ ) -> None:
440
+ if __debug__:
441
+ type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
442
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
443
+ jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
444
+
376
445
  @builtins.property
377
446
  @jsii.member(jsii_name="tagsRaw")
378
447
  def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
@@ -386,6 +455,90 @@ class CfnFirewall(
386
455
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
387
456
  jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
388
457
 
458
+ @builtins.property
459
+ @jsii.member(jsii_name="transitGatewayId")
460
+ def transit_gateway_id(self) -> typing.Optional[builtins.str]:
461
+ '''The unique identifier of the transit gateway associated with this firewall.'''
462
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "transitGatewayId"))
463
+
464
+ @transit_gateway_id.setter
465
+ def transit_gateway_id(self, value: typing.Optional[builtins.str]) -> None:
466
+ if __debug__:
467
+ type_hints = typing.get_type_hints(_typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6)
468
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
469
+ jsii.set(self, "transitGatewayId", value) # pyright: ignore[reportArgumentType]
470
+
471
+ @builtins.property
472
+ @jsii.member(jsii_name="vpcId")
473
+ def vpc_id(self) -> typing.Optional[builtins.str]:
474
+ '''The unique identifier of the VPC where the firewall is in use.'''
475
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "vpcId"))
476
+
477
+ @vpc_id.setter
478
+ def vpc_id(self, value: typing.Optional[builtins.str]) -> None:
479
+ if __debug__:
480
+ type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
481
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
482
+ jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
483
+
484
+ @jsii.data_type(
485
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty",
486
+ jsii_struct_bases=[],
487
+ name_mapping={"availability_zone": "availabilityZone"},
488
+ )
489
+ class AvailabilityZoneMappingProperty:
490
+ def __init__(self, *, availability_zone: builtins.str) -> None:
491
+ '''Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall.
492
+
493
+ Each mapping represents where the firewall can process traffic. You use these mappings when calling ``CreateFirewall`` , ``AssociateAvailabilityZones`` , and ``DisassociateAvailabilityZones`` .
494
+
495
+ To retrieve the current Availability Zone mappings for a firewall, use ``DescribeFirewall`` .
496
+
497
+ :param availability_zone: The ID of the Availability Zone where the firewall endpoint is located. For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
498
+
499
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html
500
+ :exampleMetadata: fixture=_generated
501
+
502
+ Example::
503
+
504
+ # The code below shows an example of how to instantiate this type.
505
+ # The values are placeholders you should change.
506
+ from aws_cdk import aws_networkfirewall as networkfirewall
507
+
508
+ availability_zone_mapping_property = networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
509
+ availability_zone="availabilityZone"
510
+ )
511
+ '''
512
+ if __debug__:
513
+ type_hints = typing.get_type_hints(_typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf)
514
+ check_type(argname="argument availability_zone", value=availability_zone, expected_type=type_hints["availability_zone"])
515
+ self._values: typing.Dict[builtins.str, typing.Any] = {
516
+ "availability_zone": availability_zone,
517
+ }
518
+
519
+ @builtins.property
520
+ def availability_zone(self) -> builtins.str:
521
+ '''The ID of the Availability Zone where the firewall endpoint is located.
522
+
523
+ For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
524
+
525
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone
526
+ '''
527
+ result = self._values.get("availability_zone")
528
+ assert result is not None, "Required property 'availability_zone' is missing"
529
+ return typing.cast(builtins.str, result)
530
+
531
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
532
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
533
+
534
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
535
+ return not (rhs == self)
536
+
537
+ def __repr__(self) -> str:
538
+ return "AvailabilityZoneMappingProperty(%s)" % ", ".join(
539
+ k + "=" + repr(v) for k, v in self._values.items()
540
+ )
541
+
389
542
  @jsii.data_type(
390
543
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.SubnetMappingProperty",
391
544
  jsii_struct_bases=[],
@@ -464,13 +617,13 @@ class CfnFirewall(
464
617
  )
465
618
 
466
619
 
467
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
620
+ @jsii.implements(_IInspectable_c2943556, _IFirewallPolicyRef_bd446a4d, _ITaggable_36806126)
468
621
  class CfnFirewallPolicy(
469
622
  _CfnResource_9df397a6,
470
623
  metaclass=jsii.JSIIMeta,
471
624
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewallPolicy",
472
625
  ):
473
- '''Use the ``FirewallPolicy`` to define the stateless and stateful network traffic filtering behavior for your ``Firewall`` .
626
+ '''Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall.
474
627
 
475
628
  You can use one firewall policy for multiple firewalls.
476
629
 
@@ -490,6 +643,7 @@ class CfnFirewallPolicy(
490
643
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
491
644
 
492
645
  # the properties below are optional
646
+ enable_tls_session_holding=False,
493
647
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
494
648
  rule_variables={
495
649
  "rule_variables_key": {
@@ -509,6 +663,7 @@ class CfnFirewallPolicy(
509
663
  resource_arn="resourceArn",
510
664
 
511
665
  # the properties below are optional
666
+ deep_threat_inspection=False,
512
667
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
513
668
  action="action"
514
669
  ),
@@ -551,7 +706,8 @@ class CfnFirewallPolicy(
551
706
  description: typing.Optional[builtins.str] = None,
552
707
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
553
708
  ) -> None:
554
- '''
709
+ '''Create a new ``AWS::NetworkFirewall::FirewallPolicy``.
710
+
555
711
  :param scope: Scope in which this resource is defined.
556
712
  :param id: Construct identifier for this resource (unique in its scope).
557
713
  :param firewall_policy: The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings.
@@ -605,7 +761,7 @@ class CfnFirewallPolicy(
605
761
  @builtins.property
606
762
  @jsii.member(jsii_name="attrFirewallPolicyArn")
607
763
  def attr_firewall_policy_arn(self) -> builtins.str:
608
- '''The Amazon Resource Name (ARN) of the ``FirewallPolicy`` .
764
+ '''The Amazon Resource Name (ARN) of the firewall policy.
609
765
 
610
766
  :cloudformationAttribute: FirewallPolicyArn
611
767
  '''
@@ -614,7 +770,7 @@ class CfnFirewallPolicy(
614
770
  @builtins.property
615
771
  @jsii.member(jsii_name="attrFirewallPolicyId")
616
772
  def attr_firewall_policy_id(self) -> builtins.str:
617
- '''The unique ID of the ``FirewallPolicy`` resource.
773
+ '''The unique ID of the firewall policy resource.
618
774
 
619
775
  :cloudformationAttribute: FirewallPolicyId
620
776
  '''
@@ -625,6 +781,12 @@ class CfnFirewallPolicy(
625
781
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
626
782
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
627
783
 
784
+ @builtins.property
785
+ @jsii.member(jsii_name="firewallPolicyRef")
786
+ def firewall_policy_ref(self) -> _FirewallPolicyReference_590b2e0a:
787
+ '''A reference to a FirewallPolicy resource.'''
788
+ return typing.cast(_FirewallPolicyReference_590b2e0a, jsii.get(self, "firewallPolicyRef"))
789
+
628
790
  @builtins.property
629
791
  @jsii.member(jsii_name="tags")
630
792
  def tags(self) -> _TagManager_0a598cb3:
@@ -776,8 +938,8 @@ class CfnFirewallPolicy(
776
938
 
777
939
  You can use custom actions in the following places:
778
940
 
779
- - In an ``RuleGroup.StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
780
- - In an ``FirewallPolicy`` specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
941
+ - In an ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
942
+ - In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
781
943
 
782
944
  :param action_definition: The custom action associated with the action name.
783
945
  :param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
@@ -910,6 +1072,7 @@ class CfnFirewallPolicy(
910
1072
  name_mapping={
911
1073
  "stateless_default_actions": "statelessDefaultActions",
912
1074
  "stateless_fragment_default_actions": "statelessFragmentDefaultActions",
1075
+ "enable_tls_session_holding": "enableTlsSessionHolding",
913
1076
  "policy_variables": "policyVariables",
914
1077
  "stateful_default_actions": "statefulDefaultActions",
915
1078
  "stateful_engine_options": "statefulEngineOptions",
@@ -925,6 +1088,7 @@ class CfnFirewallPolicy(
925
1088
  *,
926
1089
  stateless_default_actions: typing.Sequence[builtins.str],
927
1090
  stateless_fragment_default_actions: typing.Sequence[builtins.str],
1091
+ enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
928
1092
  policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.PolicyVariablesProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
929
1093
  stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
930
1094
  stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulEngineOptionsProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -937,6 +1101,7 @@ class CfnFirewallPolicy(
937
1101
 
938
1102
  :param stateless_default_actions: The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
939
1103
  :param stateless_fragment_default_actions: The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. If you want non-matching fragmented packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
1104
+ :param enable_tls_session_holding: When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules. Requires an associated TLS Inspection configuration.
940
1105
  :param policy_variables: Contains variables that you can use to override default Suricata settings in your firewall policy.
941
1106
  :param stateful_default_actions: The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order. Valid values of the stateful default action: - aws:drop_strict - aws:drop_established - aws:alert_strict - aws:alert_established For more information, see `Strict evaluation order <https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html>`_ in the *AWS Network Firewall Developer Guide* .
942
1107
  :param stateful_engine_options: Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
@@ -959,6 +1124,7 @@ class CfnFirewallPolicy(
959
1124
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
960
1125
 
961
1126
  # the properties below are optional
1127
+ enable_tls_session_holding=False,
962
1128
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
963
1129
  rule_variables={
964
1130
  "rule_variables_key": {
@@ -978,6 +1144,7 @@ class CfnFirewallPolicy(
978
1144
  resource_arn="resourceArn",
979
1145
 
980
1146
  # the properties below are optional
1147
+ deep_threat_inspection=False,
981
1148
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
982
1149
  action="action"
983
1150
  ),
@@ -1004,6 +1171,7 @@ class CfnFirewallPolicy(
1004
1171
  type_hints = typing.get_type_hints(_typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2db29fc18)
1005
1172
  check_type(argname="argument stateless_default_actions", value=stateless_default_actions, expected_type=type_hints["stateless_default_actions"])
1006
1173
  check_type(argname="argument stateless_fragment_default_actions", value=stateless_fragment_default_actions, expected_type=type_hints["stateless_fragment_default_actions"])
1174
+ check_type(argname="argument enable_tls_session_holding", value=enable_tls_session_holding, expected_type=type_hints["enable_tls_session_holding"])
1007
1175
  check_type(argname="argument policy_variables", value=policy_variables, expected_type=type_hints["policy_variables"])
1008
1176
  check_type(argname="argument stateful_default_actions", value=stateful_default_actions, expected_type=type_hints["stateful_default_actions"])
1009
1177
  check_type(argname="argument stateful_engine_options", value=stateful_engine_options, expected_type=type_hints["stateful_engine_options"])
@@ -1015,6 +1183,8 @@ class CfnFirewallPolicy(
1015
1183
  "stateless_default_actions": stateless_default_actions,
1016
1184
  "stateless_fragment_default_actions": stateless_fragment_default_actions,
1017
1185
  }
1186
+ if enable_tls_session_holding is not None:
1187
+ self._values["enable_tls_session_holding"] = enable_tls_session_holding
1018
1188
  if policy_variables is not None:
1019
1189
  self._values["policy_variables"] = policy_variables
1020
1190
  if stateful_default_actions is not None:
@@ -1062,6 +1232,19 @@ class CfnFirewallPolicy(
1062
1232
  assert result is not None, "Required property 'stateless_fragment_default_actions' is missing"
1063
1233
  return typing.cast(typing.List[builtins.str], result)
1064
1234
 
1235
+ @builtins.property
1236
+ def enable_tls_session_holding(
1237
+ self,
1238
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
1239
+ '''When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules.
1240
+
1241
+ Requires an associated TLS Inspection configuration.
1242
+
1243
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicy-enabletlssessionholding
1244
+ '''
1245
+ result = self._values.get("enable_tls_session_holding")
1246
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
1247
+
1065
1248
  @builtins.property
1066
1249
  def policy_variables(
1067
1250
  self,
@@ -1241,7 +1424,7 @@ class CfnFirewallPolicy(
1241
1424
  ) -> None:
1242
1425
  '''A list of IP addresses and address ranges, in CIDR notation.
1243
1426
 
1244
- This is part of a ``RuleVariables`` .
1427
+ This is part of a rule variable.
1245
1428
 
1246
1429
  :param definition: The list of IP addresses and address ranges, in CIDR notation.
1247
1430
 
@@ -1568,6 +1751,7 @@ class CfnFirewallPolicy(
1568
1751
  jsii_struct_bases=[],
1569
1752
  name_mapping={
1570
1753
  "resource_arn": "resourceArn",
1754
+ "deep_threat_inspection": "deepThreatInspection",
1571
1755
  "override": "override",
1572
1756
  "priority": "priority",
1573
1757
  },
@@ -1577,14 +1761,16 @@ class CfnFirewallPolicy(
1577
1761
  self,
1578
1762
  *,
1579
1763
  resource_arn: builtins.str,
1764
+ deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1580
1765
  override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulRuleGroupOverrideProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
1581
1766
  priority: typing.Optional[jsii.Number] = None,
1582
1767
  ) -> None:
1583
1768
  '''Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.
1584
1769
 
