aws-cdk-lib 2.200.2__py3-none-any.whl → 2.224.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +1349 -373
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.200.2.jsii.tgz → aws-cdk-lib@2.224.0.jsii.tgz} +0 -0
- aws_cdk/alexa_ask/__init__.py +12 -2
- aws_cdk/aws_accessanalyzer/__init__.py +323 -6
- aws_cdk/aws_acmpca/__init__.py +53 -10
- aws_cdk/aws_aiops/__init__.py +1019 -0
- aws_cdk/aws_amazonmq/__init__.py +357 -313
- aws_cdk/aws_amplify/__init__.py +173 -17
- aws_cdk/aws_amplifyuibuilder/__init__.py +35 -6
- aws_cdk/aws_apigateway/__init__.py +1017 -155
- aws_cdk/aws_apigatewayv2/__init__.py +2796 -379
- aws_cdk/aws_apigatewayv2_integrations/__init__.py +94 -16
- aws_cdk/aws_appconfig/__init__.py +298 -43
- aws_cdk/aws_appflow/__init__.py +151 -6
- aws_cdk/aws_appintegrations/__init__.py +546 -6
- aws_cdk/aws_applicationautoscaling/__init__.py +29 -6
- aws_cdk/aws_applicationinsights/__init__.py +13 -2
- aws_cdk/aws_applicationsignals/__init__.py +374 -6
- aws_cdk/aws_appmesh/__init__.py +94 -26
- aws_cdk/aws_apprunner/__init__.py +66 -18
- aws_cdk/aws_appstream/__init__.py +309 -55
- aws_cdk/aws_appsync/__init__.py +227 -53
- aws_cdk/aws_apptest/__init__.py +71 -2
- aws_cdk/aws_aps/__init__.py +1875 -132
- aws_cdk/aws_arcregionswitch/__init__.py +5095 -0
- aws_cdk/aws_arczonalshift/__init__.py +39 -12
- aws_cdk/aws_athena/__init__.py +365 -29
- aws_cdk/aws_auditmanager/__init__.py +71 -2
- aws_cdk/aws_autoscaling/__init__.py +135 -55
- aws_cdk/aws_autoscaling_common/__init__.py +3 -0
- aws_cdk/aws_autoscalingplans/__init__.py +13 -2
- aws_cdk/aws_b2bi/__init__.py +1819 -99
- aws_cdk/aws_backup/__init__.py +317 -28
- aws_cdk/aws_backupgateway/__init__.py +13 -2
- aws_cdk/aws_batch/__init__.py +1405 -178
- aws_cdk/aws_bcmdataexports/__init__.py +21 -2
- aws_cdk/aws_bedrock/__init__.py +6747 -627
- aws_cdk/aws_bedrockagentcore/__init__.py +10425 -0
- aws_cdk/aws_billingconductor/__init__.py +197 -11
- aws_cdk/aws_budgets/__init__.py +42 -4
- aws_cdk/aws_cassandra/__init__.py +247 -6
- aws_cdk/aws_ce/__init__.py +35 -6
- aws_cdk/aws_certificatemanager/__init__.py +237 -32
- aws_cdk/aws_chatbot/__init__.py +70 -6
- aws_cdk/aws_cleanrooms/__init__.py +709 -206
- aws_cdk/aws_cleanroomsml/__init__.py +13 -2
- aws_cdk/aws_cloud9/__init__.py +13 -2
- aws_cdk/aws_cloudformation/__init__.py +345 -166
- aws_cdk/aws_cloudfront/__init__.py +2101 -680
- aws_cdk/aws_cloudfront/experimental/__init__.py +108 -16
- aws_cdk/aws_cloudfront_origins/__init__.py +614 -73
- aws_cdk/aws_cloudtrail/__init__.py +301 -17
- aws_cdk/aws_cloudwatch/__init__.py +1414 -153
- aws_cdk/aws_codeartifact/__init__.py +35 -6
- aws_cdk/aws_codebuild/__init__.py +1103 -118
- aws_cdk/aws_codecommit/__init__.py +23 -9
- aws_cdk/aws_codeconnections/__init__.py +13 -2
- aws_cdk/aws_codedeploy/__init__.py +67 -6
- aws_cdk/aws_codeguruprofiler/__init__.py +74 -2
- aws_cdk/aws_codegurureviewer/__init__.py +13 -2
- aws_cdk/aws_codepipeline/__init__.py +127 -64
- aws_cdk/aws_codepipeline_actions/__init__.py +749 -0
- aws_cdk/aws_codestar/__init__.py +13 -2
- aws_cdk/aws_codestarconnections/__init__.py +35 -6
- aws_cdk/aws_codestarnotifications/__init__.py +16 -2
- aws_cdk/aws_cognito/__init__.py +814 -80
- aws_cdk/aws_cognito_identitypool/__init__.py +17 -12
- aws_cdk/aws_comprehend/__init__.py +24 -4
- aws_cdk/aws_config/__init__.py +191 -30
- aws_cdk/aws_connect/__init__.py +2736 -191
- aws_cdk/aws_connectcampaigns/__init__.py +13 -2
- aws_cdk/aws_connectcampaignsv2/__init__.py +268 -6
- aws_cdk/aws_controltower/__init__.py +35 -6
- aws_cdk/aws_cur/__init__.py +100 -4
- aws_cdk/aws_customerprofiles/__init__.py +617 -27
- aws_cdk/aws_databrew/__init__.py +68 -12
- aws_cdk/aws_datapipeline/__init__.py +42 -2
- aws_cdk/aws_datasync/__init__.py +723 -203
- aws_cdk/aws_datazone/__init__.py +4425 -608
- aws_cdk/aws_dax/__init__.py +83 -6
- aws_cdk/aws_deadline/__init__.py +321 -32
- aws_cdk/aws_detective/__init__.py +35 -6
- aws_cdk/aws_devicefarm/__init__.py +68 -12
- aws_cdk/aws_devopsguru/__init__.py +37 -6
- aws_cdk/aws_directoryservice/__init__.py +53 -4
- aws_cdk/aws_dlm/__init__.py +13 -2
- aws_cdk/aws_dms/__init__.py +184 -27
- aws_cdk/aws_docdb/__init__.py +323 -46
- aws_cdk/aws_docdbelastic/__init__.py +13 -2
- aws_cdk/aws_dsql/__init__.py +340 -12
- aws_cdk/aws_dynamodb/__init__.py +1463 -166
- aws_cdk/aws_ec2/__init__.py +9636 -1120
- aws_cdk/aws_ecr/__init__.py +631 -43
- aws_cdk/aws_ecr_assets/__init__.py +4 -0
- aws_cdk/aws_ecs/__init__.py +6524 -497
- aws_cdk/aws_ecs_patterns/__init__.py +2 -0
- aws_cdk/aws_efs/__init__.py +264 -24
- aws_cdk/aws_eks/__init__.py +1050 -218
- aws_cdk/aws_elasticache/__init__.py +373 -20
- aws_cdk/aws_elasticbeanstalk/__init__.py +75 -8
- aws_cdk/aws_elasticloadbalancing/__init__.py +16 -2
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +1670 -106
- aws_cdk/aws_elasticsearch/__init__.py +282 -9
- aws_cdk/aws_emr/__init__.py +187 -20
- aws_cdk/aws_emrcontainers/__init__.py +71 -2
- aws_cdk/aws_emrserverless/__init__.py +188 -3
- aws_cdk/aws_entityresolution/__init__.py +585 -58
- aws_cdk/aws_events/__init__.py +969 -124
- aws_cdk/aws_events_targets/__init__.py +310 -54
- aws_cdk/aws_eventschemas/__init__.py +46 -8
- aws_cdk/aws_evidently/__init__.py +57 -10
- aws_cdk/aws_evs/__init__.py +2244 -0
- aws_cdk/aws_finspace/__init__.py +71 -2
- aws_cdk/aws_fis/__init__.py +26 -4
- aws_cdk/aws_fms/__init__.py +35 -6
- aws_cdk/aws_forecast/__init__.py +24 -4
- aws_cdk/aws_frauddetector/__init__.py +79 -14
- aws_cdk/aws_fsx/__init__.py +1236 -142
- aws_cdk/aws_gamelift/__init__.py +653 -78
- aws_cdk/aws_gameliftstreams/__init__.py +38 -16
- aws_cdk/aws_globalaccelerator/__init__.py +55 -14
- aws_cdk/aws_glue/__init__.py +1368 -320
- aws_cdk/aws_grafana/__init__.py +13 -2
- aws_cdk/aws_greengrass/__init__.py +654 -32
- aws_cdk/aws_greengrassv2/__init__.py +53 -4
- aws_cdk/aws_groundstation/__init__.py +122 -6
- aws_cdk/aws_guardduty/__init__.py +1613 -123
- aws_cdk/aws_healthimaging/__init__.py +71 -2
- aws_cdk/aws_healthlake/__init__.py +42 -2
- aws_cdk/aws_iam/__init__.py +480 -140
- aws_cdk/aws_identitystore/__init__.py +24 -4
- aws_cdk/aws_imagebuilder/__init__.py +1433 -183
- aws_cdk/aws_inspector/__init__.py +38 -6
- aws_cdk/aws_inspectorv2/__init__.py +2285 -243
- aws_cdk/aws_internetmonitor/__init__.py +71 -2
- aws_cdk/aws_invoicing/__init__.py +13 -2
- aws_cdk/aws_iot/__init__.py +1730 -86
- aws_cdk/aws_iotanalytics/__init__.py +162 -8
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +106 -40
- aws_cdk/aws_iotevents/__init__.py +122 -6
- aws_cdk/aws_iotfleethub/__init__.py +71 -2
- aws_cdk/aws_iotfleetwise/__init__.py +195 -14
- aws_cdk/aws_iotsitewise/__init__.py +1837 -89
- aws_cdk/aws_iotthingsgraph/__init__.py +13 -2
- aws_cdk/aws_iottwinmaker/__init__.py +115 -10
- aws_cdk/aws_iotwireless/__init__.py +649 -22
- aws_cdk/aws_ivs/__init__.py +561 -57
- aws_cdk/aws_ivschat/__init__.py +24 -4
- aws_cdk/aws_kafkaconnect/__init__.py +35 -6
- aws_cdk/aws_kendra/__init__.py +120 -28
- aws_cdk/aws_kendraranking/__init__.py +13 -2
- aws_cdk/aws_kinesis/__init__.py +622 -22
- aws_cdk/aws_kinesisanalytics/__init__.py +467 -94
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +201 -11
- aws_cdk/aws_kinesisfirehose/__init__.py +3077 -295
- aws_cdk/aws_kinesisvideo/__init__.py +24 -4
- aws_cdk/aws_kms/__init__.py +188 -41
- aws_cdk/aws_lakeformation/__init__.py +80 -15
- aws_cdk/aws_lambda/__init__.py +2101 -252
- aws_cdk/aws_lambda_event_sources/__init__.py +638 -1
- aws_cdk/aws_lambda_nodejs/__init__.py +63 -24
- aws_cdk/aws_launchwizard/__init__.py +13 -2
- aws_cdk/aws_lex/__init__.py +871 -8
- aws_cdk/aws_licensemanager/__init__.py +24 -4
- aws_cdk/aws_lightsail/__init__.py +2159 -975
- aws_cdk/aws_location/__init__.py +618 -14
- aws_cdk/aws_logs/__init__.py +5904 -956
- aws_cdk/aws_lookoutequipment/__init__.py +13 -2
- aws_cdk/aws_lookoutmetrics/__init__.py +38 -6
- aws_cdk/aws_lookoutvision/__init__.py +71 -2
- aws_cdk/aws_m2/__init__.py +94 -19
- aws_cdk/aws_macie/__init__.py +49 -11
- aws_cdk/aws_managedblockchain/__init__.py +180 -6
- aws_cdk/aws_mediaconnect/__init__.py +101 -18
- aws_cdk/aws_mediaconvert/__init__.py +35 -6
- aws_cdk/aws_medialive/__init__.py +1239 -35
- aws_cdk/aws_mediapackage/__init__.py +59 -12
- aws_cdk/aws_mediapackagev2/__init__.py +1607 -225
- aws_cdk/aws_mediastore/__init__.py +13 -2
- aws_cdk/aws_mediatailor/__init__.py +583 -12
- aws_cdk/aws_memorydb/__init__.py +271 -12
- aws_cdk/aws_mpa/__init__.py +1495 -0
- aws_cdk/aws_msk/__init__.py +104 -18
- aws_cdk/aws_mwaa/__init__.py +121 -9
- aws_cdk/aws_neptune/__init__.py +290 -78
- aws_cdk/aws_neptunegraph/__init__.py +24 -4
- aws_cdk/aws_networkfirewall/__init__.py +1289 -273
- aws_cdk/aws_networkmanager/__init__.py +349 -33
- aws_cdk/aws_nimblestudio/__init__.py +75 -8
- aws_cdk/aws_notifications/__init__.py +317 -12
- aws_cdk/aws_notificationscontacts/__init__.py +13 -2
- aws_cdk/aws_oam/__init__.py +24 -4
- aws_cdk/aws_observabilityadmin/__init__.py +2561 -0
- aws_cdk/aws_odb/__init__.py +5872 -0
- aws_cdk/aws_omics/__init__.py +2495 -529
- aws_cdk/aws_opensearchserverless/__init__.py +312 -37
- aws_cdk/aws_opensearchservice/__init__.py +495 -19
- aws_cdk/aws_opsworks/__init__.py +235 -139
- aws_cdk/aws_opsworkscm/__init__.py +16 -52
- aws_cdk/aws_organizations/__init__.py +70 -10
- aws_cdk/aws_osis/__init__.py +167 -2
- aws_cdk/aws_panorama/__init__.py +151 -6
- aws_cdk/aws_paymentcryptography/__init__.py +24 -4
- aws_cdk/aws_pcaconnectorad/__init__.py +59 -10
- aws_cdk/aws_pcaconnectorscep/__init__.py +24 -4