1585
1770
  :param resource_arn: The Amazon Resource Name (ARN) of the stateful rule group.
1771
+ :param deep_threat_inspection: AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. .. epigraph:: Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
1586
1772
  :param override: The action that allows the policy owner to override the behavior of the rule group within a policy.
1587
- :param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single ``FirewallPolicy`` . This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
1773
+ :param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
1588
1774
 
1589
1775
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html
1590
1776
  :exampleMetadata: fixture=_generated
@@ -1599,6 +1785,7 @@ class CfnFirewallPolicy(
1599
1785
  resource_arn="resourceArn",
1600
1786
 
1601
1787
  # the properties below are optional
1788
+ deep_threat_inspection=False,
1602
1789
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
1603
1790
  action="action"
1604
1791
  ),
@@ -1608,11 +1795,14 @@ class CfnFirewallPolicy(
1608
1795
  if __debug__:
1609
1796
  type_hints = typing.get_type_hints(_typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8)
1610
1797
  check_type(argname="argument resource_arn", value=resource_arn, expected_type=type_hints["resource_arn"])
1798
+ check_type(argname="argument deep_threat_inspection", value=deep_threat_inspection, expected_type=type_hints["deep_threat_inspection"])
1611
1799
  check_type(argname="argument override", value=override, expected_type=type_hints["override"])
1612
1800
  check_type(argname="argument priority", value=priority, expected_type=type_hints["priority"])
1613
1801
  self._values: typing.Dict[builtins.str, typing.Any] = {
1614
1802
  "resource_arn": resource_arn,
1615
1803
  }
1804
+ if deep_threat_inspection is not None:
1805
+ self._values["deep_threat_inspection"] = deep_threat_inspection
1616
1806
  if override is not None:
1617
1807
  self._values["override"] = override
1618
1808
  if priority is not None:
@@ -1628,6 +1818,22 @@ class CfnFirewallPolicy(
1628
1818
  assert result is not None, "Required property 'resource_arn' is missing"
1629
1819
  return typing.cast(builtins.str, result)
1630
1820
 
1821
+ @builtins.property
1822
+ def deep_threat_inspection(
1823
+ self,
1824
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
1825
+ '''AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability.
1826
+
1827
+ When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
1828
+ .. epigraph::
1829
+
1830
+ Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
1831
+
1832
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection
1833
+ '''
1834
+ result = self._values.get("deep_threat_inspection")
1835
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
1836
+
1631
1837
  @builtins.property
1632
1838
  def override(
1633
1839
  self,
@@ -1641,7 +1847,7 @@ class CfnFirewallPolicy(
1641
1847
 
1642
1848
  @builtins.property
1643
1849
  def priority(self) -> typing.Optional[jsii.Number]:
1644
- '''An integer setting that indicates the order in which to run the stateful rule groups in a single ``FirewallPolicy`` .
1850
+ '''An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy.
1645
1851
 
1646
1852
  This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings.
1647
1853
 
@@ -1679,7 +1885,7 @@ class CfnFirewallPolicy(
1679
1885
  ) -> None:
1680
1886
  '''Identifier for a single stateless rule group, used in a firewall policy to refer to the rule group.
1681
1887
 
1682
- :param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single ``FirewallPolicy`` . Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1888
+ :param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1683
1889
  :param resource_arn: The Amazon Resource Name (ARN) of the stateless rule group.
1684
1890
 
1685
1891
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html
@@ -1707,7 +1913,7 @@ class CfnFirewallPolicy(
1707
1913
 
1708
1914
  @builtins.property
1709
1915
  def priority(self) -> jsii.Number:
1710
- '''An integer setting that indicates the order in which to run the stateless rule groups in a single ``FirewallPolicy`` .
1916
+ '''An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy.
1711
1917
 
1712
1918
  Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
1713
1919
 
@@ -1780,6 +1986,7 @@ class CfnFirewallPolicyProps:
1780
1986
  stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
1781
1987
 
1782
1988
  # the properties below are optional
1989
+ enable_tls_session_holding=False,
1783
1990
  policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
1784
1991
  rule_variables={
1785
1992
  "rule_variables_key": {
@@ -1799,6 +2006,7 @@ class CfnFirewallPolicyProps:
1799
2006
  resource_arn="resourceArn",
1800
2007
 
1801
2008
  # the properties below are optional
2009
+ deep_threat_inspection=False,
1802
2010
  override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
1803
2011
  action="action"
1804
2012
  ),
@@ -1907,14 +2115,17 @@ class CfnFirewallPolicyProps:
1907
2115
  name_mapping={
1908
2116
  "firewall_name": "firewallName",
1909
2117
  "firewall_policy_arn": "firewallPolicyArn",
1910
- "subnet_mappings": "subnetMappings",
1911
- "vpc_id": "vpcId",
2118
+ "availability_zone_change_protection": "availabilityZoneChangeProtection",
2119
+ "availability_zone_mappings": "availabilityZoneMappings",
1912
2120
  "delete_protection": "deleteProtection",
1913
2121
  "description": "description",
1914
2122
  "enabled_analysis_types": "enabledAnalysisTypes",
1915
2123
  "firewall_policy_change_protection": "firewallPolicyChangeProtection",
1916
2124
  "subnet_change_protection": "subnetChangeProtection",
2125
+ "subnet_mappings": "subnetMappings",
1917
2126
  "tags": "tags",
2127
+ "transit_gateway_id": "transitGatewayId",
2128
+ "vpc_id": "vpcId",
1918
2129
  },
1919
2130
  )
1920
2131
  class CfnFirewallProps:
@@ -1923,27 +2134,33 @@ class CfnFirewallProps:
1923
2134
  *,
1924
2135
  firewall_name: builtins.str,
1925
2136
  firewall_policy_arn: builtins.str,
1926
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
1927
- vpc_id: builtins.str,
2137
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2138
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
1928
2139
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1929
2140
  description: typing.Optional[builtins.str] = None,
1930
2141
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
1931
2142
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
1932
2143
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2144
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
1933
2145
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
2146
+ transit_gateway_id: typing.Optional[builtins.str] = None,
2147
+ vpc_id: typing.Optional[builtins.str] = None,
1934
2148
  ) -> None:
1935
2149
  '''Properties for defining a ``CfnFirewall``.
1936
2150
 
1937
2151
  :param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
1938
2152
  :param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
1939
- :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
1940
- :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
2153
+ :param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
2154
+ :param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
1941
2155
  :param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
1942
2156
  :param description: A description of the firewall.
1943
2157
  :param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
1944
2158
  :param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
1945
2159
  :param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
2160
+ :param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
1946
2161
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
2162
+ :param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
2163
+ :param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
1947
2164
 
1948
2165
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html
1949
2166
  :exampleMetadata: fixture=_generated
@@ -1957,44 +2174,54 @@ class CfnFirewallProps:
1957
2174
  cfn_firewall_props = networkfirewall.CfnFirewallProps(
1958
2175
  firewall_name="firewallName",
1959
2176
  firewall_policy_arn="firewallPolicyArn",
1960
- subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
1961
- subnet_id="subnetId",
1962
-
1963
- # the properties below are optional
1964
- ip_address_type="ipAddressType"
1965
- )],
1966
- vpc_id="vpcId",
1967
2177
 
1968
2178
  # the properties below are optional
2179
+ availability_zone_change_protection=False,
2180
+ availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
2181
+ availability_zone="availabilityZone"
2182
+ )],
1969
2183
  delete_protection=False,
1970
2184
  description="description",
1971
2185
  enabled_analysis_types=["enabledAnalysisTypes"],
1972
2186
  firewall_policy_change_protection=False,
1973
2187
  subnet_change_protection=False,
2188
+ subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
2189
+ subnet_id="subnetId",
2190
+
2191
+ # the properties below are optional
2192
+ ip_address_type="ipAddressType"
2193
+ )],
1974
2194
  tags=[CfnTag(
1975
2195
  key="key",
1976
2196
  value="value"
1977
- )]
2197
+ )],
2198
+ transit_gateway_id="transitGatewayId",
2199
+ vpc_id="vpcId"
1978
2200
  )
1979
2201
  '''
1980
2202
  if __debug__:
1981
2203
  type_hints = typing.get_type_hints(_typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57bc238e99)
1982
2204
  check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
1983
2205
  check_type(argname="argument firewall_policy_arn", value=firewall_policy_arn, expected_type=type_hints["firewall_policy_arn"])
1984
- check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
1985
- check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
2206
+ check_type(argname="argument availability_zone_change_protection", value=availability_zone_change_protection, expected_type=type_hints["availability_zone_change_protection"])
2207
+ check_type(argname="argument availability_zone_mappings", value=availability_zone_mappings, expected_type=type_hints["availability_zone_mappings"])
1986
2208
  check_type(argname="argument delete_protection", value=delete_protection, expected_type=type_hints["delete_protection"])
1987
2209
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
1988
2210
  check_type(argname="argument enabled_analysis_types", value=enabled_analysis_types, expected_type=type_hints["enabled_analysis_types"])
1989
2211
  check_type(argname="argument firewall_policy_change_protection", value=firewall_policy_change_protection, expected_type=type_hints["firewall_policy_change_protection"])
1990
2212
  check_type(argname="argument subnet_change_protection", value=subnet_change_protection, expected_type=type_hints["subnet_change_protection"])
2213
+ check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
1991
2214
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
2215
+ check_type(argname="argument transit_gateway_id", value=transit_gateway_id, expected_type=type_hints["transit_gateway_id"])
2216
+ check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
1992
2217
  self._values: typing.Dict[builtins.str, typing.Any] = {
1993
2218
  "firewall_name": firewall_name,
1994
2219
  "firewall_policy_arn": firewall_policy_arn,
1995
- "subnet_mappings": subnet_mappings,
1996
- "vpc_id": vpc_id,
1997
2220
  }
2221
+ if availability_zone_change_protection is not None:
2222
+ self._values["availability_zone_change_protection"] = availability_zone_change_protection
2223
+ if availability_zone_mappings is not None:
2224
+ self._values["availability_zone_mappings"] = availability_zone_mappings
1998
2225
  if delete_protection is not None:
1999
2226
  self._values["delete_protection"] = delete_protection
2000
2227
  if description is not None:
@@ -2005,8 +2232,14 @@ class CfnFirewallProps:
2005
2232
  self._values["firewall_policy_change_protection"] = firewall_policy_change_protection
2006
2233
  if subnet_change_protection is not None:
2007
2234
  self._values["subnet_change_protection"] = subnet_change_protection
2235
+ if subnet_mappings is not None:
2236
+ self._values["subnet_mappings"] = subnet_mappings
2008
2237
  if tags is not None:
2009
2238
  self._values["tags"] = tags
2239
+ if transit_gateway_id is not None:
2240
+ self._values["transit_gateway_id"] = transit_gateway_id
2241
+ if vpc_id is not None:
2242
+ self._values["vpc_id"] = vpc_id
2010
2243
 
2011
2244
  @builtins.property
2012
2245
  def firewall_name(self) -> builtins.str:
@@ -2033,34 +2266,30 @@ class CfnFirewallProps:
2033
2266
  return typing.cast(builtins.str, result)
2034
2267
 
2035
2268
  @builtins.property
2036
- def subnet_mappings(
2269
+ def availability_zone_change_protection(
2037
2270
  self,
2038
- ) -> typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]:
2039
- '''The primary public subnets that Network Firewall is using for the firewall.
2040
-
2041
- Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
2042
-
2043
- These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
2271
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2272
+ '''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.
2044
2273
 
2045
- In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
2274
+ When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
2046
2275
 
2047
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
2276
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection
2048
2277
  '''
2049
- result = self._values.get("subnet_mappings")
2050
- assert result is not None, "Required property 'subnet_mappings' is missing"
2051
- return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]], result)
2278
+ result = self._values.get("availability_zone_change_protection")
2279
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2052
2280
 
2053
2281
  @builtins.property
2054
- def vpc_id(self) -> builtins.str:
2055
- '''The unique identifier of the VPC where the firewall is in use.
2282
+ def availability_zone_mappings(
2283
+ self,
2284
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]]:
2285
+ '''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.
2056
2286
 
2057
- You can't change the VPC of a firewall after you create the firewall.
2287
+ Each mapping specifies an Availability Zone where the firewall processes traffic.
2058
2288
 
2059
- :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
2289
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings
2060
2290
  '''
2061
- result = self._values.get("vpc_id")
2062
- assert result is not None, "Required property 'vpc_id' is missing"
2063
- return typing.cast(builtins.str, result)
2291
+ result = self._values.get("availability_zone_mappings")
2292
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]], result)
2064
2293
 
2065
2294
  @builtins.property
2066
2295
  def delete_protection(
@@ -2119,6 +2348,23 @@ class CfnFirewallProps:
2119
2348
  result = self._values.get("subnet_change_protection")
2120
2349
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2121
2350
 
2351
+ @builtins.property
2352
+ def subnet_mappings(
2353
+ self,
2354
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]]:
2355
+ '''The primary public subnets that Network Firewall is using for the firewall.
2356
+
2357
+ Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
2358
+
2359
+ These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
2360
+
2361
+ In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
2362
+
2363
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
2364
+ '''
2365
+ result = self._values.get("subnet_mappings")
2366
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]], result)
2367
+
2122
2368
  @builtins.property
2123
2369
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
2124
2370
  '''An array of key-value pairs to apply to this resource.
@@ -2130,6 +2376,28 @@ class CfnFirewallProps:
2130
2376
  result = self._values.get("tags")
2131
2377
  return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
2132
2378
 
2379
+ @builtins.property
2380
+ def transit_gateway_id(self) -> typing.Optional[builtins.str]:
2381
+ '''The unique identifier of the transit gateway associated with this firewall.
2382
+
2383
+ This field is only present for transit gateway-attached firewalls.
2384
+
2385
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid
2386
+ '''
2387
+ result = self._values.get("transit_gateway_id")
2388
+ return typing.cast(typing.Optional[builtins.str], result)
2389
+
2390
+ @builtins.property
2391
+ def vpc_id(self) -> typing.Optional[builtins.str]:
2392
+ '''The unique identifier of the VPC where the firewall is in use.
2393
+
2394
+ You can't change the VPC of a firewall after you create the firewall.
2395
+
2396
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
2397
+ '''
2398
+ result = self._values.get("vpc_id")
2399
+ return typing.cast(typing.Optional[builtins.str], result)
2400
+
2133
2401
  def __eq__(self, rhs: typing.Any) -> builtins.bool:
2134
2402
  return isinstance(rhs, self.__class__) and rhs._values == self._values
2135
2403
 
@@ -2142,17 +2410,17 @@ class CfnFirewallProps:
2142
2410
  )
2143
2411
 
2144
2412
 
2145
- @jsii.implements(_IInspectable_c2943556)
2413
+ @jsii.implements(_IInspectable_c2943556, _ILoggingConfigurationRef_1588c620)
2146
2414
  class CfnLoggingConfiguration(
2147
2415
  _CfnResource_9df397a6,
2148
2416
  metaclass=jsii.JSIIMeta,
2149
2417
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnLoggingConfiguration",
2150
2418
  ):
2151
- '''Use the ``LoggingConfiguration`` to define the destinations and logging options for an ``Firewall`` .
2419
+ '''Use the logging configuration to define the destinations and logging options for an firewall.
2152
2420
 
2153
2421
  You must change the logging configuration by changing one ``LogDestinationConfig`` setting at a time in your ``LogDestinationConfigs`` .
2154
2422
 
2155
- You can make only one of the following changes to your ``LoggingConfiguration`` resource:
2423
+ You can make only one of the following changes to your logging configuration resource:
2156
2424
 
2157
2425
  - Create a new log destination object by adding a single ``LogDestinationConfig`` array element to ``LogDestinationConfigs`` .
2158
2426
  - Delete a log destination object by removing a single ``LogDestinationConfig`` array element from ``LogDestinationConfigs`` .
@@ -2183,6 +2451,7 @@ class CfnLoggingConfiguration(
2183
2451
  ),
2184
2452
 
2185
2453
  # the properties below are optional
2454
+ enable_monitoring_dashboard=False,
2186
2455
  firewall_name="firewallName"
2187
2456
  )
2188
2457
  '''
@@ -2194,13 +2463,16 @@ class CfnLoggingConfiguration(
2194
2463
  *,
2195
2464
  firewall_arn: builtins.str,
2196
2465
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LoggingConfigurationProperty", typing.Dict[builtins.str, typing.Any]]],
2466
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2197
2467
  firewall_name: typing.Optional[builtins.str] = None,
2198
2468
  ) -> None:
2199
- '''
2469
+ '''Create a new ``AWS::NetworkFirewall::LoggingConfiguration``.
2470
+
2200
2471
  :param scope: Scope in which this resource is defined.
2201
2472
  :param id: Construct identifier for this resource (unique in its scope).
2202
- :param firewall_arn: The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2203
- :param logging_configuration: Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2473
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2474
+ :param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
2475
+ :param enable_monitoring_dashboard:
2204
2476
  :param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2205
2477
  '''
2206
2478
  if __debug__:
@@ -2210,6 +2482,7 @@ class CfnLoggingConfiguration(
2210
2482
  props = CfnLoggingConfigurationProps(
2211
2483
  firewall_arn=firewall_arn,
2212
2484
  logging_configuration=logging_configuration,
2485
+ enable_monitoring_dashboard=enable_monitoring_dashboard,
2213
2486
  firewall_name=firewall_name,
2214
2487
  )
2215
2488
 
@@ -2250,10 +2523,16 @@ class CfnLoggingConfiguration(
2250
2523
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
2251
2524
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
2252
2525
 
2526
+ @builtins.property
2527
+ @jsii.member(jsii_name="loggingConfigurationRef")
2528
+ def logging_configuration_ref(self) -> _LoggingConfigurationReference_f6c32f6c:
2529
+ '''A reference to a LoggingConfiguration resource.'''
2530
+ return typing.cast(_LoggingConfigurationReference_f6c32f6c, jsii.get(self, "loggingConfigurationRef"))
2531
+
2253
2532
  @builtins.property
2254
2533
  @jsii.member(jsii_name="firewallArn")
2255
2534
  def firewall_arn(self) -> builtins.str:
2256
- '''The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with.'''
2535
+ '''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.'''
2257
2536
  return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
2258
2537
 
2259
2538
  @firewall_arn.setter
@@ -2268,7 +2547,7 @@ class CfnLoggingConfiguration(
2268
2547
  def logging_configuration(
2269
2548
  self,
2270
2549
  ) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"]:
2271
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .'''
2550
+ '''Defines how AWS Network Firewall performs logging for a firewall.'''
2272
2551
  return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"], jsii.get(self, "loggingConfiguration"))
2273
2552
 
2274
2553
  @logging_configuration.setter
@@ -2281,6 +2560,23 @@ class CfnLoggingConfiguration(
2281
2560
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2282
2561
  jsii.set(self, "loggingConfiguration", value) # pyright: ignore[reportArgumentType]
2283
2562
 
2563
+ @builtins.property
2564
+ @jsii.member(jsii_name="enableMonitoringDashboard")
2565
+ def enable_monitoring_dashboard(
2566
+ self,
2567
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2568
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "enableMonitoringDashboard"))
2569
+
2570
+ @enable_monitoring_dashboard.setter
2571
+ def enable_monitoring_dashboard(
2572
+ self,
2573
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
2574
+ ) -> None:
2575
+ if __debug__:
2576
+ type_hints = typing.get_type_hints(_typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe)
2577
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
2578
+ jsii.set(self, "enableMonitoringDashboard", value) # pyright: ignore[reportArgumentType]
2579
+
2284
2580
  @builtins.property
2285
2581
  @jsii.member(jsii_name="firewallName")
2286
2582
  def firewall_name(self) -> typing.Optional[builtins.str]:
@@ -2313,7 +2609,7 @@ class CfnLoggingConfiguration(
2313
2609
  ) -> None:
2314
2610
  '''Defines where AWS Network Firewall sends logs for the firewall for one log type.
2315
2611
 
2316
- This is used in ``LoggingConfiguration`` . You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
2612
+ This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
2317
2613
 
2318
2614
  Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to ``DROP`` or ``ALERT`` .
2319
2615
 
@@ -2425,7 +2721,7 @@ class CfnLoggingConfiguration(
2425
2721
  *,
2426
2722
  log_destination_configs: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LogDestinationConfigProperty", typing.Dict[builtins.str, typing.Any]]]]],
2427
2723
  ) -> None:
2428
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2724
+ '''Defines how AWS Network Firewall performs logging for a firewall.
2429
2725
 
2430
2726
  :param log_destination_configs: Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
2431
2727
 
@@ -2487,6 +2783,7 @@ class CfnLoggingConfiguration(
2487
2783
  name_mapping={
2488
2784
  "firewall_arn": "firewallArn",
2489
2785
  "logging_configuration": "loggingConfiguration",
2786
+ "enable_monitoring_dashboard": "enableMonitoringDashboard",
2490
2787
  "firewall_name": "firewallName",
2491
2788
  },
2492
2789
  )
@@ -2496,12 +2793,14 @@ class CfnLoggingConfigurationProps:
2496
2793
  *,
2497
2794
  firewall_arn: builtins.str,
2498
2795
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
2796
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
2499
2797
  firewall_name: typing.Optional[builtins.str] = None,
2500
2798
  ) -> None:
2501
2799
  '''Properties for defining a ``CfnLoggingConfiguration``.
2502
2800
 
2503
- :param firewall_arn: The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2504
- :param logging_configuration: Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2801
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2802
+ :param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
2803
+ :param enable_monitoring_dashboard:
2505
2804
  :param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
2506
2805
 
2507
2806
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html
@@ -2526,6 +2825,7 @@ class CfnLoggingConfigurationProps:
2526
2825
  ),
2527
2826
 
2528
2827
  # the properties below are optional
2828
+ enable_monitoring_dashboard=False,
2529
2829
  firewall_name="firewallName"
2530
2830
  )
2531
2831
  '''
@@ -2533,17 +2833,20 @@ class CfnLoggingConfigurationProps:
2533
2833
  type_hints = typing.get_type_hints(_typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d62178ab9369)
2534
2834
  check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
2535
2835
  check_type(argname="argument logging_configuration", value=logging_configuration, expected_type=type_hints["logging_configuration"])
2836
+ check_type(argname="argument enable_monitoring_dashboard", value=enable_monitoring_dashboard, expected_type=type_hints["enable_monitoring_dashboard"])
2536
2837
  check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
2537
2838
  self._values: typing.Dict[builtins.str, typing.Any] = {
2538
2839
  "firewall_arn": firewall_arn,
2539
2840
  "logging_configuration": logging_configuration,
2540
2841
  }
2842
+ if enable_monitoring_dashboard is not None:
2843
+ self._values["enable_monitoring_dashboard"] = enable_monitoring_dashboard
2541
2844
  if firewall_name is not None:
2542
2845
  self._values["firewall_name"] = firewall_name
2543
2846
 
2544
2847
  @builtins.property
2545
2848
  def firewall_arn(self) -> builtins.str:
2546
- '''The Amazon Resource Name (ARN) of the ``Firewall`` that the logging configuration is associated with.
2849
+ '''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.
2547
2850
 
2548
2851
  You can't change the firewall specification after you create the logging configuration.
2549
2852
 
@@ -2557,7 +2860,7 @@ class CfnLoggingConfigurationProps:
2557
2860
  def logging_configuration(
2558
2861
  self,
2559
2862
  ) -> typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty]:
2560
- '''Defines how AWS Network Firewall performs logging for a ``Firewall`` .
2863
+ '''Defines how AWS Network Firewall performs logging for a firewall.
2561
2864
 
2562
2865
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration
2563
2866
  '''
@@ -2565,6 +2868,16 @@ class CfnLoggingConfigurationProps:
2565
2868
  assert result is not None, "Required property 'logging_configuration' is missing"
2566
2869
  return typing.cast(typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty], result)
2567
2870
 
2871
+ @builtins.property
2872
+ def enable_monitoring_dashboard(
2873
+ self,
2874
+ ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
2875
+ '''
2876
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-enablemonitoringdashboard
2877
+ '''
2878
+ result = self._values.get("enable_monitoring_dashboard")
2879
+ return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
2880
+
2568
2881
  @builtins.property
2569
2882
  def firewall_name(self) -> typing.Optional[builtins.str]:
2570
2883
  '''The name of the firewall that the logging configuration is associated with.
@@ -2588,15 +2901,13 @@ class CfnLoggingConfigurationProps:
2588
2901
  )
2589
2902
 
2590
2903
 
2591
- @jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
2904
+ @jsii.implements(_IInspectable_c2943556, _IRuleGroupRef_f1ee71d3, _ITaggable_36806126)
2592
2905
  class CfnRuleGroup(
2593
2906
  _CfnResource_9df397a6,
2594
2907
  metaclass=jsii.JSIIMeta,
2595
2908
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup",
2596
2909
  ):
2597
- '''Use the ``RuleGroup`` to define a reusable collection of stateless or stateful network traffic filtering rules.
2598
-
2599
- You use rule groups in an ``FirewallPolicy`` to specify the filtering behavior of an ``Firewall`` .
2910
+ '''Use the ` <https://docs.aws.amazon.com/RuleGroup>`_ to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
2600
2911
 