- aws_cdk/aws_pcs/__init__.py +387 -68
- aws_cdk/aws_personalize/__init__.py +46 -8
- aws_cdk/aws_pinpoint/__init__.py +329 -38
- aws_cdk/aws_pinpointemail/__init__.py +48 -8
- aws_cdk/aws_pipes/__init__.py +12 -2
- aws_cdk/aws_proton/__init__.py +37 -6
- aws_cdk/aws_qbusiness/__init__.py +635 -34
- aws_cdk/aws_qldb/__init__.py +24 -4
- aws_cdk/aws_quicksight/__init__.py +7900 -1160
- aws_cdk/aws_ram/__init__.py +24 -4
- aws_cdk/aws_rbin/__init__.py +12 -2
- aws_cdk/aws_rds/__init__.py +3345 -512
- aws_cdk/aws_redshift/__init__.py +143 -20
- aws_cdk/aws_redshiftserverless/__init__.py +692 -4
- aws_cdk/aws_refactorspaces/__init__.py +64 -14
- aws_cdk/aws_rekognition/__init__.py +93 -6
- aws_cdk/aws_resiliencehub/__init__.py +24 -4
- aws_cdk/aws_resourceexplorer2/__init__.py +35 -6
- aws_cdk/aws_resourcegroups/__init__.py +82 -4
- aws_cdk/aws_robomaker/__init__.py +72 -12
- aws_cdk/aws_rolesanywhere/__init__.py +180 -6
- aws_cdk/aws_route53/__init__.py +3273 -1442
- aws_cdk/aws_route53_targets/__init__.py +3 -0
- aws_cdk/aws_route53profiles/__init__.py +37 -6
- aws_cdk/aws_route53recoverycontrol/__init__.py +46 -8
- aws_cdk/aws_route53recoveryreadiness/__init__.py +104 -8
- aws_cdk/aws_route53resolver/__init__.py +226 -36
- aws_cdk/aws_rtbfabric/__init__.py +3498 -0
- aws_cdk/aws_rum/__init__.py +13 -2
- aws_cdk/aws_s3/__init__.py +1291 -158
- aws_cdk/aws_s3_assets/__init__.py +11 -11
- aws_cdk/aws_s3_deployment/__init__.py +147 -11
- aws_cdk/aws_s3_notifications/__init__.py +7 -7
- aws_cdk/aws_s3express/__init__.py +266 -8
- aws_cdk/aws_s3objectlambda/__init__.py +68 -16
- aws_cdk/aws_s3outposts/__init__.py +46 -8
- aws_cdk/aws_s3tables/__init__.py +2000 -323
- aws_cdk/aws_s3vectors/__init__.py +1378 -0
- aws_cdk/aws_sagemaker/__init__.py +6617 -363
- aws_cdk/aws_sam/__init__.py +79 -14
- aws_cdk/aws_scheduler/__init__.py +237 -4
- aws_cdk/aws_sdb/__init__.py +12 -2
- aws_cdk/aws_secretsmanager/__init__.py +170 -14
- aws_cdk/aws_securityhub/__init__.py +3121 -176
- aws_cdk/aws_securitylake/__init__.py +46 -8
- aws_cdk/aws_servicecatalog/__init__.py +405 -246
- aws_cdk/aws_servicecatalogappregistry/__init__.py +164 -8
- aws_cdk/aws_servicediscovery/__init__.py +140 -47
- aws_cdk/aws_ses/__init__.py +1231 -140
- aws_cdk/aws_shield/__init__.py +46 -8
- aws_cdk/aws_signer/__init__.py +27 -4
- aws_cdk/aws_simspaceweaver/__init__.py +42 -2
- aws_cdk/aws_smsvoice/__init__.py +4716 -0
- aws_cdk/aws_sns/__init__.py +245 -29
- aws_cdk/aws_sns_subscriptions/__init__.py +3 -1
- aws_cdk/aws_sqs/__init__.py +211 -14
- aws_cdk/aws_ssm/__init__.py +401 -58
- aws_cdk/aws_ssmcontacts/__init__.py +46 -8
- aws_cdk/aws_ssmguiconnect/__init__.py +13 -2
- aws_cdk/aws_ssmincidents/__init__.py +24 -4
- aws_cdk/aws_ssmquicksetup/__init__.py +383 -6
- aws_cdk/aws_sso/__init__.py +70 -12
- aws_cdk/aws_stepfunctions/__init__.py +615 -70
- aws_cdk/aws_stepfunctions_tasks/__init__.py +781 -144
- aws_cdk/aws_supportapp/__init__.py +39 -6
- aws_cdk/aws_synthetics/__init__.py +861 -75
- aws_cdk/aws_systemsmanagersap/__init__.py +13 -2
- aws_cdk/aws_timestream/__init__.py +104 -8
- aws_cdk/aws_transfer/__init__.py +784 -87
- aws_cdk/aws_verifiedpermissions/__init__.py +145 -17
- aws_cdk/aws_voiceid/__init__.py +41 -2
- aws_cdk/aws_vpclattice/__init__.py +376 -30
- aws_cdk/aws_waf/__init__.py +79 -14
- aws_cdk/aws_wafregional/__init__.py +123 -22
- aws_cdk/aws_wafv2/__init__.py +1179 -60
- aws_cdk/aws_wisdom/__init__.py +1401 -90
- aws_cdk/aws_workspaces/__init__.py +93 -6
- aws_cdk/aws_workspacesinstances/__init__.py +3940 -0
- aws_cdk/aws_workspacesthinclient/__init__.py +79 -10
- aws_cdk/aws_workspacesweb/__init__.py +1057 -141
- aws_cdk/aws_xray/__init__.py +48 -8
- aws_cdk/cloud_assembly_schema/__init__.py +231 -6
- aws_cdk/custom_resources/__init__.py +40 -12
- aws_cdk/cx_api/__init__.py +85 -14
- aws_cdk/interfaces/__init__.py +739 -0
- aws_cdk/interfaces/alexa_ask/__init__.py +146 -0
- aws_cdk/interfaces/aws_accessanalyzer/__init__.py +146 -0
- aws_cdk/interfaces/aws_acmpca/__init__.py +501 -0
- aws_cdk/interfaces/aws_aiops/__init__.py +146 -0
- aws_cdk/interfaces/aws_amazonmq/__init__.py +386 -0
- aws_cdk/interfaces/aws_amplify/__init__.py +352 -0
- aws_cdk/interfaces/aws_amplifyuibuilder/__init__.py +454 -0
- aws_cdk/interfaces/aws_apigateway/__init__.py +2486 -0
- aws_cdk/interfaces/aws_apigatewayv2/__init__.py +1651 -0
- aws_cdk/interfaces/aws_appconfig/__init__.py +1020 -0
- aws_cdk/interfaces/aws_appflow/__init__.py +404 -0
- aws_cdk/interfaces/aws_appintegrations/__init__.py +396 -0
- aws_cdk/interfaces/aws_applicationautoscaling/__init__.py +307 -0
- aws_cdk/interfaces/aws_applicationinsights/__init__.py +148 -0
- aws_cdk/interfaces/aws_applicationsignals/__init__.py +358 -0
- aws_cdk/interfaces/aws_appmesh/__init__.py +888 -0
- aws_cdk/interfaces/aws_apprunner/__init__.py +564 -0
- aws_cdk/interfaces/aws_appstream/__init__.py +1482 -0
- aws_cdk/interfaces/aws_appsync/__init__.py +1326 -0
- aws_cdk/interfaces/aws_apptest/__init__.py +163 -0
- aws_cdk/interfaces/aws_aps/__init__.py +558 -0
- aws_cdk/interfaces/aws_arcregionswitch/__init__.py +146 -0
- aws_cdk/interfaces/aws_arczonalshift/__init__.py +273 -0
- aws_cdk/interfaces/aws_athena/__init__.py +575 -0
- aws_cdk/interfaces/aws_auditmanager/__init__.py +163 -0
- aws_cdk/interfaces/aws_autoscaling/__init__.py +705 -0
- aws_cdk/interfaces/aws_autoscalingplans/__init__.py +148 -0
- aws_cdk/interfaces/aws_b2bi/__init__.py +524 -0
- aws_cdk/interfaces/aws_backup/__init__.py +955 -0
- aws_cdk/interfaces/aws_backupgateway/__init__.py +146 -0
- aws_cdk/interfaces/aws_batch/__init__.py +681 -0
- aws_cdk/interfaces/aws_bcmdataexports/__init__.py +146 -0
- aws_cdk/interfaces/aws_bedrock/__init__.py +1942 -0
- aws_cdk/interfaces/aws_bedrockagentcore/__init__.py +934 -0
- aws_cdk/interfaces/aws_billing/__init__.py +146 -0
- aws_cdk/interfaces/aws_billingconductor/__init__.py +463 -0
- aws_cdk/interfaces/aws_budgets/__init__.py +261 -0
- aws_cdk/interfaces/aws_cassandra/__init__.py +381 -0
- aws_cdk/interfaces/aws_ce/__init__.py +352 -0
- aws_cdk/interfaces/aws_certificatemanager/__init__.py +251 -0
- aws_cdk/interfaces/aws_chatbot/__init__.py +366 -0
- aws_cdk/interfaces/aws_cleanrooms/__init__.py +1103 -0
- aws_cdk/interfaces/aws_cleanroomsml/__init__.py +148 -0
- aws_cdk/interfaces/aws_cloud9/__init__.py +166 -0
- aws_cdk/interfaces/aws_cloudformation/__init__.py +1919 -0
- aws_cdk/interfaces/aws_cloudfront/__init__.py +1998 -0
- aws_cdk/interfaces/aws_cloudtrail/__init__.py +570 -0
- aws_cdk/interfaces/aws_cloudwatch/__init__.py +733 -0
- aws_cdk/interfaces/aws_codeartifact/__init__.py +352 -0
- aws_cdk/interfaces/aws_codebuild/__init__.py +487 -0
- aws_cdk/interfaces/aws_codecommit/__init__.py +163 -0
- aws_cdk/interfaces/aws_codeconnections/__init__.py +146 -0
- aws_cdk/interfaces/aws_codedeploy/__init__.py +352 -0
- aws_cdk/interfaces/aws_codeguruprofiler/__init__.py +168 -0
- aws_cdk/interfaces/aws_codegurureviewer/__init__.py +148 -0
- aws_cdk/interfaces/aws_codepipeline/__init__.py +388 -0
- aws_cdk/interfaces/aws_codestar/__init__.py +146 -0
- aws_cdk/interfaces/aws_codestarconnections/__init__.py +370 -0
- aws_cdk/interfaces/aws_codestarnotifications/__init__.py +148 -0
- aws_cdk/interfaces/aws_cognito/__init__.py +1929 -0
- aws_cdk/interfaces/aws_comprehend/__init__.py +251 -0
- aws_cdk/interfaces/aws_config/__init__.py +1165 -0
- aws_cdk/interfaces/aws_connect/__init__.py +2949 -0
- aws_cdk/interfaces/aws_connectcampaigns/__init__.py +146 -0
- aws_cdk/interfaces/aws_connectcampaignsv2/__init__.py +146 -0
- aws_cdk/interfaces/aws_controltower/__init__.py +394 -0
- aws_cdk/interfaces/aws_cur/__init__.py +146 -0
- aws_cdk/interfaces/aws_customerprofiles/__init__.py +915 -0
- aws_cdk/interfaces/aws_databrew/__init__.py +661 -0
- aws_cdk/interfaces/aws_datapipeline/__init__.py +146 -0
- aws_cdk/interfaces/aws_datasync/__init__.py +1384 -0
- aws_cdk/interfaces/aws_datazone/__init__.py +2238 -0
- aws_cdk/interfaces/aws_dax/__init__.py +364 -0
- aws_cdk/interfaces/aws_deadline/__init__.py +1303 -0
- aws_cdk/interfaces/aws_detective/__init__.py +364 -0
- aws_cdk/interfaces/aws_devicefarm/__init__.py +663 -0
- aws_cdk/interfaces/aws_devopsguru/__init__.py +362 -0
- aws_cdk/interfaces/aws_directoryservice/__init__.py +251 -0
- aws_cdk/interfaces/aws_dlm/__init__.py +166 -0
- aws_cdk/interfaces/aws_dms/__init__.py +1176 -0
- aws_cdk/interfaces/aws_docdb/__init__.py +560 -0
- aws_cdk/interfaces/aws_docdbelastic/__init__.py +146 -0
- aws_cdk/interfaces/aws_dsql/__init__.py +146 -0
- aws_cdk/interfaces/aws_dynamodb/__init__.py +278 -0
- aws_cdk/interfaces/aws_ec2/__init__.py +11963 -0
- aws_cdk/interfaces/aws_ecr/__init__.py +814 -0
- aws_cdk/interfaces/aws_ecs/__init__.py +845 -0
- aws_cdk/interfaces/aws_efs/__init__.py +392 -0
- aws_cdk/interfaces/aws_eks/__init__.py +948 -0
- aws_cdk/interfaces/aws_elasticache/__init__.py +1108 -0
- aws_cdk/interfaces/aws_elasticbeanstalk/__init__.py +503 -0
- aws_cdk/interfaces/aws_elasticloadbalancing/__init__.py +148 -0
- aws_cdk/interfaces/aws_elasticloadbalancingv2/__init__.py +795 -0
- aws_cdk/interfaces/aws_elasticsearch/__init__.py +158 -0
- aws_cdk/interfaces/aws_emr/__init__.py +913 -0
- aws_cdk/interfaces/aws_emrcontainers/__init__.py +168 -0
- aws_cdk/interfaces/aws_emrserverless/__init__.py +166 -0
- aws_cdk/interfaces/aws_entityresolution/__init__.py +608 -0
- aws_cdk/interfaces/aws_events/__init__.py +872 -0
- aws_cdk/interfaces/aws_eventschemas/__init__.py +455 -0
- aws_cdk/interfaces/aws_evidently/__init__.py +558 -0