2601
2912
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
2602
2913
  :cloudformationResource: AWS::NetworkFirewall::RuleGroup
@@ -2709,6 +3020,9 @@ class CfnRuleGroup(
2709
3020
  rule_order="ruleOrder"
2710
3021
  )
2711
3022
  ),
3023
+ summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
3024
+ rule_options=["ruleOptions"]
3025
+ ),
2712
3026
  tags=[CfnTag(
2713
3027
  key="key",
2714
3028
  value="value"
@@ -2726,9 +3040,11 @@ class CfnRuleGroup(
2726
3040
  type: builtins.str,
2727
3041
  description: typing.Optional[builtins.str] = None,
2728
3042
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.RuleGroupProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
3043
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.SummaryConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
2729
3044
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
2730
3045
  ) -> None:
2731
- '''
3046
+ '''Create a new ``AWS::NetworkFirewall::RuleGroup``.
3047
+
2732
3048
  :param scope: Scope in which this resource is defined.
2733
3049
  :param id: Construct identifier for this resource (unique in its scope).
2734
3050
  :param capacity: The maximum operating resources that this rule group can use. You can't change a rule group's capacity setting after you create the rule group. When you update a rule group, you are limited to this capacity. When you reference a rule group from a firewall policy, Network Firewall reserves this capacity for the rule group.
@@ -2736,6 +3052,7 @@ class CfnRuleGroup(
2736
3052
  :param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
2737
3053
  :param description: A description of the rule group.
2738
3054
  :param rule_group: An object that defines the rule group rules.
3055
+ :param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
2739
3056
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
2740
3057
  '''
2741
3058
  if __debug__:
@@ -2748,6 +3065,7 @@ class CfnRuleGroup(
2748
3065
  type=type,
2749
3066
  description=description,
2750
3067
  rule_group=rule_group,
3068
+ summary_configuration=summary_configuration,
2751
3069
  tags=tags,
2752
3070
  )
2753
3071
 
@@ -2786,7 +3104,7 @@ class CfnRuleGroup(
2786
3104
  @builtins.property
2787
3105
  @jsii.member(jsii_name="attrRuleGroupArn")
2788
3106
  def attr_rule_group_arn(self) -> builtins.str:
2789
- '''The Amazon Resource Name (ARN) of the ``RuleGroup`` .
3107
+ '''The Amazon Resource Name (ARN) of the rule group.
2790
3108
 
2791
3109
  :cloudformationAttribute: RuleGroupArn
2792
3110
  '''
@@ -2795,7 +3113,7 @@ class CfnRuleGroup(
2795
3113
  @builtins.property
2796
3114
  @jsii.member(jsii_name="attrRuleGroupId")
2797
3115
  def attr_rule_group_id(self) -> builtins.str:
2798
- '''The unique ID of the ``RuleGroup`` resource.
3116
+ '''The unique ID of the rule group resource.
2799
3117
 
2800
3118
  :cloudformationAttribute: RuleGroupId
2801
3119
  '''
@@ -2806,6 +3124,12 @@ class CfnRuleGroup(
2806
3124
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
2807
3125
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
2808
3126
 
3127
+ @builtins.property
3128
+ @jsii.member(jsii_name="ruleGroupRef")
3129
+ def rule_group_ref(self) -> _RuleGroupReference_b514c132:
3130
+ '''A reference to a RuleGroup resource.'''
3131
+ return typing.cast(_RuleGroupReference_b514c132, jsii.get(self, "ruleGroupRef"))
3132
+
2809
3133
  @builtins.property
2810
3134
  @jsii.member(jsii_name="tags")
2811
3135
  def tags(self) -> _TagManager_0a598cb3:
@@ -2883,13 +3207,31 @@ class CfnRuleGroup(
2883
3207
  jsii.set(self, "ruleGroup", value) # pyright: ignore[reportArgumentType]
2884
3208
 
2885
3209
  @builtins.property
2886
- @jsii.member(jsii_name="tagsRaw")
2887
- def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
2888
- '''An array of key-value pairs to apply to this resource.'''
2889
- return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tagsRaw"))
3210
+ @jsii.member(jsii_name="summaryConfiguration")
3211
+ def summary_configuration(
3212
+ self,
3213
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]]:
3214
+ '''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .'''
3215
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]], jsii.get(self, "summaryConfiguration"))
2890
3216
 
2891
- @tags_raw.setter
2892
- def tags_raw(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
3217
+ @summary_configuration.setter
3218
+ def summary_configuration(
3219
+ self,
3220
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]],
3221
+ ) -> None:
3222
+ if __debug__:
3223
+ type_hints = typing.get_type_hints(_typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0)
3224
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
3225
+ jsii.set(self, "summaryConfiguration", value) # pyright: ignore[reportArgumentType]
3226
+
3227
+ @builtins.property
3228
+ @jsii.member(jsii_name="tagsRaw")
3229
+ def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
3230
+ '''An array of key-value pairs to apply to this resource.'''
3231
+ return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tagsRaw"))
3232
+
3233
+ @tags_raw.setter
3234
+ def tags_raw(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
2893
3235
  if __debug__:
2894
3236
  type_hints = typing.get_type_hints(_typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5)
2895
3237
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
@@ -2969,7 +3311,7 @@ class CfnRuleGroup(
2969
3311
  def __init__(self, *, address_definition: builtins.str) -> None:
2970
3312
  '''A single IP address specification.
2971
3313
 
2972
- This is used in the ``RuleGroup.MatchAttributes`` source and destination specifications.
3314
+ This is used in the match attributes source and destination specifications.
2973
3315
 
2974
3316
  :param address_definition: Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. Examples: - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify ``192.0.2.44/32`` . - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify ``192.0.2.0/24`` . - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify ``1111:0000:0000:0000:0000:0000:0000:0111/128`` . - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify ``1111:0000:0000:0000:0000:0000:0000:0000/64`` . For more information about CIDR notation, see the Wikipedia entry `Classless Inter-Domain Routing <https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing>`_ .
2975
3317
 
@@ -3048,8 +3390,8 @@ class CfnRuleGroup(
3048
3390
 
3049
3391
  You can use custom actions in the following places:
3050
3392
 
3051
- - In an ``RuleGroup.StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
3052
- - In an ``FirewallPolicy`` specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
3393
+ - In a ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
3394
+ - In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
3053
3395
 
3054
3396
  :param action_definition: The custom action associated with the action name.
3055
3397
  :param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
@@ -3363,7 +3705,7 @@ class CfnRuleGroup(
3363
3705
  ) -> None:
3364
3706
  '''A list of IP addresses and address ranges, in CIDR notation.
3365
3707
 
3366
- This is part of a ``RuleGroup.RuleVariables`` .
3708
+ This is part of a ``RuleVariables`` .
3367
3709
 
3368
3710
  :param definition: The list of IP addresses and address ranges, in CIDR notation.
3369
3711
 
@@ -3418,11 +3760,11 @@ class CfnRuleGroup(
3418
3760
  *,
3419
3761
  reference_arn: typing.Optional[builtins.str] = None,
3420
3762
  ) -> None:
3421
- '''Configures one or more ``IPSetReferences`` for a Suricata-compatible rule group.
3763
+ '''Configures one or more IP set references for a Suricata-compatible rule group.
3422
3764
 
3423
3765
  An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see `Using IP set references <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall Developer Guide* .
3424
3766
 
3425
- :param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the ``RuleGroup.IPSetReference`` .
3767
+ :param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
3426
3768
 
3427
3769
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html
3428
3770
  :exampleMetadata: fixture=_generated
@@ -3446,7 +3788,7 @@ class CfnRuleGroup(
3446
3788
 
3447
3789
  @builtins.property
3448
3790
  def reference_arn(self) -> typing.Optional[builtins.str]:
3449
- '''The Amazon Resource Name (ARN) of the resource to include in the ``RuleGroup.IPSetReference`` .
3791
+ '''The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
3450
3792
 
3451
3793
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn
3452
3794
  '''
@@ -3657,7 +3999,7 @@ class CfnRuleGroup(
3657
3999
  def __init__(self, *, from_port: jsii.Number, to_port: jsii.Number) -> None:
3658
4000
  '''A single port range specification.
3659
4001
 
3660
- This is used for source and destination port ranges in the stateless ``RuleGroup.MatchAttributes`` .
4002
+ This is used for source and destination port ranges in the stateless match attributes.
3661
4003
 
3662
4004
  :param from_port: The lower limit of the port range. This must be less than or equal to the ``ToPort`` specification.
3663
4005
  :param to_port: The upper limit of the port range. This must be greater than or equal to the ``FromPort`` specification.
@@ -3847,7 +4189,7 @@ class CfnRuleGroup(
3847
4189
  *,
3848
4190
  ip_set_references: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetReferenceProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
3849
4191
  ) -> None:
3850
- '''Configures the ``ReferenceSets`` for a stateful rule group.
4192
+ '''Configures the reference sets for a stateful rule group.
3851
4193
 
3852
4194
  For more information, see the `Using IP set references in Suricata compatible rule groups <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall User Guide* .
3853
4195
 
@@ -3915,7 +4257,7 @@ class CfnRuleGroup(
3915
4257
 
3916
4258
  AWS Network Firewall inspects each packet for the specified matching criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on the packet.
3917
4259
 
3918
- :param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the ``FirewallPolicy`` . For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
4260
+ :param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy. For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
3919
4261
  :param match_attributes: Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection. Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags.
3920
4262
 
3921
4263
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ruledefinition.html
@@ -3970,7 +4312,7 @@ class CfnRuleGroup(
3970
4312
  You must specify a standard action and you can add custom actions.
3971
4313
  .. epigraph::
3972
4314
 
3973
- Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the ``FirewallPolicy`` .
4315
+ Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy.
3974
4316
 
3975
4317
  For every rule, you must specify exactly one of the following standard actions.
3976
4318
 
@@ -4312,7 +4654,7 @@ class CfnRuleGroup(
4312
4654
  ip_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4313
4655
  port_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.PortSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
4314
4656
  ) -> None:
4315
- '''Settings that are available for use in the rules in the ``RuleGroup`` where this is defined.
4657
+ '''Settings that are available for use in the rules in the rule group where this is defined.
4316
4658
 
4317
4659
  :param ip_sets: A list of IP addresses and address ranges, in CIDR notation.
4318
4660
  :param port_sets: A list of port ranges.
@@ -4403,9 +4745,9 @@ class CfnRuleGroup(
4403
4745
 
4404
4746
  For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
4405
4747
 
4406
- By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleGroup.RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
4748
+ By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
4407
4749
 
4408
- :param generated_rules_type: Whether you want to allow or deny access to the domains in your target list.
4750
+ :param generated_rules_type: Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list. .. epigraph:: When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
4409
4751
  :param targets: The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:. - Explicit names. For example, ``abc.example.com`` matches only the domain ``abc.example.com`` . - Names that use a domain wildcard, which you indicate with an initial ' ``.`` '. For example, ``.example.com`` matches ``example.com`` and matches all subdomains of ``example.com`` , such as ``abc.example.com`` and ``www.example.com`` .
4410
4752
  :param target_types: The types of targets to inspect for. Valid values are ``TLS_SNI`` and ``HTTP_HOST`` .
4411
4753
 
@@ -4437,7 +4779,11 @@ class CfnRuleGroup(
4437
4779
 
4438
4780
  @builtins.property
4439
4781
  def generated_rules_type(self) -> builtins.str:
4440
- '''Whether you want to allow or deny access to the domains in your target list.
4782
+ '''Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
4783
+
4784
+ .. epigraph::
4785
+
4786
+ When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
4441
4787
 
4442
4788
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html#cfn-networkfirewall-rulegroup-rulessourcelist-generatedrulestype
4443
4789
  '''
@@ -4505,7 +4851,7 @@ class CfnRuleGroup(
4505
4851
  Each rule group requires a single ``RulesSource`` . You can use an instance of this for either stateless rules or stateful rules.
4506
4852
 
4507
4853
  :param rules_source_list: Stateful inspection criteria for a domain list rule group.
4508
- :param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in ``StatefulRuleOptions`` is set to ``STRICT_ORDER`` .
4854
+ :param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
4509
4855
  :param stateful_rules: An array of individual stateful rules inspection criteria to be used together in a stateful rule group. Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
4510
4856
  :param stateless_rules_and_custom_actions: Stateless inspection criteria to be used in a stateless rule group.
4511
4857
 
@@ -4623,7 +4969,7 @@ class CfnRuleGroup(
4623
4969
  These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
4624
4970
  .. epigraph::
4625
4971
 
4626
- You can't use the ``priority`` keyword if the ``RuleOrder`` option in ``StatefulRuleOptions`` is set to ``STRICT_ORDER`` .
4972
+ You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
4627
4973
 
4628
4974
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring
4629
4975
  '''
@@ -4741,7 +5087,7 @@ class CfnRuleGroup(
4741
5087
 
4742
5088
  Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
4743
5089
 
4744
- :param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` . ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
5090
+ :param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration. ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
4745
5091
  :param header: The stateful inspection criteria for this rule, used to inspect traffic flows.
4746
5092
  :param rule_options: Additional settings for a stateful rule, provided as keywords and settings.
4747
5093
 
@@ -4792,13 +5138,13 @@ class CfnRuleGroup(
4792
5138
  The actions for a stateful rule are defined as follows:
4793
5139
 
4794
5140
  - *PASS* - Permits the packets to go to the intended destination.
4795
- - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5141
+ - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
4796
5142
  - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic.
4797
- - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5143
+ - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
4798
5144
 
4799
5145
  You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` .
4800
5146
 
4801
- - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the ``Firewall`` ``LoggingConfiguration`` .
5147
+ - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
4802
5148
 
4803
5149
  ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
4804
5150
 
@@ -4857,7 +5203,7 @@ class CfnRuleGroup(
4857
5203
  ) -> None:
4858
5204
  '''A single stateless rule.
4859
5205
 