- aws_cdk/interfaces/aws_evs/__init__.py +166 -0
- aws_cdk/interfaces/aws_finspace/__init__.py +166 -0
- aws_cdk/interfaces/aws_fis/__init__.py +271 -0
- aws_cdk/interfaces/aws_fms/__init__.py +364 -0
- aws_cdk/interfaces/aws_forecast/__init__.py +249 -0
- aws_cdk/interfaces/aws_frauddetector/__init__.py +764 -0
- aws_cdk/interfaces/aws_fsx/__init__.py +663 -0
- aws_cdk/interfaces/aws_gamelift/__init__.py +1325 -0
- aws_cdk/interfaces/aws_gameliftstreams/__init__.py +249 -0
- aws_cdk/interfaces/aws_globalaccelerator/__init__.py +461 -0
- aws_cdk/interfaces/aws_glue/__init__.py +2377 -0
- aws_cdk/interfaces/aws_grafana/__init__.py +146 -0
- aws_cdk/interfaces/aws_greengrass/__init__.py +1871 -0
- aws_cdk/interfaces/aws_greengrassv2/__init__.py +251 -0
- aws_cdk/interfaces/aws_groundstation/__init__.py +396 -0
- aws_cdk/interfaces/aws_guardduty/__init__.py +1225 -0
- aws_cdk/interfaces/aws_healthimaging/__init__.py +163 -0
- aws_cdk/interfaces/aws_healthlake/__init__.py +146 -0
- aws_cdk/interfaces/aws_iam/__init__.py +1803 -0
- aws_cdk/interfaces/aws_identitystore/__init__.py +288 -0
- aws_cdk/interfaces/aws_imagebuilder/__init__.py +984 -0
- aws_cdk/interfaces/aws_inspector/__init__.py +354 -0
- aws_cdk/interfaces/aws_inspectorv2/__init__.py +467 -0
- aws_cdk/interfaces/aws_internetmonitor/__init__.py +163 -0
- aws_cdk/interfaces/aws_invoicing/__init__.py +146 -0
- aws_cdk/interfaces/aws_iot/__init__.py +3483 -0
- aws_cdk/interfaces/aws_iotanalytics/__init__.py +455 -0
- aws_cdk/interfaces/aws_iotcoredeviceadvisor/__init__.py +168 -0
- aws_cdk/interfaces/aws_iotevents/__init__.py +352 -0
- aws_cdk/interfaces/aws_iotfleethub/__init__.py +166 -0
- aws_cdk/interfaces/aws_iotfleetwise/__init__.py +892 -0
- aws_cdk/interfaces/aws_iotsitewise/__init__.py +1097 -0
- aws_cdk/interfaces/aws_iotthingsgraph/__init__.py +146 -0
- aws_cdk/interfaces/aws_iottwinmaker/__init__.py +711 -0
- aws_cdk/interfaces/aws_iotwireless/__init__.py +1401 -0
- aws_cdk/interfaces/aws_ivs/__init__.py +1075 -0
- aws_cdk/interfaces/aws_ivschat/__init__.py +251 -0
- aws_cdk/interfaces/aws_kafkaconnect/__init__.py +354 -0
- aws_cdk/interfaces/aws_kendra/__init__.py +428 -0
- aws_cdk/interfaces/aws_kendraranking/__init__.py +166 -0
- aws_cdk/interfaces/aws_kinesis/__init__.py +364 -0
- aws_cdk/interfaces/aws_kinesisanalytics/__init__.py +364 -0
- aws_cdk/interfaces/aws_kinesisanalyticsv2/__init__.py +479 -0
- aws_cdk/interfaces/aws_kinesisfirehose/__init__.py +168 -0
- aws_cdk/interfaces/aws_kinesisvideo/__init__.py +283 -0
- aws_cdk/interfaces/aws_kms/__init__.py +376 -0
- aws_cdk/interfaces/aws_lakeformation/__init__.py +860 -0
- aws_cdk/interfaces/aws_lambda/__init__.py +1141 -0
- aws_cdk/interfaces/aws_launchwizard/__init__.py +146 -0
- aws_cdk/interfaces/aws_lex/__init__.py +513 -0
- aws_cdk/interfaces/aws_licensemanager/__init__.py +249 -0
- aws_cdk/interfaces/aws_lightsail/__init__.py +1744 -0
- aws_cdk/interfaces/aws_location/__init__.py +879 -0
- aws_cdk/interfaces/aws_logs/__init__.py +1667 -0
- aws_cdk/interfaces/aws_lookoutequipment/__init__.py +168 -0
- aws_cdk/interfaces/aws_lookoutmetrics/__init__.py +251 -0
- aws_cdk/interfaces/aws_lookoutvision/__init__.py +163 -0
- aws_cdk/interfaces/aws_m2/__init__.py +352 -0
- aws_cdk/interfaces/aws_macie/__init__.py +512 -0
- aws_cdk/interfaces/aws_managedblockchain/__init__.py +381 -0
- aws_cdk/interfaces/aws_mediaconnect/__init__.py +1028 -0
- aws_cdk/interfaces/aws_mediaconvert/__init__.py +396 -0
- aws_cdk/interfaces/aws_medialive/__init__.py +1755 -0
- aws_cdk/interfaces/aws_mediapackage/__init__.py +644 -0
- aws_cdk/interfaces/aws_mediapackagev2/__init__.py +618 -0
- aws_cdk/interfaces/aws_mediastore/__init__.py +146 -0
- aws_cdk/interfaces/aws_mediatailor/__init__.py +788 -0
- aws_cdk/interfaces/aws_memorydb/__init__.py +685 -0
- aws_cdk/interfaces/aws_mpa/__init__.py +249 -0
- aws_cdk/interfaces/aws_msk/__init__.py +764 -0
- aws_cdk/interfaces/aws_mwaa/__init__.py +166 -0
- aws_cdk/interfaces/aws_neptune/__init__.py +663 -0
- aws_cdk/interfaces/aws_neptunegraph/__init__.py +265 -0
- aws_cdk/interfaces/aws_networkfirewall/__init__.py +669 -0
- aws_cdk/interfaces/aws_networkmanager/__init__.py +1832 -0
- aws_cdk/interfaces/aws_nimblestudio/__init__.py +388 -0
- aws_cdk/interfaces/aws_notifications/__init__.py +868 -0
- aws_cdk/interfaces/aws_notificationscontacts/__init__.py +148 -0
- aws_cdk/interfaces/aws_oam/__init__.py +249 -0
- aws_cdk/interfaces/aws_observabilityadmin/__init__.py +362 -0
- aws_cdk/interfaces/aws_odb/__init__.py +562 -0
- aws_cdk/interfaces/aws_omics/__init__.py +838 -0
- aws_cdk/interfaces/aws_opensearchserverless/__init__.py +859 -0
- aws_cdk/interfaces/aws_opensearchservice/__init__.py +283 -0
- aws_cdk/interfaces/aws_opsworks/__init__.py +772 -0
- aws_cdk/interfaces/aws_opsworkscm/__init__.py +146 -0
- aws_cdk/interfaces/aws_organizations/__init__.py +646 -0
- aws_cdk/interfaces/aws_osis/__init__.py +146 -0
- aws_cdk/interfaces/aws_panorama/__init__.py +420 -0
- aws_cdk/interfaces/aws_paymentcryptography/__init__.py +249 -0
- aws_cdk/interfaces/aws_pcaconnectorad/__init__.py +608 -0
- aws_cdk/interfaces/aws_pcaconnectorscep/__init__.py +249 -0
- aws_cdk/interfaces/aws_pcs/__init__.py +352 -0
- aws_cdk/interfaces/aws_personalize/__init__.py +455 -0
- aws_cdk/interfaces/aws_pinpoint/__init__.py +2125 -0
- aws_cdk/interfaces/aws_pinpointemail/__init__.py +467 -0
- aws_cdk/interfaces/aws_pipes/__init__.py +158 -0
- aws_cdk/interfaces/aws_proton/__init__.py +360 -0
- aws_cdk/interfaces/aws_qbusiness/__init__.py +1122 -0
- aws_cdk/interfaces/aws_qldb/__init__.py +283 -0
- aws_cdk/interfaces/aws_quicksight/__init__.py +1566 -0
- aws_cdk/interfaces/aws_ram/__init__.py +249 -0
- aws_cdk/interfaces/aws_rbin/__init__.py +146 -0
- aws_cdk/interfaces/aws_rds/__init__.py +1780 -0
- aws_cdk/interfaces/aws_redshift/__init__.py +1104 -0
- aws_cdk/interfaces/aws_redshiftserverless/__init__.py +356 -0
- aws_cdk/interfaces/aws_refactorspaces/__init__.py +605 -0
- aws_cdk/interfaces/aws_rekognition/__init__.py +406 -0
- aws_cdk/interfaces/aws_resiliencehub/__init__.py +251 -0
- aws_cdk/interfaces/aws_resourceexplorer2/__init__.py +354 -0
- aws_cdk/interfaces/aws_resourcegroups/__init__.py +261 -0
- aws_cdk/interfaces/aws_robomaker/__init__.py +673 -0
- aws_cdk/interfaces/aws_rolesanywhere/__init__.py +384 -0
- aws_cdk/interfaces/aws_route53/__init__.py +804 -0
- aws_cdk/interfaces/aws_route53profiles/__init__.py +368 -0
- aws_cdk/interfaces/aws_route53recoverycontrol/__init__.py +463 -0
- aws_cdk/interfaces/aws_route53recoveryreadiness/__init__.py +535 -0
- aws_cdk/interfaces/aws_route53resolver/__init__.py +1356 -0
- aws_cdk/interfaces/aws_rtbfabric/__init__.py +352 -0
- aws_cdk/interfaces/aws_rum/__init__.py +146 -0
- aws_cdk/interfaces/aws_s3/__init__.py +1171 -0
- aws_cdk/interfaces/aws_s3express/__init__.py +392 -0
- aws_cdk/interfaces/aws_s3objectlambda/__init__.py +271 -0
- aws_cdk/interfaces/aws_s3outposts/__init__.py +455 -0
- aws_cdk/interfaces/aws_s3tables/__init__.py +575 -0
- aws_cdk/interfaces/aws_s3vectors/__init__.py +354 -0
- aws_cdk/interfaces/aws_sagemaker/__init__.py +3797 -0
- aws_cdk/interfaces/aws_sam/__init__.py +603 -0
- aws_cdk/interfaces/aws_scheduler/__init__.py +286 -0
- aws_cdk/interfaces/aws_sdb/__init__.py +146 -0
- aws_cdk/interfaces/aws_secretsmanager/__init__.py +461 -0
- aws_cdk/interfaces/aws_securityhub/__init__.py +1499 -0
- aws_cdk/interfaces/aws_securitylake/__init__.py +474 -0
- aws_cdk/interfaces/aws_servicecatalog/__init__.py +1829 -0
- aws_cdk/interfaces/aws_servicecatalogappregistry/__init__.py +557 -0
- aws_cdk/interfaces/aws_servicediscovery/__init__.py +636 -0
- aws_cdk/interfaces/aws_ses/__init__.py +2018 -0
- aws_cdk/interfaces/aws_shield/__init__.py +455 -0
- aws_cdk/interfaces/aws_signer/__init__.py +266 -0
- aws_cdk/interfaces/aws_simspaceweaver/__init__.py +146 -0
- aws_cdk/interfaces/aws_smsvoice/__init__.py +892 -0
- aws_cdk/interfaces/aws_sns/__init__.py +455 -0
- aws_cdk/interfaces/aws_sqs/__init__.py +364 -0
- aws_cdk/interfaces/aws_ssm/__init__.py +982 -0
- aws_cdk/interfaces/aws_ssmcontacts/__init__.py +455 -0
- aws_cdk/interfaces/aws_ssmguiconnect/__init__.py +146 -0
- aws_cdk/interfaces/aws_ssmincidents/__init__.py +249 -0
- aws_cdk/interfaces/aws_ssmquicksetup/__init__.py +253 -0
- aws_cdk/interfaces/aws_sso/__init__.py +797 -0
- aws_cdk/interfaces/aws_stepfunctions/__init__.py +459 -0
- aws_cdk/interfaces/aws_supportapp/__init__.py +372 -0
- aws_cdk/interfaces/aws_synthetics/__init__.py +249 -0
- aws_cdk/interfaces/aws_systemsmanagersap/__init__.py +148 -0
- aws_cdk/interfaces/aws_timestream/__init__.py +526 -0
- aws_cdk/interfaces/aws_transfer/__init__.py +967 -0
- aws_cdk/interfaces/aws_verifiedpermissions/__init__.py +538 -0
- aws_cdk/interfaces/aws_voiceid/__init__.py +146 -0
- aws_cdk/interfaces/aws_vpclattice/__init__.py +1418 -0
- aws_cdk/interfaces/aws_waf/__init__.py +764 -0
- aws_cdk/interfaces/aws_wafregional/__init__.py +1182 -0
- aws_cdk/interfaces/aws_wafv2/__init__.py +870 -0
- aws_cdk/interfaces/aws_wisdom/__init__.py +1556 -0
- aws_cdk/interfaces/aws_workspaces/__init__.py +352 -0
- aws_cdk/interfaces/aws_workspacesinstances/__init__.py +390 -0
- aws_cdk/interfaces/aws_workspacesthinclient/__init__.py +168 -0
- aws_cdk/interfaces/aws_workspacesweb/__init__.py +1085 -0
- aws_cdk/interfaces/aws_xray/__init__.py +457 -0
- aws_cdk/pipelines/__init__.py +192 -42
- aws_cdk/region_info/__init__.py +3 -0
- aws_cdk/triggers/__init__.py +60 -18
- {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/METADATA +338 -16
- aws_cdk_lib-2.224.0.dist-info/RECORD +584 -0
- aws_cdk_lib-2.200.2.dist-info/RECORD +0 -304
- {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.200.2.dist-info → aws_cdk_lib-2.224.0.dist-info}/top_level.txt +0 -0
|
@@ -68,15 +68,29 @@ from .. import (
|
|
|
68
68
|
TagManager as _TagManager_0a598cb3,
|
|
69
69
|
TreeInspector as _TreeInspector_488e0dd5,
|
|
70
70
|
)
|
|
71
|
+
from ..interfaces.aws_networkfirewall import (
|
|
72
|
+
FirewallPolicyReference as _FirewallPolicyReference_590b2e0a,
|
|
73
|
+
FirewallReference as _FirewallReference_2bf55714,
|
|
74
|
+
IFirewallPolicyRef as _IFirewallPolicyRef_bd446a4d,
|
|
75
|
+
IFirewallRef as _IFirewallRef_31769805,
|
|
76
|
+
ILoggingConfigurationRef as _ILoggingConfigurationRef_1588c620,
|
|
77
|
+
IRuleGroupRef as _IRuleGroupRef_f1ee71d3,
|
|
78
|
+
ITLSInspectionConfigurationRef as _ITLSInspectionConfigurationRef_6d0a6d9c,
|
|
79
|
+
IVpcEndpointAssociationRef as _IVpcEndpointAssociationRef_bd0818d9,
|
|
80
|
+
LoggingConfigurationReference as _LoggingConfigurationReference_f6c32f6c,
|
|
81
|
+
RuleGroupReference as _RuleGroupReference_b514c132,
|
|
82
|
+
TLSInspectionConfigurationReference as _TLSInspectionConfigurationReference_52bd7dd3,
|
|
83
|
+
VpcEndpointAssociationReference as _VpcEndpointAssociationReference_d627bc37,
|
|
84
|
+
)
|
|
71
85
|
|
|
72
86
|
|
|
73
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
87
|
+
@jsii.implements(_IInspectable_c2943556, _IFirewallRef_31769805, _ITaggable_36806126)
|
|
74
88
|
class CfnFirewall(
|
|
75
89
|
_CfnResource_9df397a6,
|
|
76
90
|
metaclass=jsii.JSIIMeta,
|
|
77
91
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall",
|
|
78
92
|
):
|
|
79
|
-
'''Use the
|
|
93
|
+
'''Use the firewall to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
|
|
80
94
|
|
|
81
95
|
The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
|
|
82
96
|
|
|
@@ -93,24 +107,29 @@ class CfnFirewall(
|
|
|
93
107
|
cfn_firewall = networkfirewall.CfnFirewall(self, "MyCfnFirewall",
|
|
94
108
|
firewall_name="firewallName",
|
|
95
109
|
firewall_policy_arn="firewallPolicyArn",
|
|
96
|
-
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
97
|
-
subnet_id="subnetId",
|
|
98
|
-
|
|
99
|
-
# the properties below are optional
|
|
100
|
-
ip_address_type="ipAddressType"
|
|
101
|
-
)],
|
|
102
|
-
vpc_id="vpcId",
|
|
103
110
|
|
|
104
111
|
# the properties below are optional
|
|
112
|
+
availability_zone_change_protection=False,
|
|
113
|
+
availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
114
|
+
availability_zone="availabilityZone"
|
|
115
|
+
)],
|
|
105
116
|
delete_protection=False,
|
|
106
117
|
description="description",
|
|
107
118
|
enabled_analysis_types=["enabledAnalysisTypes"],
|
|
108
119
|
firewall_policy_change_protection=False,
|
|
109
120
|
subnet_change_protection=False,
|
|
121
|
+
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
122
|
+
subnet_id="subnetId",
|
|
123
|
+
|
|
124
|
+
# the properties below are optional
|
|
125
|
+
ip_address_type="ipAddressType"
|
|
126
|
+
)],
|
|
110
127
|
tags=[CfnTag(
|
|
111
128
|
key="key",
|
|
112
129
|
value="value"
|
|
113
|
-
)]
|
|
130
|
+
)],
|
|
131
|
+
transit_gateway_id="transitGatewayId",
|
|
132
|
+
vpc_id="vpcId"
|
|
114
133
|
)
|
|
115
134
|
'''
|
|
116
135
|
|
|
@@ -121,28 +140,35 @@ class CfnFirewall(
|
|
|
121
140
|
*,
|
|
122
141
|
firewall_name: builtins.str,
|
|
123
142
|
firewall_policy_arn: builtins.str,
|
|
124
|
-
|
|
125
|
-
|
|
143
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
144
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.AvailabilityZoneMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
126
145
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
127
146
|
description: typing.Optional[builtins.str] = None,
|
|
128
147
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
129
148
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
130
149
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
150
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewall.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
131
151
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
152
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
153
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
132
154
|
) -> None:
|
|
133
|
-
'''
|
|
155
|
+
'''Create a new ``AWS::NetworkFirewall::Firewall``.
|
|
156
|
+
|
|
134
157
|
:param scope: Scope in which this resource is defined.
|
|
135
158
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
136
159
|
:param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
|
|
137
160
|
:param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
|
|
138
|
-
:param
|
|
139
|
-
:param
|
|
161
|
+
:param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
162
|
+
:param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
140
163
|
:param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
|
|
141
164
|
:param description: A description of the firewall.
|
|
142
165
|
:param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
|
|
143
166
|
:param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
144
167
|
:param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
168
|
+
:param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
145
169
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
170
|
+
:param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
|
|
171
|
+
:param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
|
|
146
172
|
'''
|
|
147
173
|
if __debug__:
|
|
148
174
|
type_hints = typing.get_type_hints(_typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56)
|
|
@@ -151,14 +177,17 @@ class CfnFirewall(
|
|
|
151
177
|
props = CfnFirewallProps(
|
|
152
178
|
firewall_name=firewall_name,
|
|
153
179
|
firewall_policy_arn=firewall_policy_arn,
|
|
154
|
-
|
|
155
|
-
|
|
180
|
+
availability_zone_change_protection=availability_zone_change_protection,
|
|
181
|
+
availability_zone_mappings=availability_zone_mappings,
|
|
156
182
|
delete_protection=delete_protection,
|
|
157
183
|
description=description,
|
|
158
184
|
enabled_analysis_types=enabled_analysis_types,
|
|
159
185
|
firewall_policy_change_protection=firewall_policy_change_protection,
|
|
160
186
|
subnet_change_protection=subnet_change_protection,
|
|
187
|
+
subnet_mappings=subnet_mappings,
|
|
161
188
|
tags=tags,
|
|
189
|
+
transit_gateway_id=transit_gateway_id,
|
|
190
|
+
vpc_id=vpc_id,
|
|
162
191
|
)
|
|
163
192
|
|
|
164
193
|
jsii.create(self.__class__, self, [scope, id, props])
|
|
@@ -207,7 +236,7 @@ class CfnFirewall(
|
|
|
207
236
|
@builtins.property
|
|
208
237
|
@jsii.member(jsii_name="attrFirewallArn")
|
|
209
238
|
def attr_firewall_arn(self) -> builtins.str:
|
|
210
|
-
'''The Amazon Resource Name (ARN) of the
|
|
239
|
+
'''The Amazon Resource Name (ARN) of the firewall.
|
|
211
240
|
|
|
212
241
|
:cloudformationAttribute: FirewallArn
|
|
213
242
|
'''
|
|
@@ -216,17 +245,34 @@ class CfnFirewall(
|
|
|
216
245
|
@builtins.property
|
|
217
246
|
@jsii.member(jsii_name="attrFirewallId")
|
|
218
247
|
def attr_firewall_id(self) -> builtins.str:
|
|
219
|
-
'''The name of the
|
|
248
|
+
'''The name of the firewallresource.
|
|
220
249
|
|
|
221
250
|
:cloudformationAttribute: FirewallId
|
|
222
251
|
'''
|
|
223
252
|
return typing.cast(builtins.str, jsii.get(self, "attrFirewallId"))
|
|
224
253
|
|
|
254
|
+
@builtins.property
|
|
255
|
+
@jsii.member(jsii_name="attrTransitGatewayAttachmentId")
|
|
256
|
+
def attr_transit_gateway_attachment_id(self) -> builtins.str:
|
|
257
|
+
'''The unique identifier of the transit gateway attachment associated with this firewall.
|
|
258
|
+
|
|
259
|
+
This field is only present for transit gateway-attached firewalls.
|
|
260
|
+
|
|
261
|
+
:cloudformationAttribute: TransitGatewayAttachmentId
|
|
262
|
+
'''
|
|
263
|
+
return typing.cast(builtins.str, jsii.get(self, "attrTransitGatewayAttachmentId"))
|
|
264
|
+
|
|
225
265
|
@builtins.property
|
|
226
266
|
@jsii.member(jsii_name="cfnProperties")
|
|
227
267
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
228
268
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
229
269
|
|
|
270
|
+
@builtins.property
|
|
271
|
+
@jsii.member(jsii_name="firewallRef")
|
|
272
|
+
def firewall_ref(self) -> _FirewallReference_2bf55714:
|
|
273
|
+
'''A reference to a Firewall resource.'''
|
|
274
|
+
return typing.cast(_FirewallReference_2bf55714, jsii.get(self, "firewallRef"))
|
|
275
|
+
|
|
230
276
|
@builtins.property
|
|
231
277
|
@jsii.member(jsii_name="tags")
|
|
232
278
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -260,35 +306,40 @@ class CfnFirewall(
|
|
|
260
306
|
jsii.set(self, "firewallPolicyArn", value) # pyright: ignore[reportArgumentType]
|
|
261
307
|
|
|
262
308
|
@builtins.property
|
|
263
|
-
@jsii.member(jsii_name="
|
|
264
|
-
def
|
|
309
|
+
@jsii.member(jsii_name="availabilityZoneChangeProtection")
|
|
310
|
+
def availability_zone_change_protection(
|
|
265
311
|
self,
|
|
266
|
-
) -> typing.
|
|
267
|
-
'''
|
|
268
|
-
return typing.cast(typing.
|
|
312
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
313
|
+
'''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.'''
|
|
314
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "availabilityZoneChangeProtection"))
|
|
269
315
|
|
|
270
|
-
@
|
|
271
|
-
def
|
|
316
|
+
@availability_zone_change_protection.setter
|
|
317
|
+
def availability_zone_change_protection(
|
|
272
318
|
self,
|
|
273
|
-
value: typing.