4860
- This is used in ``RuleGroup.StatelessRulesAndCustomActions`` .
5206
+ This is used in ``StatelessRulesAndCustomActions`` .
4861
5207
 
4862
5208
  :param priority: Indicates the order in which to run this rule relative to all of the rules that are defined for a stateless rule group. Network Firewall evaluates the rules in a rule group starting with the lowest priority setting. You must ensure that the priority settings are unique for the rule group. Each stateless rule group uses exactly one ``StatelessRulesAndCustomActions`` object, and each ``StatelessRulesAndCustomActions`` contains exactly one ``StatelessRules`` object. To ensure unique priority settings for your rule groups, set unique priorities for the stateless rules that you define inside any single ``StatelessRules`` object. You can change the priority settings of your rules at any time. To make it easier to insert rules later, number them so there's a wide range in between, for example use 100, 200, and so on.
4863
5209
  :param rule_definition: Defines the stateless 5-tuple packet inspection criteria and the action to take on a packet that matches the criteria.
@@ -4969,7 +5315,7 @@ class CfnRuleGroup(
4969
5315
  Each stateless rule group uses exactly one of these data types to define its stateless rules.
4970
5316
 
4971
5317
  :param stateless_rules: Defines the set of stateless rules for use in a stateless rule group.
4972
- :param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule ``RuleGroup.RuleDefinition`` ``Actions`` specification.
5318
+ :param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
4973
5319
 
4974
5320
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html
4975
5321
  :exampleMetadata: fixture=_generated
@@ -5052,7 +5398,7 @@ class CfnRuleGroup(
5052
5398
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.CustomActionProperty"]]]]:
5053
5399
  '''Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification.
5054
5400
 
5055
- You name each custom action that you define, and then you can use it by name in your stateless rule ``RuleGroup.RuleDefinition`` ``Actions`` specification.
5401
+ You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
5056
5402
 
5057
5403
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions
5058
5404
  '''
@@ -5070,6 +5416,65 @@ class CfnRuleGroup(
5070
5416
  k + "=" + repr(v) for k, v in self._values.items()
5071
5417
  )
5072
5418
 
5419
+ @jsii.data_type(
5420
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.SummaryConfigurationProperty",
5421
+ jsii_struct_bases=[],
5422
+ name_mapping={"rule_options": "ruleOptions"},
5423
+ )
5424
+ class SummaryConfigurationProperty:
5425
+ def __init__(
5426
+ self,
5427
+ *,
5428
+ rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
5429
+ ) -> None:
5430
+ '''A complex type that specifies which Suricata rule metadata fields to use when displaying threat information. Contains:.
5431
+
5432
+ - ``RuleOptions`` - The Suricata rule options fields to extract and display
5433
+
5434
+ These settings affect how threat information appears in both the console and API responses. Summaries are available for rule groups you manage and for active threat defense AWS managed rule groups.
5435
+
5436
+ :param rule_options: Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
5437
+
5438
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html
5439
+ :exampleMetadata: fixture=_generated
5440
+
5441
+ Example::
5442
+
5443
+ # The code below shows an example of how to instantiate this type.
5444
+ # The values are placeholders you should change.
5445
+ from aws_cdk import aws_networkfirewall as networkfirewall
5446
+
5447
+ summary_configuration_property = networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
5448
+ rule_options=["ruleOptions"]
5449
+ )
5450
+ '''
5451
+ if __debug__:
5452
+ type_hints = typing.get_type_hints(_typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307)
5453
+ check_type(argname="argument rule_options", value=rule_options, expected_type=type_hints["rule_options"])
5454
+ self._values: typing.Dict[builtins.str, typing.Any] = {}
5455
+ if rule_options is not None:
5456
+ self._values["rule_options"] = rule_options
5457
+
5458
+ @builtins.property
5459
+ def rule_options(self) -> typing.Optional[typing.List[builtins.str]]:
5460
+ '''Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
5461
+
5462
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html#cfn-networkfirewall-rulegroup-summaryconfiguration-ruleoptions
5463
+ '''
5464
+ result = self._values.get("rule_options")
5465
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
5466
+
5467
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
5468
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
5469
+
5470
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
5471
+ return not (rhs == self)
5472
+
5473
+ def __repr__(self) -> str:
5474
+ return "SummaryConfigurationProperty(%s)" % ", ".join(
5475
+ k + "=" + repr(v) for k, v in self._values.items()
5476
+ )
5477
+
5073
5478
  @jsii.data_type(
5074
5479
  jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.TCPFlagFieldProperty",
5075
5480
  jsii_struct_bases=[],
@@ -5082,7 +5487,7 @@ class CfnRuleGroup(
5082
5487
  flags: typing.Sequence[builtins.str],
5083
5488
  masks: typing.Optional[typing.Sequence[builtins.str]] = None,
5084
5489
  ) -> None:
5085
- '''TCP flags and masks to inspect packets for. This is used in the ``RuleGroup.MatchAttributes`` specification.
5490
+ '''TCP flags and masks to inspect packets for. This is used in the match attributes specification.
5086
5491
 
5087
5492
  For example:
5088
5493
 
@@ -5166,6 +5571,7 @@ class CfnRuleGroup(
5166
5571
  "type": "type",
5167
5572
  "description": "description",
5168
5573
  "rule_group": "ruleGroup",
5574
+ "summary_configuration": "summaryConfiguration",
5169
5575
  "tags": "tags",
5170
5576
  },
5171
5577
  )
@@ -5178,6 +5584,7 @@ class CfnRuleGroupProps:
5178
5584
  type: builtins.str,
5179
5585
  description: typing.Optional[builtins.str] = None,
5180
5586
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5587
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
5181
5588
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5182
5589
  ) -> None:
5183
5590
  '''Properties for defining a ``CfnRuleGroup``.
@@ -5187,6 +5594,7 @@ class CfnRuleGroupProps:
5187
5594
  :param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
5188
5595
  :param description: A description of the rule group.
5189
5596
  :param rule_group: An object that defines the rule group rules.
5597
+ :param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
5190
5598
  :param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
5191
5599
 
5192
5600
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
@@ -5299,6 +5707,9 @@ class CfnRuleGroupProps:
5299
5707
  rule_order="ruleOrder"
5300
5708
  )
5301
5709
  ),
5710
+ summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
5711
+ rule_options=["ruleOptions"]
5712
+ ),
5302
5713
  tags=[CfnTag(
5303
5714
  key="key",
5304
5715
  value="value"
@@ -5312,6 +5723,7 @@ class CfnRuleGroupProps:
5312
5723
  check_type(argname="argument type", value=type, expected_type=type_hints["type"])
5313
5724
  check_type(argname="argument description", value=description, expected_type=type_hints["description"])
5314
5725
  check_type(argname="argument rule_group", value=rule_group, expected_type=type_hints["rule_group"])
5726
+ check_type(argname="argument summary_configuration", value=summary_configuration, expected_type=type_hints["summary_configuration"])
5315
5727
  check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
5316
5728
  self._values: typing.Dict[builtins.str, typing.Any] = {
5317
5729
  "capacity": capacity,
@@ -5322,6 +5734,8 @@ class CfnRuleGroupProps:
5322
5734
  self._values["description"] = description
5323
5735
  if rule_group is not None:
5324
5736
  self._values["rule_group"] = rule_group
5737
+ if summary_configuration is not None:
5738
+ self._values["summary_configuration"] = summary_configuration
5325
5739
  if tags is not None:
5326
5740
  self._values["tags"] = tags
5327
5741
 
@@ -5382,6 +5796,20 @@ class CfnRuleGroupProps:
5382
5796
  result = self._values.get("rule_group")
5383
5797
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.RuleGroupProperty]], result)
5384
5798
 
5799
+ @builtins.property
5800
+ def summary_configuration(
5801
+ self,
5802
+ ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]]:
5803
+ '''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .
5804
+
5805
+ - The ``RuleOptions`` specified in ``SummaryConfiguration``
5806
+ - Rule metadata organization preferences
5807
+
5808
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration
5809
+ '''
5810
+ result = self._values.get("summary_configuration")
5811
+ return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]], result)
5812
+
5385
5813
  @builtins.property
5386
5814
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
5387
5815
  '''An array of key-value pairs to apply to this resource.
@@ -5405,7 +5833,7 @@ class CfnRuleGroupProps:
5405
5833
  )
5406
5834
 
5407
5835
 
5408
- @jsii.implements(_IInspectable_c2943556, _ITaggableV2_4e6798f8)
5836
+ @jsii.implements(_IInspectable_c2943556, _ITLSInspectionConfigurationRef_6d0a6d9c, _ITaggableV2_4e6798f8)
5409
5837
  class CfnTLSInspectionConfiguration(
5410
5838
  _CfnResource_9df397a6,
5411
5839
  metaclass=jsii.JSIIMeta,
@@ -5478,10 +5906,11 @@ class CfnTLSInspectionConfiguration(
5478
5906
  description: typing.Optional[builtins.str] = None,
5479
5907
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
5480
5908
  ) -> None:
5481
- '''
5909
+ '''Create a new ``AWS::NetworkFirewall::TLSInspectionConfiguration``.
5910
+
5482
5911
  :param scope: Scope in which this resource is defined.
5483
5912
  :param id: Construct identifier for this resource (unique in its scope).
5484
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
5913
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
5485
5914
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
5486
5915
  :param description: A description of the TLS inspection configuration.
5487
5916
  :param tags: The key:value pairs to associate with the resource.
@@ -5560,6 +5989,14 @@ class CfnTLSInspectionConfiguration(
5560
5989
  def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
5561
5990
  return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
5562
5991
 
5992
+ @builtins.property
5993
+ @jsii.member(jsii_name="tlsInspectionConfigurationRef")
5994
+ def tls_inspection_configuration_ref(
5995
+ self,
5996
+ ) -> _TLSInspectionConfigurationReference_52bd7dd3:
5997
+ '''A reference to a TLSInspectionConfiguration resource.'''
5998
+ return typing.cast(_TLSInspectionConfigurationReference_52bd7dd3, jsii.get(self, "tlsInspectionConfigurationRef"))
5999
+
5563
6000
  @builtins.property
5564
6001
  @jsii.member(jsii_name="tlsInspectionConfiguration")
5565
6002
  def tls_inspection_configuration(
@@ -5699,7 +6136,7 @@ class CfnTLSInspectionConfiguration(
5699
6136
  ) -> None:
5700
6137
  '''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
5701
6138
 
5702
- If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6139
+ If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5703
6140
 
5704
6141
  :param revoked_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
5705
6142
  :param unknown_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
@@ -5856,14 +6293,14 @@ class CfnTLSInspectionConfiguration(
5856
6293
  scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
5857
6294
  server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
5858
6295
  ) -> None:
5859
- '''Configures the AWS Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
6296
+ '''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
5860
6297
 
5861
6298
  .. epigraph::
5862
6299
 
5863
- If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
6300
+ If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
5864
6301
 
5865
- :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
5866
- :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6302
+ :param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
6303
+ :param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5867
6304
  :param scopes: A list of scopes.
5868
6305
  :param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
5869
6306
 
@@ -5922,16 +6359,16 @@ class CfnTLSInspectionConfiguration(
5922
6359
 
5923
6360
  @builtins.property
5924
6361
  def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
5925
- '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within AWS Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
6362
+ '''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
5926
6363
 
5927
6364
  The following limitations apply:
5928
6365
 
5929
6366
  - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
5930
6367
  - You can't use certificates issued by AWS Private Certificate Authority .
5931
6368
 
5932
- For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
6369
+ For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
5933
6370
 
5934
- For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
6371
+ For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
5935
6372
 
5936
6373
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
5937
6374
  '''
@@ -5944,7 +6381,7 @@ class CfnTLSInspectionConfiguration(
5944
6381
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.CheckCertificateRevocationStatusProperty"]]:
5945
6382
  '''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
5946
6383
 
5947
- If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
6384
+ If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
5948
6385
 
5949
6386
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-checkcertificaterevocationstatus
5950
6387
  '''
@@ -5995,9 +6432,9 @@ class CfnTLSInspectionConfiguration(
5995
6432
  *,
5996
6433
  resource_arn: typing.Optional[builtins.str] = None,
5997
6434
  ) -> None:
5998
- '''Any AWS Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in AWS Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *AWS Certificate Manager User Guide* .
6435
+ '''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
5999
6436
 
6000
- :param resource_arn: The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6437
+ :param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6001
6438
 
6002
6439
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
6003
6440
  :exampleMetadata: fixture=_generated
@@ -6021,7 +6458,7 @@ class CfnTLSInspectionConfiguration(
6021
6458
 
6022
6459
  @builtins.property
6023
6460
  def resource_arn(self) -> typing.Optional[builtins.str]:
6024
- '''The Amazon Resource Name (ARN) of the AWS Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6461
+ '''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
6025
6462
 
6026
6463
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
6027
6464
  '''
@@ -6309,7 +6746,7 @@ class CfnTLSInspectionConfigurationProps:
6309
6746
  ) -> None:
6310
6747
  '''Properties for defining a ``CfnTLSInspectionConfiguration``.
6311
6748
 