|
|
319
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
274
320
|
) -> None:
|
|
275
321
|
if __debug__:
|
|
276
|
-
type_hints = typing.get_type_hints(
|
|
322
|
+
type_hints = typing.get_type_hints(_typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1)
|
|
277
323
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
278
|
-
jsii.set(self, "
|
|
324
|
+
jsii.set(self, "availabilityZoneChangeProtection", value) # pyright: ignore[reportArgumentType]
|
|
279
325
|
|
|
280
326
|
@builtins.property
|
|
281
|
-
@jsii.member(jsii_name="
|
|
282
|
-
def
|
|
283
|
-
|
|
284
|
-
|
|
327
|
+
@jsii.member(jsii_name="availabilityZoneMappings")
|
|
328
|
+
def availability_zone_mappings(
|
|
329
|
+
self,
|
|
330
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]]:
|
|
331
|
+
'''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.'''
|
|
332
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]], jsii.get(self, "availabilityZoneMappings"))
|
|
285
333
|
|
|
286
|
-
@
|
|
287
|
-
def
|
|
334
|
+
@availability_zone_mappings.setter
|
|
335
|
+
def availability_zone_mappings(
|
|
336
|
+
self,
|
|
337
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.AvailabilityZoneMappingProperty"]]]],
|
|
338
|
+
) -> None:
|
|
288
339
|
if __debug__:
|
|
289
|
-
type_hints = typing.get_type_hints(
|
|
340
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77)
|
|
290
341
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
291
|
-
jsii.set(self, "
|
|
342
|
+
jsii.set(self, "availabilityZoneMappings", value) # pyright: ignore[reportArgumentType]
|
|
292
343
|
|
|
293
344
|
@builtins.property
|
|
294
345
|
@jsii.member(jsii_name="deleteProtection")
|
|
@@ -373,6 +424,24 @@ class CfnFirewall(
|
|
|
373
424
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
374
425
|
jsii.set(self, "subnetChangeProtection", value) # pyright: ignore[reportArgumentType]
|
|
375
426
|
|
|
427
|
+
@builtins.property
|
|
428
|
+
@jsii.member(jsii_name="subnetMappings")
|
|
429
|
+
def subnet_mappings(
|
|
430
|
+
self,
|
|
431
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]]:
|
|
432
|
+
'''The primary public subnets that Network Firewall is using for the firewall.'''
|
|
433
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]], jsii.get(self, "subnetMappings"))
|
|
434
|
+
|
|
435
|
+
@subnet_mappings.setter
|
|
436
|
+
def subnet_mappings(
|
|
437
|
+
self,
|
|
438
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnFirewall.SubnetMappingProperty"]]]],
|
|
439
|
+
) -> None:
|
|
440
|
+
if __debug__:
|
|
441
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab)
|
|
442
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
443
|
+
jsii.set(self, "subnetMappings", value) # pyright: ignore[reportArgumentType]
|
|
444
|
+
|
|
376
445
|
@builtins.property
|
|
377
446
|
@jsii.member(jsii_name="tagsRaw")
|
|
378
447
|
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
@@ -386,6 +455,90 @@ class CfnFirewall(
|
|
|
386
455
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
387
456
|
jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
|
|
388
457
|
|
|
458
|
+
@builtins.property
|
|
459
|
+
@jsii.member(jsii_name="transitGatewayId")
|
|
460
|
+
def transit_gateway_id(self) -> typing.Optional[builtins.str]:
|
|
461
|
+
'''The unique identifier of the transit gateway associated with this firewall.'''
|
|
462
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "transitGatewayId"))
|
|
463
|
+
|
|
464
|
+
@transit_gateway_id.setter
|
|
465
|
+
def transit_gateway_id(self, value: typing.Optional[builtins.str]) -> None:
|
|
466
|
+
if __debug__:
|
|
467
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6)
|
|
468
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
469
|
+
jsii.set(self, "transitGatewayId", value) # pyright: ignore[reportArgumentType]
|
|
470
|
+
|
|
471
|
+
@builtins.property
|
|
472
|
+
@jsii.member(jsii_name="vpcId")
|
|
473
|
+
def vpc_id(self) -> typing.Optional[builtins.str]:
|
|
474
|
+
'''The unique identifier of the VPC where the firewall is in use.'''
|
|
475
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "vpcId"))
|
|
476
|
+
|
|
477
|
+
@vpc_id.setter
|
|
478
|
+
def vpc_id(self, value: typing.Optional[builtins.str]) -> None:
|
|
479
|
+
if __debug__:
|
|
480
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5)
|
|
481
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
482
|
+
jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
|
|
483
|
+
|
|
484
|
+
@jsii.data_type(
|
|
485
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty",
|
|
486
|
+
jsii_struct_bases=[],
|
|
487
|
+
name_mapping={"availability_zone": "availabilityZone"},
|
|
488
|
+
)
|
|
489
|
+
class AvailabilityZoneMappingProperty:
|
|
490
|
+
def __init__(self, *, availability_zone: builtins.str) -> None:
|
|
491
|
+
'''Defines the mapping between an Availability Zone and a firewall endpoint for a transit gateway-attached firewall.
|
|
492
|
+
|
|
493
|
+
Each mapping represents where the firewall can process traffic. You use these mappings when calling ``CreateFirewall`` , ``AssociateAvailabilityZones`` , and ``DisassociateAvailabilityZones`` .
|
|
494
|
+
|
|
495
|
+
To retrieve the current Availability Zone mappings for a firewall, use ``DescribeFirewall`` .
|
|
496
|
+
|
|
497
|
+
:param availability_zone: The ID of the Availability Zone where the firewall endpoint is located. For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
|
|
498
|
+
|
|
499
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html
|
|
500
|
+
:exampleMetadata: fixture=_generated
|
|
501
|
+
|
|
502
|
+
Example::
|
|
503
|
+
|
|
504
|
+
# The code below shows an example of how to instantiate this type.
|
|
505
|
+
# The values are placeholders you should change.
|
|
506
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
507
|
+
|
|
508
|
+
availability_zone_mapping_property = networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
509
|
+
availability_zone="availabilityZone"
|
|
510
|
+
)
|
|
511
|
+
'''
|
|
512
|
+
if __debug__:
|
|
513
|
+
type_hints = typing.get_type_hints(_typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf)
|
|
514
|
+
check_type(argname="argument availability_zone", value=availability_zone, expected_type=type_hints["availability_zone"])
|
|
515
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
516
|
+
"availability_zone": availability_zone,
|
|
517
|
+
}
|
|
518
|
+
|
|
519
|
+
@builtins.property
|
|
520
|
+
def availability_zone(self) -> builtins.str:
|
|
521
|
+
'''The ID of the Availability Zone where the firewall endpoint is located.
|
|
522
|
+
|
|
523
|
+
For example, ``us-east-2a`` . The Availability Zone must be in the same Region as the transit gateway.
|
|
524
|
+
|
|
525
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewall-availabilityzonemapping.html#cfn-networkfirewall-firewall-availabilityzonemapping-availabilityzone
|
|
526
|
+
'''
|
|
527
|
+
result = self._values.get("availability_zone")
|
|
528
|
+
assert result is not None, "Required property 'availability_zone' is missing"
|
|
529
|
+
return typing.cast(builtins.str, result)
|
|
530
|
+
|
|
531
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
532
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
533
|
+
|
|
534
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
535
|
+
return not (rhs == self)
|
|
536
|
+
|
|
537
|
+
def __repr__(self) -> str:
|
|
538
|
+
return "AvailabilityZoneMappingProperty(%s)" % ", ".join(
|
|
539
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
540
|
+
)
|
|
541
|
+
|
|
389
542
|
@jsii.data_type(
|
|
390
543
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewall.SubnetMappingProperty",
|
|
391
544
|
jsii_struct_bases=[],
|
|
@@ -464,13 +617,13 @@ class CfnFirewall(
|
|
|
464
617
|
)
|
|
465
618
|
|
|
466
619
|
|
|
467
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
620
|
+
@jsii.implements(_IInspectable_c2943556, _IFirewallPolicyRef_bd446a4d, _ITaggable_36806126)
|
|
468
621
|
class CfnFirewallPolicy(
|
|
469
622
|
_CfnResource_9df397a6,
|
|
470
623
|
metaclass=jsii.JSIIMeta,
|
|
471
624
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnFirewallPolicy",
|
|
472
625
|
):
|
|
473
|
-
'''Use the
|
|
626
|
+
'''Use the firewall policy to define the stateless and stateful network traffic filtering behavior for your firewall.
|
|
474
627
|
|
|
475
628
|
You can use one firewall policy for multiple firewalls.
|
|
476
629
|
|
|
@@ -490,6 +643,7 @@ class CfnFirewallPolicy(
|
|
|
490
643
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
491
644
|
|
|
492
645
|
# the properties below are optional
|
|
646
|
+
enable_tls_session_holding=False,
|
|
493
647
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
494
648
|
rule_variables={
|
|
495
649
|
"rule_variables_key": {
|
|
@@ -509,6 +663,7 @@ class CfnFirewallPolicy(
|
|
|
509
663
|
resource_arn="resourceArn",
|
|
510
664
|
|
|
511
665
|
# the properties below are optional
|
|
666
|
+
deep_threat_inspection=False,
|
|
512
667
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
513
668
|
action="action"
|
|
514
669
|
),
|
|
@@ -551,7 +706,8 @@ class CfnFirewallPolicy(
|
|
|
551
706
|
description: typing.Optional[builtins.str] = None,
|
|
552
707
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
553
708
|
) -> None:
|
|
554
|
-
'''
|
|
709
|
+
'''Create a new ``AWS::NetworkFirewall::FirewallPolicy``.
|
|
710
|
+
|
|
555
711
|
:param scope: Scope in which this resource is defined.
|
|
556
712
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
557
713
|
:param firewall_policy: The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings.
|
|
@@ -605,7 +761,7 @@ class CfnFirewallPolicy(
|
|
|
605
761
|
@builtins.property
|
|
606
762
|
@jsii.member(jsii_name="attrFirewallPolicyArn")
|
|
607
763
|
def attr_firewall_policy_arn(self) -> builtins.str:
|
|
608
|
-
'''The Amazon Resource Name (ARN) of the
|
|
764
|
+
'''The Amazon Resource Name (ARN) of the firewall policy.
|
|
609
765
|
|
|
610
766
|
:cloudformationAttribute: FirewallPolicyArn
|
|
611
767
|
'''
|
|
@@ -614,7 +770,7 @@ class CfnFirewallPolicy(
|
|
|
614
770
|
@builtins.property
|
|
615
771
|
@jsii.member(jsii_name="attrFirewallPolicyId")
|
|
616
772
|
def attr_firewall_policy_id(self) -> builtins.str:
|
|
617
|
-
'''The unique ID of the
|
|
773
|
+
'''The unique ID of the firewall policy resource.
|
|
618
774
|
|
|
619
775
|
:cloudformationAttribute: FirewallPolicyId
|
|
620
776
|
'''
|
|
@@ -625,6 +781,12 @@ class CfnFirewallPolicy(
|
|
|
625
781
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
626
782
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
627
783
|
|
|
784
|
+
@builtins.property
|
|
785
|
+
@jsii.member(jsii_name="firewallPolicyRef")
|
|
786
|
+
def firewall_policy_ref(self) -> _FirewallPolicyReference_590b2e0a:
|
|
787
|
+
'''A reference to a FirewallPolicy resource.'''
|
|
788
|
+
return typing.cast(_FirewallPolicyReference_590b2e0a, jsii.get(self, "firewallPolicyRef"))
|
|
789
|
+
|
|
628
790
|
@builtins.property
|
|
629
791
|
@jsii.member(jsii_name="tags")
|
|
630
792
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -776,8 +938,8 @@ class CfnFirewallPolicy(
|
|
|
776
938
|
|
|
777
939
|
You can use custom actions in the following places:
|
|
778
940
|
|
|
779
|
-
- In an ``
|
|
780
|
-
- In an
|
|
941
|
+
- In an ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
942
|
+
- In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
781
943
|
|
|
782
944
|
:param action_definition: The custom action associated with the action name.
|
|
783
945
|
:param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
|
|
@@ -910,6 +1072,7 @@ class CfnFirewallPolicy(
|
|
|
910
1072
|
name_mapping={
|
|
911
1073
|
"stateless_default_actions": "statelessDefaultActions",
|
|
912
1074
|
"stateless_fragment_default_actions": "statelessFragmentDefaultActions",
|
|
1075
|
+
"enable_tls_session_holding": "enableTlsSessionHolding",
|
|
913
1076
|
"policy_variables": "policyVariables",
|
|
914
1077
|
"stateful_default_actions": "statefulDefaultActions",
|
|
915
1078
|
"stateful_engine_options": "statefulEngineOptions",
|
|
@@ -925,6 +1088,7 @@ class CfnFirewallPolicy(
|
|
|
925
1088
|
*,
|
|
926
1089
|
stateless_default_actions: typing.Sequence[builtins.str],
|
|
927
1090
|
stateless_fragment_default_actions: typing.Sequence[builtins.str],
|
|
1091
|
+
enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
928
1092
|
policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.PolicyVariablesProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
929
1093
|
stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
930
1094
|
stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulEngineOptionsProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -937,6 +1101,7 @@ class CfnFirewallPolicy(
|
|
|
937
1101
|
|
|
938
1102
|
:param stateless_default_actions: The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
|
|
939
1103
|
:param stateless_fragment_default_actions: The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. If you want non-matching fragmented packets to be forwarded for stateful inspection, specify ``aws:forward_to_sfe`` . You must specify one of the standard actions: ``aws:pass`` , ``aws:drop`` , or ``aws:forward_to_sfe`` . In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify ``["aws:pass"]`` or you could specify ``["aws:pass", “customActionName”]`` . For information about compatibility, see the custom action descriptions.