6312
- :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6749
+ :param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6313
6750
  :param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
6314
6751
  :param description: A description of the TLS inspection configuration.
6315
6752
  :param tags: The key:value pairs to associate with the resource.
@@ -6384,7 +6821,7 @@ class CfnTLSInspectionConfigurationProps:
6384
6821
  ) -> typing.Union[_IResolvable_da3f097b, CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty]:
6385
6822
  '''The object that defines a TLS inspection configuration.
6386
6823
 
6387
- AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using AWS Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6824
+ AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
6388
6825
 
6389
6826
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
6390
6827
  '''
@@ -6434,140 +6871,617 @@ class CfnTLSInspectionConfigurationProps:
6434
6871
  )
6435
6872
 
6436
6873
 
6437
- __all__ = [
6438
- "CfnFirewall",
6439
- "CfnFirewallPolicy",
6440
- "CfnFirewallPolicyProps",
6441
- "CfnFirewallProps",
6442
- "CfnLoggingConfiguration",
6443
- "CfnLoggingConfigurationProps",
6444
- "CfnRuleGroup",
6445
- "CfnRuleGroupProps",
6446
- "CfnTLSInspectionConfiguration",
6447
- "CfnTLSInspectionConfigurationProps",
6448
- ]
6874
+ @jsii.implements(_IInspectable_c2943556, _IVpcEndpointAssociationRef_bd0818d9, _ITaggableV2_4e6798f8)
6875
+ class CfnVpcEndpointAssociation(
6876
+ _CfnResource_9df397a6,
6877
+ metaclass=jsii.JSIIMeta,
6878
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation",
6879
+ ):
6880
+ '''A VPC endpoint association defines a single subnet to use for a firewall endpoint for a ``Firewall`` .
6449
6881
 
6450
- publication.publish()
6882
+ You can define VPC endpoint associations only in the Availability Zones that already have a subnet mapping defined in the ``Firewall`` resource.
6883
+ .. epigraph::
6451
6884
 
6452
- def _typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56(
6453
- scope: _constructs_77d1e7e8.Construct,
6454
- id: builtins.str,
6455
- *,
6456
- firewall_name: builtins.str,
6457
- firewall_policy_arn: builtins.str,
6458
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
6459
- vpc_id: builtins.str,
6460
- delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6461
- description: typing.Optional[builtins.str] = None,
6462
- enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
6463
- firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6464
- subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6465
- tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6466
- ) -> None:
6467
- """Type checking stubs"""
6468
- pass
6885
+ You can retrieve the list of Availability Zones that are available for use by calling ``DescribeFirewallMetadata`` .
6469
6886
 
6470
- def _typecheckingstub__c7c4e2793da1cf8bea450c2122d2557d378fad5e129ebb26f114a36cfc6506a2(
6471
- inspector: _TreeInspector_488e0dd5,
6472
- ) -> None:
6473
- """Type checking stubs"""
6474
- pass
6887
+ To manage firewall endpoints, first, in the ``Firewall`` specification, you specify a single VPC and one subnet for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as VPC endpoint associations.
6475
6888
 
6476
- def _typecheckingstub__46677a58d997dd59fd033c9a9ee94e3689cafff9e028d3e2d162ddfeee718547(
6477
- props: typing.Mapping[builtins.str, typing.Any],
6478
- ) -> None:
6479
- """Type checking stubs"""
6480
- pass
6889
+ You can use VPC endpoint associations to expand the protections of the firewall as follows:
6481
6890
 
6482
- def _typecheckingstub__fdb28f607bba18f9f1db46f554b41c7ddfaaf01fe3c74c5f99726bd72458a115(
6483
- value: builtins.str,
6484
- ) -> None:
6485
- """Type checking stubs"""
6486
- pass
6891
+ - *Protect multiple VPCs with a single firewall* - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the ``Firewall`` subnet mappings.
6892
+ - *Define multiple firewall endpoints for a VPC in an Availability Zone* - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the ``Firewall`` subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.
6487
6893
 
6488
- def _typecheckingstub__c711ef7af7567ab69b12f083b26c4033f7cdf1593bf27227f989d7c73e8c9fc2(
6489
- value: builtins.str,
6490
- ) -> None:
6491
- """Type checking stubs"""
6492
- pass
6894
+ You can use AWS Resource Access Manager to share a ``Firewall`` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see ``PutResourcePolicy`` in this guide and see `Sharing Network Firewall resources <https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html>`_ in the *AWS Network Firewall Developer Guide* .
6493
6895
 
6494
- def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
6495
- value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]],
6496
- ) -> None:
6497
- """Type checking stubs"""
6498
- pass
6896
+ The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling ``DescribeVpcEndpointAssociation`` .
6499
6897
 
6500
- def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
6501
- value: builtins.str,
6502
- ) -> None:
6503
- """Type checking stubs"""
6504
- pass
6898
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
6899
+ :cloudformationResource: AWS::NetworkFirewall::VpcEndpointAssociation
6900
+ :exampleMetadata: fixture=_generated
6505
6901
 
6506
- def _typecheckingstub__12d69795554b50f9f4f46a0470d9cf06e4d826d030dcab9f0adfc3a3d566c8b3(
6507
- value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
6508
- ) -> None:
6509
- """Type checking stubs"""
6510
- pass
6902
+ Example::
6511
6903
 
6512
- def _typecheckingstub__fea0349bbbe56acfbf8d2e11ce10cdd2221eb418df0a6df3602174f8015ca4f6(
6513
- value: typing.Optional[builtins.str],
6514
- ) -> None:
6515
- """Type checking stubs"""
6516
- pass
6904
+ # The code below shows an example of how to instantiate this type.
6905
+ # The values are placeholders you should change.
6906
+ from aws_cdk import aws_networkfirewall as networkfirewall
6907
+
6908
+ cfn_vpc_endpoint_association = networkfirewall.CfnVpcEndpointAssociation(self, "MyCfnVpcEndpointAssociation",
6909
+ firewall_arn="firewallArn",
6910
+ subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
6911
+ subnet_id="subnetId",
6912
+
6913
+ # the properties below are optional
6914
+ ip_address_type="ipAddressType"
6915
+ ),
6916
+ vpc_id="vpcId",
6917
+
6918
+ # the properties below are optional
6919
+ description="description",
6920
+ tags=[CfnTag(
6921
+ key="key",
6922
+ value="value"
6923
+ )]
6924
+ )
6925
+ '''
6517
6926
 
6518
- def _typecheckingstub__dfc5ed44d930f34c8aab89f35a98f79157366d4a6307eb58bfc63ed737000a53(
6519
- value: typing.Optional[typing.List[builtins.str]],
6520
- ) -> None:
6521
- """Type checking stubs"""
6522
- pass
6927
+ def __init__(
6928
+ self,
6929
+ scope: _constructs_77d1e7e8.Construct,
6930
+ id: builtins.str,
6931
+ *,
6932
+ firewall_arn: builtins.str,
6933
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union["CfnVpcEndpointAssociation.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]],
6934
+ vpc_id: builtins.str,
6935
+ description: typing.Optional[builtins.str] = None,
6936
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6937
+ ) -> None:
6938
+ '''Create a new ``AWS::NetworkFirewall::VpcEndpointAssociation``.
6523
6939
 
6524
- def _typecheckingstub__ee50239d13ab311a798770d372dccb418872f67c3e07c873f5d87e11df129a35(
6525
- value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
6526
- ) -> None:
6527
- """Type checking stubs"""
6528
- pass
6940
+ :param scope: Scope in which this resource is defined.
6941
+ :param id: Construct identifier for this resource (unique in its scope).
6942
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
6943
+ :param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
6944
+ :param vpc_id: The unique identifier of the VPC for the endpoint association.
6945
+ :param description: A description of the VPC endpoint association.
6946
+ :param tags: The key:value pairs to associate with the resource.
6947
+ '''
6948
+ if __debug__:
6949
+ type_hints = typing.get_type_hints(_typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3)
6950
+ check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
6951
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
6952
+ props = CfnVpcEndpointAssociationProps(
6953
+ firewall_arn=firewall_arn,
6954
+ subnet_mapping=subnet_mapping,
6955
+ vpc_id=vpc_id,
6956
+ description=description,
6957
+ tags=tags,
6958
+ )
6529
6959
 
6530
- def _typecheckingstub__3edeae6cf81be7cb1d87c21080d7c060fb1fdbd872b4292af576701d514ade47(
6531
- value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
6532
- ) -> None:
6533
- """Type checking stubs"""
6534
- pass
6960
+ jsii.create(self.__class__, self, [scope, id, props])
6535
6961
 
6536
- def _typecheckingstub__e1b2b141c4b9a04d63365f9d8a2a5636d417c4a087ebfbfd40be7336d4d258da(
6537
- value: typing.Optional[typing.List[_CfnTag_f6864754]],
6538
- ) -> None:
6539
- """Type checking stubs"""
6540
- pass
6962
+ @jsii.member(jsii_name="inspect")
6963
+ def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
6964
+ '''Examines the CloudFormation resource and discloses attributes.
6541
6965
 
6542
- def _typecheckingstub__cf86d50b8eec902ee512afbe0dfd3b1ee2bc8f0b9f4fb9acb4ac637ae3662fc0(
6543
- *,
6544
- subnet_id: builtins.str,
6545
- ip_address_type: typing.Optional[builtins.str] = None,
6546
- ) -> None:
6547
- """Type checking stubs"""
6548
- pass
6966
+ :param inspector: tree inspector to collect and process attributes.
6967
+ '''
6968
+ if __debug__:
6969
+ type_hints = typing.get_type_hints(_typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac)
6970
+ check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
6971
+ return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
6549
6972
 
6550
- def _typecheckingstub__d88babb6ad6946bc506d4761908231f5bd58eca8a4b6bc16dfccccad329a61ca(
6551
- scope: _constructs_77d1e7e8.Construct,
6552
- id: builtins.str,
6553
- *,
6554
- firewall_policy: typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.FirewallPolicyProperty, typing.Dict[builtins.str, typing.Any]]],
6555
- firewall_policy_name: builtins.str,
6556
- description: typing.Optional[builtins.str] = None,
6557
- tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6558
- ) -> None:
6559
- """Type checking stubs"""
6560
- pass
6973
+ @jsii.member(jsii_name="renderProperties")
6974
+ def _render_properties(
6975
+ self,
6976
+ props: typing.Mapping[builtins.str, typing.Any],
6977
+ ) -> typing.Mapping[builtins.str, typing.Any]:
6978
+ '''
6979
+ :param props: -
6980
+ '''
6981
+ if __debug__:
6982
+ type_hints = typing.get_type_hints(_typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036)
6983
+ check_type(argname="argument props", value=props, expected_type=type_hints["props"])
6984
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
6561
6985
 
6562
- def _typecheckingstub__6d5c5132a5b6e646e64fbde7a0f144884b26ad6646fb61ce294ea7f055ebdea9(
6563
- inspector: _TreeInspector_488e0dd5,
6564
- ) -> None:
6565
- """Type checking stubs"""
6566
- pass
6986
+ @jsii.python.classproperty
6987
+ @jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
6988
+ def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
6989
+ '''The CloudFormation resource type name for this resource class.'''
6990
+ return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
6567
6991
 