|
|
1104
|
+
:param enable_tls_session_holding: When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules. Requires an associated TLS Inspection configuration.
|
|
940
1105
|
:param policy_variables: Contains variables that you can use to override default Suricata settings in your firewall policy.
|
|
941
1106
|
:param stateful_default_actions: The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order. Valid values of the stateful default action: - aws:drop_strict - aws:drop_established - aws:alert_strict - aws:alert_established For more information, see `Strict evaluation order <https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
942
1107
|
:param stateful_engine_options: Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
|
|
@@ -959,6 +1124,7 @@ class CfnFirewallPolicy(
|
|
|
959
1124
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
960
1125
|
|
|
961
1126
|
# the properties below are optional
|
|
1127
|
+
enable_tls_session_holding=False,
|
|
962
1128
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
963
1129
|
rule_variables={
|
|
964
1130
|
"rule_variables_key": {
|
|
@@ -978,6 +1144,7 @@ class CfnFirewallPolicy(
|
|
|
978
1144
|
resource_arn="resourceArn",
|
|
979
1145
|
|
|
980
1146
|
# the properties below are optional
|
|
1147
|
+
deep_threat_inspection=False,
|
|
981
1148
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
982
1149
|
action="action"
|
|
983
1150
|
),
|
|
@@ -1004,6 +1171,7 @@ class CfnFirewallPolicy(
|
|
|
1004
1171
|
type_hints = typing.get_type_hints(_typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2db29fc18)
|
|
1005
1172
|
check_type(argname="argument stateless_default_actions", value=stateless_default_actions, expected_type=type_hints["stateless_default_actions"])
|
|
1006
1173
|
check_type(argname="argument stateless_fragment_default_actions", value=stateless_fragment_default_actions, expected_type=type_hints["stateless_fragment_default_actions"])
|
|
1174
|
+
check_type(argname="argument enable_tls_session_holding", value=enable_tls_session_holding, expected_type=type_hints["enable_tls_session_holding"])
|
|
1007
1175
|
check_type(argname="argument policy_variables", value=policy_variables, expected_type=type_hints["policy_variables"])
|
|
1008
1176
|
check_type(argname="argument stateful_default_actions", value=stateful_default_actions, expected_type=type_hints["stateful_default_actions"])
|
|
1009
1177
|
check_type(argname="argument stateful_engine_options", value=stateful_engine_options, expected_type=type_hints["stateful_engine_options"])
|
|
@@ -1015,6 +1183,8 @@ class CfnFirewallPolicy(
|
|
|
1015
1183
|
"stateless_default_actions": stateless_default_actions,
|
|
1016
1184
|
"stateless_fragment_default_actions": stateless_fragment_default_actions,
|
|
1017
1185
|
}
|
|
1186
|
+
if enable_tls_session_holding is not None:
|
|
1187
|
+
self._values["enable_tls_session_holding"] = enable_tls_session_holding
|
|
1018
1188
|
if policy_variables is not None:
|
|
1019
1189
|
self._values["policy_variables"] = policy_variables
|
|
1020
1190
|
if stateful_default_actions is not None:
|
|
@@ -1062,6 +1232,19 @@ class CfnFirewallPolicy(
|
|
|
1062
1232
|
assert result is not None, "Required property 'stateless_fragment_default_actions' is missing"
|
|
1063
1233
|
return typing.cast(typing.List[builtins.str], result)
|
|
1064
1234
|
|
|
1235
|
+
@builtins.property
|
|
1236
|
+
def enable_tls_session_holding(
|
|
1237
|
+
self,
|
|
1238
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
1239
|
+
'''When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules.
|
|
1240
|
+
|
|
1241
|
+
Requires an associated TLS Inspection configuration.
|
|
1242
|
+
|
|
1243
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-firewallpolicy.html#cfn-networkfirewall-firewallpolicy-firewallpolicy-enabletlssessionholding
|
|
1244
|
+
'''
|
|
1245
|
+
result = self._values.get("enable_tls_session_holding")
|
|
1246
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
1247
|
+
|
|
1065
1248
|
@builtins.property
|
|
1066
1249
|
def policy_variables(
|
|
1067
1250
|
self,
|
|
@@ -1241,7 +1424,7 @@ class CfnFirewallPolicy(
|
|
|
1241
1424
|
) -> None:
|
|
1242
1425
|
'''A list of IP addresses and address ranges, in CIDR notation.
|
|
1243
1426
|
|
|
1244
|
-
This is part of a
|
|
1427
|
+
This is part of a rule variable.
|
|
1245
1428
|
|
|
1246
1429
|
:param definition: The list of IP addresses and address ranges, in CIDR notation.
|
|
1247
1430
|
|
|
@@ -1568,6 +1751,7 @@ class CfnFirewallPolicy(
|
|
|
1568
1751
|
jsii_struct_bases=[],
|
|
1569
1752
|
name_mapping={
|
|
1570
1753
|
"resource_arn": "resourceArn",
|
|
1754
|
+
"deep_threat_inspection": "deepThreatInspection",
|
|
1571
1755
|
"override": "override",
|
|
1572
1756
|
"priority": "priority",
|
|
1573
1757
|
},
|
|
@@ -1577,14 +1761,16 @@ class CfnFirewallPolicy(
|
|
|
1577
1761
|
self,
|
|
1578
1762
|
*,
|
|
1579
1763
|
resource_arn: builtins.str,
|
|
1764
|
+
deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1580
1765
|
override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnFirewallPolicy.StatefulRuleGroupOverrideProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
1581
1766
|
priority: typing.Optional[jsii.Number] = None,
|
|
1582
1767
|
) -> None:
|
|
1583
1768
|
'''Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.
|
|
1584
1769
|
|
|
1585
1770
|
:param resource_arn: The Amazon Resource Name (ARN) of the stateful rule group.
|
|
1771
|
+
:param deep_threat_inspection: AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services. .. epigraph:: Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
|
|
1586
1772
|
:param override: The action that allows the policy owner to override the behavior of the rule group within a policy.
|
|
1587
|
-
:param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single
|
|
1773
|
+
:param priority: An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy. This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.
|
|
1588
1774
|
|
|
1589
1775
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html
|
|
1590
1776
|
:exampleMetadata: fixture=_generated
|
|
@@ -1599,6 +1785,7 @@ class CfnFirewallPolicy(
|
|
|
1599
1785
|
resource_arn="resourceArn",
|
|
1600
1786
|
|
|
1601
1787
|
# the properties below are optional
|
|
1788
|
+
deep_threat_inspection=False,
|
|
1602
1789
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
1603
1790
|
action="action"
|
|
1604
1791
|
),
|
|
@@ -1608,11 +1795,14 @@ class CfnFirewallPolicy(
|
|
|
1608
1795
|
if __debug__:
|
|
1609
1796
|
type_hints = typing.get_type_hints(_typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8)
|
|
1610
1797
|
check_type(argname="argument resource_arn", value=resource_arn, expected_type=type_hints["resource_arn"])
|
|
1798
|
+
check_type(argname="argument deep_threat_inspection", value=deep_threat_inspection, expected_type=type_hints["deep_threat_inspection"])
|
|
1611
1799
|
check_type(argname="argument override", value=override, expected_type=type_hints["override"])
|
|
1612
1800
|
check_type(argname="argument priority", value=priority, expected_type=type_hints["priority"])
|
|
1613
1801
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
1614
1802
|
"resource_arn": resource_arn,
|
|
1615
1803
|
}
|
|
1804
|
+
if deep_threat_inspection is not None:
|
|
1805
|
+
self._values["deep_threat_inspection"] = deep_threat_inspection
|
|
1616
1806
|
if override is not None:
|
|
1617
1807
|
self._values["override"] = override
|
|
1618
1808
|
if priority is not None:
|
|
@@ -1628,6 +1818,22 @@ class CfnFirewallPolicy(
|
|
|
1628
1818
|
assert result is not None, "Required property 'resource_arn' is missing"
|
|
1629
1819
|
return typing.cast(builtins.str, result)
|
|
1630
1820
|
|
|
1821
|
+
@builtins.property
|
|
1822
|
+
def deep_threat_inspection(
|
|
1823
|
+
self,
|
|
1824
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
1825
|
+
'''AWS Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability.
|
|
1826
|
+
|
|
1827
|
+
When this capability is released, AWS will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. AWS will use these threat indicators to improve the active threat defense managed rule groups and protect the security of AWS customers and services.
|
|
1828
|
+
.. epigraph::
|
|
1829
|
+
|
|
1830
|
+
Customers can opt-out of deep threat inspection at any time through the AWS Network Firewall console or API. When customers opt out, AWS Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.
|
|
1831
|
+
|
|
1832
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statefulrulegroupreference.html#cfn-networkfirewall-firewallpolicy-statefulrulegroupreference-deepthreatinspection
|
|
1833
|
+
'''
|
|
1834
|
+
result = self._values.get("deep_threat_inspection")
|
|
1835
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
1836
|
+
|
|
1631
1837
|
@builtins.property
|
|
1632
1838
|
def override(
|
|
1633
1839
|
self,
|
|
@@ -1641,7 +1847,7 @@ class CfnFirewallPolicy(
|
|
|
1641
1847
|
|
|
1642
1848
|
@builtins.property
|
|
1643
1849
|
def priority(self) -> typing.Optional[jsii.Number]:
|
|
1644
|
-
'''An integer setting that indicates the order in which to run the stateful rule groups in a single
|
|
1850
|
+
'''An integer setting that indicates the order in which to run the stateful rule groups in a single firewall policy.
|
|
1645
1851
|
|
|
1646
1852
|
This setting only applies to firewall policies that specify the ``STRICT_ORDER`` rule order in the stateful engine options settings.
|
|
1647
1853
|
|
|
@@ -1679,7 +1885,7 @@ class CfnFirewallPolicy(
|
|
|
1679
1885
|
) -> None:
|
|
1680
1886
|
'''Identifier for a single stateless rule group, used in a firewall policy to refer to the rule group.
|
|
1681
1887
|
|
|
1682
|
-
:param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single
|
|
1888
|
+
:param priority: An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
1683
1889
|
:param resource_arn: The Amazon Resource Name (ARN) of the stateless rule group.
|
|
1684
1890
|
|
|
1685
1891
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-firewallpolicy-statelessrulegroupreference.html
|
|
@@ -1707,7 +1913,7 @@ class CfnFirewallPolicy(
|
|
|
1707
1913
|
|
|
1708
1914
|
@builtins.property
|
|
1709
1915
|
def priority(self) -> jsii.Number:
|
|
1710
|
-
'''An integer setting that indicates the order in which to run the stateless rule groups in a single
|
|
1916
|
+
'''An integer setting that indicates the order in which to run the stateless rule groups in a single firewall policy.
|
|
1711
1917
|
|
|
1712
1918
|
Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
|
|
1713
1919
|
|
|
@@ -1780,6 +1986,7 @@ class CfnFirewallPolicyProps:
|
|
|
1780
1986
|
stateless_fragment_default_actions=["statelessFragmentDefaultActions"],
|
|
1781
1987
|
|
|
1782
1988
|
# the properties below are optional
|
|
1989
|
+
enable_tls_session_holding=False,
|
|
1783
1990
|
policy_variables=networkfirewall.CfnFirewallPolicy.PolicyVariablesProperty(
|
|
1784
1991
|
rule_variables={
|
|
1785
1992
|
"rule_variables_key": {
|
|
@@ -1799,6 +2006,7 @@ class CfnFirewallPolicyProps:
|
|
|
1799
2006
|
resource_arn="resourceArn",
|
|
1800
2007
|
|
|
1801
2008
|
# the properties below are optional
|
|
2009
|
+
deep_threat_inspection=False,
|
|
1802
2010
|
override=networkfirewall.CfnFirewallPolicy.StatefulRuleGroupOverrideProperty(
|
|
1803
2011
|
action="action"
|
|
1804
2012
|
),
|
|
@@ -1907,14 +2115,17 @@ class CfnFirewallPolicyProps:
|
|
|
1907
2115
|
name_mapping={
|
|
1908
2116
|
"firewall_name": "firewallName",
|
|
1909
2117
|
"firewall_policy_arn": "firewallPolicyArn",
|
|
1910
|
-
"
|
|
1911
|
-
"
|
|
2118
|
+
"availability_zone_change_protection": "availabilityZoneChangeProtection",
|
|
2119
|
+
"availability_zone_mappings": "availabilityZoneMappings",
|
|
1912
2120
|
"delete_protection": "deleteProtection",
|
|
1913
2121
|
"description": "description",
|
|
1914
2122
|
"enabled_analysis_types": "enabledAnalysisTypes",
|
|
1915
2123
|
"firewall_policy_change_protection": "firewallPolicyChangeProtection",
|
|
1916
2124
|
"subnet_change_protection": "subnetChangeProtection",
|
|
2125
|
+
"subnet_mappings": "subnetMappings",
|
|
1917
2126
|
"tags": "tags",
|
|
2127
|
+
"transit_gateway_id": "transitGatewayId",
|
|
2128
|
+
"vpc_id": "vpcId",
|
|
1918
2129
|
},
|
|
1919
2130
|
)
|
|
1920
2131
|
class CfnFirewallProps:
|
|
@@ -1923,27 +2134,33 @@ class CfnFirewallProps:
|
|
|
1923
2134
|
*,
|
|
1924
2135
|
firewall_name: builtins.str,
|
|
1925
2136
|
firewall_policy_arn: builtins.str,
|
|
1926
|
-
|
|
1927
|
-
|
|
2137
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2138
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
1928
2139
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1929
2140
|
description: typing.Optional[builtins.str] = None,
|
|
1930
2141
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1931
2142
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
1932
2143
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2144
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
1933
2145
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2146
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
2147
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
1934
2148
|
) -> None:
|
|
1935
2149
|
'''Properties for defining a ``CfnFirewall``.
|
|
1936
2150
|
|
|
1937
2151
|
:param firewall_name: The descriptive name of the firewall. You can't change the name of a firewall after you create it.
|
|
1938
2152
|
:param firewall_policy_arn: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
|
|
1939
|
-
:param
|
|
1940
|
-
:param
|
|
2153
|
+
:param availability_zone_change_protection: A setting indicating whether the firewall is protected against changes to its Availability Zone configuration. When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
2154
|
+
:param availability_zone_mappings: The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall. Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
1941
2155
|
:param delete_protection: A flag indicating whether it is possible to delete the firewall. A setting of ``TRUE`` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to ``TRUE`` .
|
|
1942
2156
|
:param description: A description of the firewall.
|
|
1943
2157
|
:param enabled_analysis_types: An optional setting indicating the specific traffic analysis types to enable on the firewall.
|
|
1944
2158
|
:param firewall_policy_change_protection: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
1945
2159
|
:param subnet_change_protection: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to ``TRUE`` .
|
|
2160
|
+
:param subnet_mappings: The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall. These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
1946
2161
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
2162
|
+
:param transit_gateway_id: The unique identifier of the transit gateway associated with this firewall. This field is only present for transit gateway-attached firewalls.
|
|
2163
|
+
:param vpc_id: The unique identifier of the VPC where the firewall is in use. You can't change the VPC of a firewall after you create the firewall.
|
|
1947
2164
|
|
|
1948
2165
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html
|
|
1949
2166
|
:exampleMetadata: fixture=_generated
|
|
@@ -1957,44 +2174,54 @@ class CfnFirewallProps:
|
|
|
1957
2174
|
cfn_firewall_props = networkfirewall.CfnFirewallProps(
|
|
1958
2175
|
firewall_name="firewallName",
|
|
1959
2176
|
firewall_policy_arn="firewallPolicyArn",
|
|
1960
|
-
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
1961
|
-
subnet_id="subnetId",
|
|
1962
|
-
|
|
1963
|
-
# the properties below are optional
|
|
1964
|
-
ip_address_type="ipAddressType"
|
|
1965
|
-
)],
|
|
1966
|
-
vpc_id="vpcId",
|
|
1967
2177
|
|
|
1968
2178
|
# the properties below are optional
|
|
2179
|
+
availability_zone_change_protection=False,
|
|
2180
|
+
availability_zone_mappings=[networkfirewall.CfnFirewall.AvailabilityZoneMappingProperty(
|
|
2181
|
+
availability_zone="availabilityZone"
|
|
2182
|
+
)],
|
|
1969
2183
|
delete_protection=False,
|
|
1970
2184
|
description="description",
|
|
1971
2185
|
enabled_analysis_types=["enabledAnalysisTypes"],
|
|
1972
2186
|
firewall_policy_change_protection=False,
|
|
1973
2187
|
subnet_change_protection=False,
|
|
2188
|
+
subnet_mappings=[networkfirewall.CfnFirewall.SubnetMappingProperty(
|
|
2189
|
+
subnet_id="subnetId",
|
|
2190
|
+
|
|
2191
|
+
# the properties below are optional
|
|
2192
|
+
ip_address_type="ipAddressType"
|
|
2193
|
+
)],
|
|
1974
2194
|
tags=[CfnTag(
|
|
1975
2195
|
key="key",
|
|
1976
2196
|
value="value"
|
|
1977
|
-
)]
|
|
2197
|
+
)],
|
|
2198
|
+
transit_gateway_id="transitGatewayId",
|
|
2199
|
+
vpc_id="vpcId"
|
|
1978
2200
|
)
|
|
1979
2201
|
'''
|
|
1980
2202
|
if __debug__:
|
|
1981
2203
|
type_hints = typing.get_type_hints(_typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57bc238e99)
|
|
1982
2204
|
check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
|
|
1983
2205
|
check_type(argname="argument firewall_policy_arn", value=firewall_policy_arn, expected_type=type_hints["firewall_policy_arn"])
|
|
1984
|
-
check_type(argname="argument
|
|
1985
|
-
check_type(argname="argument
|
|
2206
|
+
check_type(argname="argument availability_zone_change_protection", value=availability_zone_change_protection, expected_type=type_hints["availability_zone_change_protection"])
|
|
2207
|
+
check_type(argname="argument availability_zone_mappings", value=availability_zone_mappings, expected_type=type_hints["availability_zone_mappings"])
|
|
1986
2208
|
check_type(argname="argument delete_protection", value=delete_protection, expected_type=type_hints["delete_protection"])
|
|
1987
2209
|
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
1988
2210
|
check_type(argname="argument enabled_analysis_types", value=enabled_analysis_types, expected_type=type_hints["enabled_analysis_types"])
|
|
1989
2211
|
check_type(argname="argument firewall_policy_change_protection", value=firewall_policy_change_protection, expected_type=type_hints["firewall_policy_change_protection"])
|
|
1990
2212
|
check_type(argname="argument subnet_change_protection", value=subnet_change_protection, expected_type=type_hints["subnet_change_protection"])
|
|
2213
|
+
check_type(argname="argument subnet_mappings", value=subnet_mappings, expected_type=type_hints["subnet_mappings"])
|
|
1991
2214
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
2215
|
+
check_type(argname="argument transit_gateway_id", value=transit_gateway_id, expected_type=type_hints["transit_gateway_id"])
|
|
2216
|
+
check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
|
|
1992
2217
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
1993
2218
|
"firewall_name": firewall_name,
|
|
1994
2219
|
"firewall_policy_arn": firewall_policy_arn,
|
|
1995
|
-
"subnet_mappings": subnet_mappings,
|
|
1996
|
-
"vpc_id": vpc_id,
|
|
1997
2220
|
}
|
|
2221
|
+
if availability_zone_change_protection is not None:
|
|
2222
|
+
self._values["availability_zone_change_protection"] = availability_zone_change_protection
|
|
2223
|
+
if availability_zone_mappings is not None:
|
|
2224
|
+
self._values["availability_zone_mappings"] = availability_zone_mappings
|
|
1998
2225
|
if delete_protection is not None:
|
|
1999
2226
|
self._values["delete_protection"] = delete_protection
|
|
2000
2227
|
if description is not None:
|
|
@@ -2005,8 +2232,14 @@ class CfnFirewallProps:
|
|
|
2005
2232
|
self._values["firewall_policy_change_protection"] = firewall_policy_change_protection
|
|
2006
2233
|
if subnet_change_protection is not None:
|
|
2007
2234
|
self._values["subnet_change_protection"] = subnet_change_protection
|
|
2235
|
+
if subnet_mappings is not None:
|
|
2236
|
+
self._values["subnet_mappings"] = subnet_mappings
|
|
2008
2237
|
if tags is not None:
|
|
2009
2238
|
self._values["tags"] = tags
|
|
2239
|
+
if transit_gateway_id is not None:
|
|
2240
|
+
self._values["transit_gateway_id"] = transit_gateway_id
|
|
2241
|
+
if vpc_id is not None:
|
|
2242
|
+
self._values["vpc_id"] = vpc_id
|
|
2010
2243
|
|
|
2011
2244
|
@builtins.property
|
|
2012
2245
|
def firewall_name(self) -> builtins.str:
|
|
@@ -2033,34 +2266,30 @@ class CfnFirewallProps:
|
|
|
2033
2266
|
return typing.cast(builtins.str, result)
|
|
2034
2267
|
|
|
2035
2268
|
@builtins.property
|
|
2036
|
-
def
|
|
2269
|
+
def availability_zone_change_protection(
|
|
2037
2270
|
self,
|
|
2038
|
-
) -> typing.
|
|
2039
|
-
'''
|
|
2040
|
-
|
|
2041
|
-
Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
|
|
2042
|
-
|
|
2043
|
-
These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
|
|
2271
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2272
|
+
'''A setting indicating whether the firewall is protected against changes to its Availability Zone configuration.
|
|
2044
2273
|
|
|
2045
|
-
|
|
2274
|
+
When set to ``TRUE`` , you must first disable this protection before adding or removing Availability Zones.
|
|
2046
2275
|
|
|
2047
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-
|
|
2276
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonechangeprotection
|
|
2048
2277
|
'''
|
|
2049
|
-
result = self._values.get("
|
|
2050
|
-
|
|
2051
|
-
return typing.cast(typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]], result)
|
|
2278
|
+
result = self._values.get("availability_zone_change_protection")
|
|
2279
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2052
2280
|
|
|
2053
2281
|
@builtins.property
|
|
2054
|
-
def
|
|
2055
|
-
|
|
2282
|
+
def availability_zone_mappings(
|
|
2283
|
+
self,
|
|
2284
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]]:
|
|
2285
|
+
'''The Availability Zones where the firewall endpoints are created for a transit gateway-attached firewall.
|
|
2056
2286
|
|
|
2057
|
-
|
|
2287
|
+
Each mapping specifies an Availability Zone where the firewall processes traffic.
|
|
2058
2288
|
|
|
2059
|
-
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-
|
|
2289
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-availabilityzonemappings
|
|
2060
2290
|
'''
|
|
2061
|
-
result = self._values.get("
|
|
2062
|
-
|
|
2063
|
-
return typing.cast(builtins.str, result)
|
|
2291
|
+
result = self._values.get("availability_zone_mappings")
|
|
2292
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]], result)
|
|
2064
2293
|
|
|
2065
2294
|
@builtins.property
|
|
2066
2295
|
def delete_protection(
|
|
@@ -2119,6 +2348,23 @@ class CfnFirewallProps:
|
|
|
2119
2348
|
result = self._values.get("subnet_change_protection")
|
|
2120
2349
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2121
2350
|
|
|
2351
|
+
@builtins.property
|
|
2352
|
+
def subnet_mappings(
|
|
2353
|
+
self,
|
|
2354
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]]:
|
|
2355
|
+
'''The primary public subnets that Network Firewall is using for the firewall.
|
|
2356
|
+
|
|
2357
|
+
Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.
|
|
2358
|
+
|
|
2359
|
+
These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone.
|
|
2360
|
+
|
|
2361
|
+
In addition to these subnets, you can define other endpoints for the firewall in ``VpcEndpointAssociation`` resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone.
|
|
2362
|
+
|
|
2363
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-subnetmappings
|
|
2364
|
+
'''
|
|
2365
|
+
result = self._values.get("subnet_mappings")
|
|
2366
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]], result)
|
|
2367
|
+
|
|
2122
2368
|
@builtins.property
|
|
2123
2369
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
2124
2370
|
'''An array of key-value pairs to apply to this resource.
|
|
@@ -2130,6 +2376,28 @@ class CfnFirewallProps:
|
|
|
2130
2376
|
result = self._values.get("tags")
|
|
2131
2377
|
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
|
|
2132
2378
|
|
|
2379
|
+
@builtins.property
|
|
2380
|
+
def transit_gateway_id(self) -> typing.Optional[builtins.str]:
|
|
2381
|
+
'''The unique identifier of the transit gateway associated with this firewall.
|
|
2382
|
+
|
|
2383
|
+
This field is only present for transit gateway-attached firewalls.
|
|
2384
|
+
|
|
2385
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-transitgatewayid
|
|
2386
|
+
'''
|
|
2387
|
+
result = self._values.get("transit_gateway_id")
|
|
2388
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2389
|
+
|
|
2390
|
+
@builtins.property
|
|
2391
|
+
def vpc_id(self) -> typing.Optional[builtins.str]:
|
|
2392
|
+
'''The unique identifier of the VPC where the firewall is in use.
|
|
2393
|
+
|
|
2394
|
+
You can't change the VPC of a firewall after you create the firewall.