6568
- def _typecheckingstub__56698f8e6b1c138a730626856a3d169be448aa17fd1614293c276d6b465f45a2(
6569
- props: typing.Mapping[builtins.str, typing.Any],
6570
- ) -> None:
6992
+ @builtins.property
6993
+ @jsii.member(jsii_name="attrEndpointId")
6994
+ def attr_endpoint_id(self) -> builtins.str:
6995
+ '''The unique ID of the firewall endpoint for the subnet that you attached to the firewall.For example: "vpce-111122223333".
6996
+
6997
+ :cloudformationAttribute: EndpointId
6998
+ '''
6999
+ return typing.cast(builtins.str, jsii.get(self, "attrEndpointId"))
7000
+
7001
+ @builtins.property
7002
+ @jsii.member(jsii_name="attrVpcEndpointAssociationArn")
7003
+ def attr_vpc_endpoint_association_arn(self) -> builtins.str:
7004
+ '''The Amazon Resource Name (ARN) of a VPC endpoint association.
7005
+
7006
+ :cloudformationAttribute: VpcEndpointAssociationArn
7007
+ '''
7008
+ return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationArn"))
7009
+
7010
+ @builtins.property
7011
+ @jsii.member(jsii_name="attrVpcEndpointAssociationId")
7012
+ def attr_vpc_endpoint_association_id(self) -> builtins.str:
7013
+ '''The unique identifier of the VPC endpoint association.
7014
+
7015
+ :cloudformationAttribute: VpcEndpointAssociationId
7016
+ '''
7017
+ return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationId"))
7018
+
7019
+ @builtins.property
7020
+ @jsii.member(jsii_name="cdkTagManager")
7021
+ def cdk_tag_manager(self) -> _TagManager_0a598cb3:
7022
+ '''Tag Manager which manages the tags for this resource.'''
7023
+ return typing.cast(_TagManager_0a598cb3, jsii.get(self, "cdkTagManager"))
7024
+
7025
+ @builtins.property
7026
+ @jsii.member(jsii_name="cfnProperties")
7027
+ def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
7028
+ return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
7029
+
7030
+ @builtins.property
7031
+ @jsii.member(jsii_name="vpcEndpointAssociationRef")
7032
+ def vpc_endpoint_association_ref(self) -> _VpcEndpointAssociationReference_d627bc37:
7033
+ '''A reference to a VpcEndpointAssociation resource.'''
7034
+ return typing.cast(_VpcEndpointAssociationReference_d627bc37, jsii.get(self, "vpcEndpointAssociationRef"))
7035
+
7036
+ @builtins.property
7037
+ @jsii.member(jsii_name="firewallArn")
7038
+ def firewall_arn(self) -> builtins.str:
7039
+ '''The Amazon Resource Name (ARN) of the firewall.'''
7040
+ return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
7041
+
7042
+ @firewall_arn.setter
7043
+ def firewall_arn(self, value: builtins.str) -> None:
7044
+ if __debug__:
7045
+ type_hints = typing.get_type_hints(_typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3)
7046
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7047
+ jsii.set(self, "firewallArn", value) # pyright: ignore[reportArgumentType]
7048
+
7049
+ @builtins.property
7050
+ @jsii.member(jsii_name="subnetMapping")
7051
+ def subnet_mapping(
7052
+ self,
7053
+ ) -> typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"]:
7054
+ '''The ID for a subnet that's used in an association with a firewall.'''
7055
+ return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"], jsii.get(self, "subnetMapping"))
7056
+
7057
+ @subnet_mapping.setter
7058
+ def subnet_mapping(
7059
+ self,
7060
+ value: typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"],
7061
+ ) -> None:
7062
+ if __debug__:
7063
+ type_hints = typing.get_type_hints(_typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593)
7064
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7065
+ jsii.set(self, "subnetMapping", value) # pyright: ignore[reportArgumentType]
7066
+
7067
+ @builtins.property
7068
+ @jsii.member(jsii_name="vpcId")
7069
+ def vpc_id(self) -> builtins.str:
7070
+ '''The unique identifier of the VPC for the endpoint association.'''
7071
+ return typing.cast(builtins.str, jsii.get(self, "vpcId"))
7072
+
7073
+ @vpc_id.setter
7074
+ def vpc_id(self, value: builtins.str) -> None:
7075
+ if __debug__:
7076
+ type_hints = typing.get_type_hints(_typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767)
7077
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7078
+ jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
7079
+
7080
+ @builtins.property
7081
+ @jsii.member(jsii_name="description")
7082
+ def description(self) -> typing.Optional[builtins.str]:
7083
+ '''A description of the VPC endpoint association.'''
7084
+ return typing.cast(typing.Optional[builtins.str], jsii.get(self, "description"))
7085
+
7086
+ @description.setter
7087
+ def description(self, value: typing.Optional[builtins.str]) -> None:
7088
+ if __debug__:
7089
+ type_hints = typing.get_type_hints(_typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80)
7090
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7091
+ jsii.set(self, "description", value) # pyright: ignore[reportArgumentType]
7092
+
7093
+ @builtins.property
7094
+ @jsii.member(jsii_name="tags")
7095
+ def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
7096
+ '''The key:value pairs to associate with the resource.'''
7097
+ return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
7098
+
7099
+ @tags.setter
7100
+ def tags(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
7101
+ if __debug__:
7102
+ type_hints = typing.get_type_hints(_typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2)
7103
+ check_type(argname="argument value", value=value, expected_type=type_hints["value"])
7104
+ jsii.set(self, "tags", value) # pyright: ignore[reportArgumentType]
7105
+
7106
+ @jsii.data_type(
7107
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty",
7108
+ jsii_struct_bases=[],
7109
+ name_mapping={"subnet_id": "subnetId", "ip_address_type": "ipAddressType"},
7110
+ )
7111
+ class SubnetMappingProperty:
7112
+ def __init__(
7113
+ self,
7114
+ *,
7115
+ subnet_id: builtins.str,
7116
+ ip_address_type: typing.Optional[builtins.str] = None,
7117
+ ) -> None:
7118
+ '''The ID for a subnet that's used in an association with a firewall.
7119
+
7120
+ This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7121
+
7122
+ :param subnet_id: The unique identifier for the subnet.
7123
+ :param ip_address_type: The subnet's IP address type. You can't change the IP address type after you create the subnet.
7124
+
7125
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html
7126
+ :exampleMetadata: fixture=_generated
7127
+
7128
+ Example::
7129
+
7130
+ # The code below shows an example of how to instantiate this type.
7131
+ # The values are placeholders you should change.
7132
+ from aws_cdk import aws_networkfirewall as networkfirewall
7133
+
7134
+ subnet_mapping_property = networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
7135
+ subnet_id="subnetId",
7136
+
7137
+ # the properties below are optional
7138
+ ip_address_type="ipAddressType"
7139
+ )
7140
+ '''
7141
+ if __debug__:
7142
+ type_hints = typing.get_type_hints(_typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015)
7143
+ check_type(argname="argument subnet_id", value=subnet_id, expected_type=type_hints["subnet_id"])
7144
+ check_type(argname="argument ip_address_type", value=ip_address_type, expected_type=type_hints["ip_address_type"])
7145
+ self._values: typing.Dict[builtins.str, typing.Any] = {
7146
+ "subnet_id": subnet_id,
7147
+ }
7148
+ if ip_address_type is not None:
7149
+ self._values["ip_address_type"] = ip_address_type
7150
+
7151
+ @builtins.property
7152
+ def subnet_id(self) -> builtins.str:
7153
+ '''The unique identifier for the subnet.
7154
+
7155
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-subnetid
7156
+ '''
7157
+ result = self._values.get("subnet_id")
7158
+ assert result is not None, "Required property 'subnet_id' is missing"
7159
+ return typing.cast(builtins.str, result)
7160
+
7161
+ @builtins.property
7162
+ def ip_address_type(self) -> typing.Optional[builtins.str]:
7163
+ '''The subnet's IP address type.
7164
+
7165
+ You can't change the IP address type after you create the subnet.
7166
+
7167
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-ipaddresstype
7168
+ '''
7169
+ result = self._values.get("ip_address_type")
7170
+ return typing.cast(typing.Optional[builtins.str], result)
7171
+
7172
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
7173
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
7174
+
7175
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
7176
+ return not (rhs == self)
7177
+
7178
+ def __repr__(self) -> str:
7179
+ return "SubnetMappingProperty(%s)" % ", ".join(
7180
+ k + "=" + repr(v) for k, v in self._values.items()
7181
+ )
7182
+
7183
+
7184
+ @jsii.data_type(
7185
+ jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociationProps",
7186
+ jsii_struct_bases=[],
7187
+ name_mapping={
7188
+ "firewall_arn": "firewallArn",
7189
+ "subnet_mapping": "subnetMapping",
7190
+ "vpc_id": "vpcId",
7191
+ "description": "description",
7192
+ "tags": "tags",
7193
+ },
7194
+ )
7195
+ class CfnVpcEndpointAssociationProps:
7196
+ def __init__(
7197
+ self,
7198
+ *,
7199
+ firewall_arn: builtins.str,
7200
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
7201
+ vpc_id: builtins.str,
7202
+ description: typing.Optional[builtins.str] = None,
7203
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7204
+ ) -> None:
7205
+ '''Properties for defining a ``CfnVpcEndpointAssociation``.
7206
+
7207
+ :param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
7208
+ :param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7209
+ :param vpc_id: The unique identifier of the VPC for the endpoint association.
7210
+ :param description: A description of the VPC endpoint association.
7211
+ :param tags: The key:value pairs to associate with the resource.
7212
+
7213
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
7214
+ :exampleMetadata: fixture=_generated
7215
+
7216
+ Example::
7217
+
7218
+ # The code below shows an example of how to instantiate this type.
7219
+ # The values are placeholders you should change.
7220
+ from aws_cdk import aws_networkfirewall as networkfirewall
7221
+
7222
+ cfn_vpc_endpoint_association_props = networkfirewall.CfnVpcEndpointAssociationProps(
7223
+ firewall_arn="firewallArn",
7224
+ subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
7225
+ subnet_id="subnetId",
7226
+
7227
+ # the properties below are optional
7228
+ ip_address_type="ipAddressType"
7229
+ ),
7230
+ vpc_id="vpcId",
7231
+
7232
+ # the properties below are optional
7233
+ description="description",
7234
+ tags=[CfnTag(
7235
+ key="key",
7236
+ value="value"
7237
+ )]
7238
+ )
7239
+ '''
7240
+ if __debug__:
7241
+ type_hints = typing.get_type_hints(_typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76)
7242
+ check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
7243
+ check_type(argname="argument subnet_mapping", value=subnet_mapping, expected_type=type_hints["subnet_mapping"])
7244
+ check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
7245
+ check_type(argname="argument description", value=description, expected_type=type_hints["description"])
7246
+ check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
7247
+ self._values: typing.Dict[builtins.str, typing.Any] = {
7248
+ "firewall_arn": firewall_arn,
7249
+ "subnet_mapping": subnet_mapping,
7250
+ "vpc_id": vpc_id,
7251
+ }
7252
+ if description is not None:
7253
+ self._values["description"] = description
7254
+ if tags is not None:
7255
+ self._values["tags"] = tags
7256
+
7257
+ @builtins.property
7258
+ def firewall_arn(self) -> builtins.str:
7259
+ '''The Amazon Resource Name (ARN) of the firewall.
7260
+
7261
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-firewallarn
7262
+ '''
7263
+ result = self._values.get("firewall_arn")
7264
+ assert result is not None, "Required property 'firewall_arn' is missing"
7265
+ return typing.cast(builtins.str, result)
7266
+
7267
+ @builtins.property
7268
+ def subnet_mapping(
7269
+ self,
7270
+ ) -> typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty]:
7271
+ '''The ID for a subnet that's used in an association with a firewall.
7272
+
7273
+ This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
7274
+
7275
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping
7276
+ '''
7277
+ result = self._values.get("subnet_mapping")
7278
+ assert result is not None, "Required property 'subnet_mapping' is missing"
7279
+ return typing.cast(typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty], result)
7280
+
7281
+ @builtins.property
7282
+ def vpc_id(self) -> builtins.str:
7283
+ '''The unique identifier of the VPC for the endpoint association.
7284
+
7285
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-vpcid
7286
+ '''
7287
+ result = self._values.get("vpc_id")
7288
+ assert result is not None, "Required property 'vpc_id' is missing"
7289
+ return typing.cast(builtins.str, result)
7290
+
7291
+ @builtins.property
7292
+ def description(self) -> typing.Optional[builtins.str]:
7293
+ '''A description of the VPC endpoint association.
7294
+
7295
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-description
7296
+ '''
7297
+ result = self._values.get("description")
7298
+ return typing.cast(typing.Optional[builtins.str], result)
7299
+
7300
+ @builtins.property
7301
+ def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
7302
+ '''The key:value pairs to associate with the resource.
7303
+
7304
+ :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-tags
7305
+ '''
7306
+ result = self._values.get("tags")
7307
+ return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
7308
+
7309
+ def __eq__(self, rhs: typing.Any) -> builtins.bool:
7310
+ return isinstance(rhs, self.__class__) and rhs._values == self._values
7311
+
7312
+ def __ne__(self, rhs: typing.Any) -> builtins.bool:
7313
+ return not (rhs == self)
7314
+
7315
+ def __repr__(self) -> str:
7316
+ return "CfnVpcEndpointAssociationProps(%s)" % ", ".join(
7317
+ k + "=" + repr(v) for k, v in self._values.items()
7318
+ )
7319
+
7320
+
7321
+ __all__ = [
7322
+ "CfnFirewall",
7323
+ "CfnFirewallPolicy",
7324
+ "CfnFirewallPolicyProps",
7325
+ "CfnFirewallProps",
7326
+ "CfnLoggingConfiguration",
7327
+ "CfnLoggingConfigurationProps",
7328
+ "CfnRuleGroup",
7329
+ "CfnRuleGroupProps",
7330
+ "CfnTLSInspectionConfiguration",
7331
+ "CfnTLSInspectionConfigurationProps",
7332
+ "CfnVpcEndpointAssociation",
7333
+ "CfnVpcEndpointAssociationProps",
7334
+ ]
7335
+
7336
+ publication.publish()
7337
+
7338
+ def _typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56(
7339
+ scope: _constructs_77d1e7e8.Construct,
7340
+ id: builtins.str,
7341
+ *,
7342
+ firewall_name: builtins.str,
7343
+ firewall_policy_arn: builtins.str,
7344
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7345
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
7346
+ delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7347
+ description: typing.Optional[builtins.str] = None,
7348
+ enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
7349
+ firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7350
+ subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7351
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
7352
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7353
+ transit_gateway_id: typing.Optional[builtins.str] = None,
7354
+ vpc_id: typing.Optional[builtins.str] = None,
7355
+ ) -> None:
7356
+ """Type checking stubs"""
7357
+ pass
7358
+
7359
+ def _typecheckingstub__c7c4e2793da1cf8bea450c2122d2557d378fad5e129ebb26f114a36cfc6506a2(
7360
+ inspector: _TreeInspector_488e0dd5,
7361
+ ) -> None:
7362
+ """Type checking stubs"""
7363
+ pass
7364
+
7365
+ def _typecheckingstub__46677a58d997dd59fd033c9a9ee94e3689cafff9e028d3e2d162ddfeee718547(
7366
+ props: typing.Mapping[builtins.str, typing.Any],
7367
+ ) -> None:
7368
+ """Type checking stubs"""
7369
+ pass
7370
+
7371
+ def _typecheckingstub__fdb28f607bba18f9f1db46f554b41c7ddfaaf01fe3c74c5f99726bd72458a115(
7372
+ value: builtins.str,
7373
+ ) -> None:
7374
+ """Type checking stubs"""
7375
+ pass
7376
+
7377
+ def _typecheckingstub__c711ef7af7567ab69b12f083b26c4033f7cdf1593bf27227f989d7c73e8c9fc2(
7378
+ value: builtins.str,
7379
+ ) -> None:
7380
+ """Type checking stubs"""
7381
+ pass
7382
+
7383
+ def _typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1(
7384
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7385
+ ) -> None:
7386
+ """Type checking stubs"""
7387
+ pass
7388
+
7389
+ def _typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77(
7390
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]],
7391
+ ) -> None:
7392
+ """Type checking stubs"""
7393
+ pass
7394
+
7395
+ def _typecheckingstub__12d69795554b50f9f4f46a0470d9cf06e4d826d030dcab9f0adfc3a3d566c8b3(
7396
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7397
+ ) -> None:
7398
+ """Type checking stubs"""
7399
+ pass
7400
+
7401
+ def _typecheckingstub__fea0349bbbe56acfbf8d2e11ce10cdd2221eb418df0a6df3602174f8015ca4f6(
7402
+ value: typing.Optional[builtins.str],
7403
+ ) -> None:
7404
+ """Type checking stubs"""
7405
+ pass
7406
+
7407
+ def _typecheckingstub__dfc5ed44d930f34c8aab89f35a98f79157366d4a6307eb58bfc63ed737000a53(
7408
+ value: typing.Optional[typing.List[builtins.str]],
7409
+ ) -> None:
7410
+ """Type checking stubs"""
7411
+ pass
7412
+
7413
+ def _typecheckingstub__ee50239d13ab311a798770d372dccb418872f67c3e07c873f5d87e11df129a35(
7414
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7415
+ ) -> None:
7416
+ """Type checking stubs"""
7417
+ pass
7418
+
7419
+ def _typecheckingstub__3edeae6cf81be7cb1d87c21080d7c060fb1fdbd872b4292af576701d514ade47(
7420
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7421
+ ) -> None:
7422
+ """Type checking stubs"""
7423
+ pass
7424
+
7425
+ def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
7426
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]],
7427
+ ) -> None:
7428
+ """Type checking stubs"""
7429
+ pass
7430
+
7431
+ def _typecheckingstub__e1b2b141c4b9a04d63365f9d8a2a5636d417c4a087ebfbfd40be7336d4d258da(
7432
+ value: typing.Optional[typing.List[_CfnTag_f6864754]],
7433
+ ) -> None:
7434
+ """Type checking stubs"""
7435
+ pass
7436
+
7437
+ def _typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6(
7438
+ value: typing.Optional[builtins.str],
7439
+ ) -> None:
7440
+ """Type checking stubs"""
7441
+ pass
7442
+
7443
+ def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
7444
+ value: typing.Optional[builtins.str],
7445
+ ) -> None:
7446
+ """Type checking stubs"""
7447
+ pass
7448
+
7449
+ def _typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf(
7450
+ *,
7451
+ availability_zone: builtins.str,
7452
+ ) -> None:
7453
+ """Type checking stubs"""
7454
+ pass
7455
+
7456
+ def _typecheckingstub__cf86d50b8eec902ee512afbe0dfd3b1ee2bc8f0b9f4fb9acb4ac637ae3662fc0(
7457
+ *,
7458
+ subnet_id: builtins.str,
7459
+ ip_address_type: typing.Optional[builtins.str] = None,
7460
+ ) -> None:
7461
+ """Type checking stubs"""
7462
+ pass
7463
+
7464
+ def _typecheckingstub__d88babb6ad6946bc506d4761908231f5bd58eca8a4b6bc16dfccccad329a61ca(
7465
+ scope: _constructs_77d1e7e8.Construct,
7466
+ id: builtins.str,
7467
+ *,
7468
+ firewall_policy: typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.FirewallPolicyProperty, typing.Dict[builtins.str, typing.Any]]],
7469
+ firewall_policy_name: builtins.str,
7470
+ description: typing.Optional[builtins.str] = None,
7471
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7472
+ ) -> None:
7473
+ """Type checking stubs"""
7474
+ pass
7475
+
7476
+ def _typecheckingstub__6d5c5132a5b6e646e64fbde7a0f144884b26ad6646fb61ce294ea7f055ebdea9(
7477
+ inspector: _TreeInspector_488e0dd5,
7478
+ ) -> None:
7479
+ """Type checking stubs"""
7480
+ pass
7481
+
7482
+ def _typecheckingstub__56698f8e6b1c138a730626856a3d169be448aa17fd1614293c276d6b465f45a2(
7483
+ props: typing.Mapping[builtins.str, typing.Any],
7484
+ ) -> None:
6571
7485
  """Type checking stubs"""
6572
7486
  pass
6573
7487
 
@@ -6621,6 +7535,7 @@ def _typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2d
6621
7535
  *,
6622
7536
  stateless_default_actions: typing.Sequence[builtins.str],
6623
7537
  stateless_fragment_default_actions: typing.Sequence[builtins.str],
7538
+ enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6624
7539
  policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.PolicyVariablesProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6625
7540
  stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
6626
7541
  stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulEngineOptionsProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
@@ -6679,6 +7594,7 @@ def _typecheckingstub__62be7baa7c0ae22655f34e1d3316236c114457fe368caf2a958ba1fd9
6679
7594
  def _typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8(
6680
7595
  *,
6681
7596
  resource_arn: builtins.str,
7597
+ deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6682
7598
  override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulRuleGroupOverrideProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6683
7599
  priority: typing.Optional[jsii.Number] = None,
6684
7600
  ) -> None:
@@ -6707,14 +7623,17 @@ def _typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57b
6707
7623
  *,
6708
7624
  firewall_name: builtins.str,
6709
7625
  firewall_policy_arn: builtins.str,
6710
- subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
6711
- vpc_id: builtins.str,
7626
+ availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7627
+ availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6712
7628
  delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6713
7629
  description: typing.Optional[builtins.str] = None,
6714
7630
  enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
6715
7631
  firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6716
7632
  subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
7633
+ subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
6717
7634
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7635
+ transit_gateway_id: typing.Optional[builtins.str] = None,
7636
+ vpc_id: typing.Optional[builtins.str] = None,
6718
7637
  ) -> None:
6719
7638
  """Type checking stubs"""
6720
7639
  pass
@@ -6725,6 +7644,7 @@ def _typecheckingstub__71487a7865ce1877156cecd1cb83afa7ffd5f6428fa2611a7537c9ccf
6725
7644
  *,
6726
7645
  firewall_arn: builtins.str,
6727
7646
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
7647
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6728
7648
  firewall_name: typing.Optional[builtins.str] = None,
6729
7649
  ) -> None:
6730
7650
  """Type checking stubs"""
@@ -6754,6 +7674,12 @@ def _typecheckingstub__6379a583f20adcddf04ea938455ca9e96ed6e0a2293ffa4b839685154
6754
7674
  """Type checking stubs"""
6755
7675
  pass
6756
7676
 
7677
+ def _typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe(
7678
+ value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
7679
+ ) -> None:
7680
+ """Type checking stubs"""
7681
+ pass
7682
+
6757
7683
  def _typecheckingstub__1e3640e7313e33945bc2b7c00caa777b47e14239e160ded6a349405aeb0b47da(
6758
7684
  value: typing.Optional[builtins.str],
6759
7685
  ) -> None:
@@ -6780,6 +7706,7 @@ def _typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d6217
6780
7706
  *,
6781
7707
  firewall_arn: builtins.str,
6782
7708
  logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
7709
+ enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
6783
7710
  firewall_name: typing.Optional[builtins.str] = None,
6784
7711
  ) -> None:
6785
7712
  """Type checking stubs"""
@@ -6794,6 +7721,7 @@ def _typecheckingstub__2f1d19cebb2e7dfe2bb3a674253e22bfdb540bd48dc9cd243370420d8
6794
7721
  type: builtins.str,
6795
7722
  description: typing.Optional[builtins.str] = None,
6796
7723
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7724
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
6797
7725
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
6798
7726
  ) -> None:
6799
7727
  """Type checking stubs"""
@@ -6841,6 +7769,12 @@ def _typecheckingstub__6ed6ac96ae6360b92bfdf6614d9832ba1cad5080dce3a3257a75537c9
6841
7769
  """Type checking stubs"""
6842
7770
  pass
6843
7771
 
7772
+ def _typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0(
7773
+ value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]],
7774
+ ) -> None:
7775
+ """Type checking stubs"""
7776
+ pass
7777
+
6844
7778
  def _typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5(
6845
7779
  value: typing.Optional[typing.List[_CfnTag_f6864754]],
6846
7780
  ) -> None:
@@ -7028,6 +7962,13 @@ def _typecheckingstub__71d7a12c23bdb40d0d25319bf80720d55c4205129c386e8de5676df43
7028
7962
  """Type checking stubs"""
7029
7963
  pass
7030
7964
 
7965
+ def _typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307(
7966
+ *,
7967
+ rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
7968
+ ) -> None:
7969
+ """Type checking stubs"""
7970
+ pass
7971
+
7031
7972
  def _typecheckingstub__775fa1817d39168a6b1883b9e449352da902edc72fb398c55cda18aa8ead3039(
7032
7973
  *,
7033
7974
  flags: typing.Sequence[builtins.str],
@@ -7043,6 +7984,7 @@ def _typecheckingstub__775b93be404fbe10bf6b023b8192636307852f30e49da9892d7e20aa4
7043
7984
  type: builtins.str,
7044
7985
  description: typing.Optional[builtins.str] = None,
7045
7986
  rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7987
+ summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
7046
7988
  tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
7047
7989
  ) -> None:
7048
7990
  """Type checking stubs"""
@@ -7163,3 +8105,77 @@ def _typecheckingstub__f05137012f831af07bffb09e4ece1302036a8c7c23718d26dcb08f4bf
7163
8105
  ) -> None:
7164
8106
  """Type checking stubs"""
7165
8107
  pass
8108
+
8109
+ def _typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3(
8110
+ scope: _constructs_77d1e7e8.Construct,
8111
+ id: builtins.str,
8112
+ *,
8113
+ firewall_arn: builtins.str,
8114
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
8115
+ vpc_id: builtins.str,
8116
+ description: typing.Optional[builtins.str] = None,
8117
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
8118
+ ) -> None:
8119
+ """Type checking stubs"""
8120
+ pass
8121
+
8122
+ def _typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac(
8123
+ inspector: _TreeInspector_488e0dd5,
8124
+ ) -> None:
8125
+ """Type checking stubs"""
8126
+ pass
8127
+
8128
+ def _typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036(
8129
+ props: typing.Mapping[builtins.str, typing.Any],
8130
+ ) -> None:
8131
+ """Type checking stubs"""
8132
+ pass
8133
+
8134
+ def _typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3(
8135
+ value: builtins.str,
8136
+ ) -> None:
8137
+ """Type checking stubs"""
8138
+ pass
8139
+
8140
+ def _typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593(
8141
+ value: typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty],
8142
+ ) -> None:
8143
+ """Type checking stubs"""
8144
+ pass
8145
+
8146
+ def _typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767(
8147
+ value: builtins.str,
8148
+ ) -> None:
8149
+ """Type checking stubs"""
8150
+ pass
8151
+
8152
+ def _typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80(
8153
+ value: typing.Optional[builtins.str],
8154
+ ) -> None:
8155
+ """Type checking stubs"""
8156
+ pass
8157
+
8158
+ def _typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2(
8159
+ value: typing.Optional[typing.List[_CfnTag_f6864754]],
8160
+ ) -> None:
8161
+ """Type checking stubs"""
8162
+ pass
8163
+
8164
+ def _typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015(
8165
+ *,
8166
+ subnet_id: builtins.str,
8167
+ ip_address_type: typing.Optional[builtins.str] = None,
8168
+ ) -> None:
8169
+ """Type checking stubs"""
8170
+ pass
8171
+
8172
+ def _typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76(
8173
+ *,
8174
+ firewall_arn: builtins.str,
8175
+ subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
8176
+ vpc_id: builtins.str,
8177
+ description: typing.Optional[builtins.str] = None,
8178
+ tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
8179
+ ) -> None:
8180
+ """Type checking stubs"""
8181
+ pass