|
|
2395
|
+
|
|
2396
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-firewall.html#cfn-networkfirewall-firewall-vpcid
|
|
2397
|
+
'''
|
|
2398
|
+
result = self._values.get("vpc_id")
|
|
2399
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2400
|
+
|
|
2133
2401
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
2134
2402
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
2135
2403
|
|
|
@@ -2142,17 +2410,17 @@ class CfnFirewallProps:
|
|
|
2142
2410
|
)
|
|
2143
2411
|
|
|
2144
2412
|
|
|
2145
|
-
@jsii.implements(_IInspectable_c2943556)
|
|
2413
|
+
@jsii.implements(_IInspectable_c2943556, _ILoggingConfigurationRef_1588c620)
|
|
2146
2414
|
class CfnLoggingConfiguration(
|
|
2147
2415
|
_CfnResource_9df397a6,
|
|
2148
2416
|
metaclass=jsii.JSIIMeta,
|
|
2149
2417
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnLoggingConfiguration",
|
|
2150
2418
|
):
|
|
2151
|
-
'''Use the
|
|
2419
|
+
'''Use the logging configuration to define the destinations and logging options for an firewall.
|
|
2152
2420
|
|
|
2153
2421
|
You must change the logging configuration by changing one ``LogDestinationConfig`` setting at a time in your ``LogDestinationConfigs`` .
|
|
2154
2422
|
|
|
2155
|
-
You can make only one of the following changes to your
|
|
2423
|
+
You can make only one of the following changes to your logging configuration resource:
|
|
2156
2424
|
|
|
2157
2425
|
- Create a new log destination object by adding a single ``LogDestinationConfig`` array element to ``LogDestinationConfigs`` .
|
|
2158
2426
|
- Delete a log destination object by removing a single ``LogDestinationConfig`` array element from ``LogDestinationConfigs`` .
|
|
@@ -2183,6 +2451,7 @@ class CfnLoggingConfiguration(
|
|
|
2183
2451
|
),
|
|
2184
2452
|
|
|
2185
2453
|
# the properties below are optional
|
|
2454
|
+
enable_monitoring_dashboard=False,
|
|
2186
2455
|
firewall_name="firewallName"
|
|
2187
2456
|
)
|
|
2188
2457
|
'''
|
|
@@ -2194,13 +2463,16 @@ class CfnLoggingConfiguration(
|
|
|
2194
2463
|
*,
|
|
2195
2464
|
firewall_arn: builtins.str,
|
|
2196
2465
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LoggingConfigurationProperty", typing.Dict[builtins.str, typing.Any]]],
|
|
2466
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2197
2467
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
2198
2468
|
) -> None:
|
|
2199
|
-
'''
|
|
2469
|
+
'''Create a new ``AWS::NetworkFirewall::LoggingConfiguration``.
|
|
2470
|
+
|
|
2200
2471
|
:param scope: Scope in which this resource is defined.
|
|
2201
2472
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
2202
|
-
:param firewall_arn: The Amazon Resource Name (ARN) of the
|
|
2203
|
-
:param logging_configuration: Defines how AWS Network Firewall performs logging for a
|
|
2473
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2474
|
+
:param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
|
|
2475
|
+
:param enable_monitoring_dashboard:
|
|
2204
2476
|
:param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2205
2477
|
'''
|
|
2206
2478
|
if __debug__:
|
|
@@ -2210,6 +2482,7 @@ class CfnLoggingConfiguration(
|
|
|
2210
2482
|
props = CfnLoggingConfigurationProps(
|
|
2211
2483
|
firewall_arn=firewall_arn,
|
|
2212
2484
|
logging_configuration=logging_configuration,
|
|
2485
|
+
enable_monitoring_dashboard=enable_monitoring_dashboard,
|
|
2213
2486
|
firewall_name=firewall_name,
|
|
2214
2487
|
)
|
|
2215
2488
|
|
|
@@ -2250,10 +2523,16 @@ class CfnLoggingConfiguration(
|
|
|
2250
2523
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2251
2524
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
2252
2525
|
|
|
2526
|
+
@builtins.property
|
|
2527
|
+
@jsii.member(jsii_name="loggingConfigurationRef")
|
|
2528
|
+
def logging_configuration_ref(self) -> _LoggingConfigurationReference_f6c32f6c:
|
|
2529
|
+
'''A reference to a LoggingConfiguration resource.'''
|
|
2530
|
+
return typing.cast(_LoggingConfigurationReference_f6c32f6c, jsii.get(self, "loggingConfigurationRef"))
|
|
2531
|
+
|
|
2253
2532
|
@builtins.property
|
|
2254
2533
|
@jsii.member(jsii_name="firewallArn")
|
|
2255
2534
|
def firewall_arn(self) -> builtins.str:
|
|
2256
|
-
'''The Amazon Resource Name (ARN) of the
|
|
2535
|
+
'''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.'''
|
|
2257
2536
|
return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
|
|
2258
2537
|
|
|
2259
2538
|
@firewall_arn.setter
|
|
@@ -2268,7 +2547,7 @@ class CfnLoggingConfiguration(
|
|
|
2268
2547
|
def logging_configuration(
|
|
2269
2548
|
self,
|
|
2270
2549
|
) -> typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"]:
|
|
2271
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2550
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.'''
|
|
2272
2551
|
return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnLoggingConfiguration.LoggingConfigurationProperty"], jsii.get(self, "loggingConfiguration"))
|
|
2273
2552
|
|
|
2274
2553
|
@logging_configuration.setter
|
|
@@ -2281,6 +2560,23 @@ class CfnLoggingConfiguration(
|
|
|
2281
2560
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2282
2561
|
jsii.set(self, "loggingConfiguration", value) # pyright: ignore[reportArgumentType]
|
|
2283
2562
|
|
|
2563
|
+
@builtins.property
|
|
2564
|
+
@jsii.member(jsii_name="enableMonitoringDashboard")
|
|
2565
|
+
def enable_monitoring_dashboard(
|
|
2566
|
+
self,
|
|
2567
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2568
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "enableMonitoringDashboard"))
|
|
2569
|
+
|
|
2570
|
+
@enable_monitoring_dashboard.setter
|
|
2571
|
+
def enable_monitoring_dashboard(
|
|
2572
|
+
self,
|
|
2573
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
2574
|
+
) -> None:
|
|
2575
|
+
if __debug__:
|
|
2576
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe)
|
|
2577
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2578
|
+
jsii.set(self, "enableMonitoringDashboard", value) # pyright: ignore[reportArgumentType]
|
|
2579
|
+
|
|
2284
2580
|
@builtins.property
|
|
2285
2581
|
@jsii.member(jsii_name="firewallName")
|
|
2286
2582
|
def firewall_name(self) -> typing.Optional[builtins.str]:
|
|
@@ -2313,7 +2609,7 @@ class CfnLoggingConfiguration(
|
|
|
2313
2609
|
) -> None:
|
|
2314
2610
|
'''Defines where AWS Network Firewall sends logs for the firewall for one log type.
|
|
2315
2611
|
|
|
2316
|
-
This is used in
|
|
2612
|
+
This is used in logging configuration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
|
|
2317
2613
|
|
|
2318
2614
|
Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to ``DROP`` or ``ALERT`` .
|
|
2319
2615
|
|
|
@@ -2425,7 +2721,7 @@ class CfnLoggingConfiguration(
|
|
|
2425
2721
|
*,
|
|
2426
2722
|
log_destination_configs: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnLoggingConfiguration.LogDestinationConfigProperty", typing.Dict[builtins.str, typing.Any]]]]],
|
|
2427
2723
|
) -> None:
|
|
2428
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2724
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.
|
|
2429
2725
|
|
|
2430
2726
|
:param log_destination_configs: Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
|
|
2431
2727
|
|
|
@@ -2487,6 +2783,7 @@ class CfnLoggingConfiguration(
|
|
|
2487
2783
|
name_mapping={
|
|
2488
2784
|
"firewall_arn": "firewallArn",
|
|
2489
2785
|
"logging_configuration": "loggingConfiguration",
|
|
2786
|
+
"enable_monitoring_dashboard": "enableMonitoringDashboard",
|
|
2490
2787
|
"firewall_name": "firewallName",
|
|
2491
2788
|
},
|
|
2492
2789
|
)
|
|
@@ -2496,12 +2793,14 @@ class CfnLoggingConfigurationProps:
|
|
|
2496
2793
|
*,
|
|
2497
2794
|
firewall_arn: builtins.str,
|
|
2498
2795
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
2796
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
2499
2797
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
2500
2798
|
) -> None:
|
|
2501
2799
|
'''Properties for defining a ``CfnLoggingConfiguration``.
|
|
2502
2800
|
|
|
2503
|
-
:param firewall_arn: The Amazon Resource Name (ARN) of the
|
|
2504
|
-
:param logging_configuration: Defines how AWS Network Firewall performs logging for a
|
|
2801
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2802
|
+
:param logging_configuration: Defines how AWS Network Firewall performs logging for a firewall.
|
|
2803
|
+
:param enable_monitoring_dashboard:
|
|
2505
2804
|
:param firewall_name: The name of the firewall that the logging configuration is associated with. You can't change the firewall specification after you create the logging configuration.
|
|
2506
2805
|
|
|
2507
2806
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html
|
|
@@ -2526,6 +2825,7 @@ class CfnLoggingConfigurationProps:
|
|
|
2526
2825
|
),
|
|
2527
2826
|
|
|
2528
2827
|
# the properties below are optional
|
|
2828
|
+
enable_monitoring_dashboard=False,
|
|
2529
2829
|
firewall_name="firewallName"
|
|
2530
2830
|
)
|
|
2531
2831
|
'''
|
|
@@ -2533,17 +2833,20 @@ class CfnLoggingConfigurationProps:
|
|
|
2533
2833
|
type_hints = typing.get_type_hints(_typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d62178ab9369)
|
|
2534
2834
|
check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
|
|
2535
2835
|
check_type(argname="argument logging_configuration", value=logging_configuration, expected_type=type_hints["logging_configuration"])
|
|
2836
|
+
check_type(argname="argument enable_monitoring_dashboard", value=enable_monitoring_dashboard, expected_type=type_hints["enable_monitoring_dashboard"])
|
|
2536
2837
|
check_type(argname="argument firewall_name", value=firewall_name, expected_type=type_hints["firewall_name"])
|
|
2537
2838
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
2538
2839
|
"firewall_arn": firewall_arn,
|
|
2539
2840
|
"logging_configuration": logging_configuration,
|
|
2540
2841
|
}
|
|
2842
|
+
if enable_monitoring_dashboard is not None:
|
|
2843
|
+
self._values["enable_monitoring_dashboard"] = enable_monitoring_dashboard
|
|
2541
2844
|
if firewall_name is not None:
|
|
2542
2845
|
self._values["firewall_name"] = firewall_name
|
|
2543
2846
|
|
|
2544
2847
|
@builtins.property
|
|
2545
2848
|
def firewall_arn(self) -> builtins.str:
|
|
2546
|
-
'''The Amazon Resource Name (ARN) of the
|
|
2849
|
+
'''The Amazon Resource Name (ARN) of the firewallthat the logging configuration is associated with.
|
|
2547
2850
|
|
|
2548
2851
|
You can't change the firewall specification after you create the logging configuration.
|
|
2549
2852
|
|
|
@@ -2557,7 +2860,7 @@ class CfnLoggingConfigurationProps:
|
|
|
2557
2860
|
def logging_configuration(
|
|
2558
2861
|
self,
|
|
2559
2862
|
) -> typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty]:
|
|
2560
|
-
'''Defines how AWS Network Firewall performs logging for a
|
|
2863
|
+
'''Defines how AWS Network Firewall performs logging for a firewall.
|
|
2561
2864
|
|
|
2562
2865
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-loggingconfiguration
|
|
2563
2866
|
'''
|
|
@@ -2565,6 +2868,16 @@ class CfnLoggingConfigurationProps:
|
|
|
2565
2868
|
assert result is not None, "Required property 'logging_configuration' is missing"
|
|
2566
2869
|
return typing.cast(typing.Union[_IResolvable_da3f097b, CfnLoggingConfiguration.LoggingConfigurationProperty], result)
|
|
2567
2870
|
|
|
2871
|
+
@builtins.property
|
|
2872
|
+
def enable_monitoring_dashboard(
|
|
2873
|
+
self,
|
|
2874
|
+
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
2875
|
+
'''
|
|
2876
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-loggingconfiguration.html#cfn-networkfirewall-loggingconfiguration-enablemonitoringdashboard
|
|
2877
|
+
'''
|
|
2878
|
+
result = self._values.get("enable_monitoring_dashboard")
|
|
2879
|
+
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], result)
|
|
2880
|
+
|
|
2568
2881
|
@builtins.property
|
|
2569
2882
|
def firewall_name(self) -> typing.Optional[builtins.str]:
|
|
2570
2883
|
'''The name of the firewall that the logging configuration is associated with.
|
|
@@ -2588,15 +2901,13 @@ class CfnLoggingConfigurationProps:
|
|
|
2588
2901
|
)
|
|
2589
2902
|
|
|
2590
2903
|
|
|
2591
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggable_36806126)
|
|
2904
|
+
@jsii.implements(_IInspectable_c2943556, _IRuleGroupRef_f1ee71d3, _ITaggable_36806126)
|
|
2592
2905
|
class CfnRuleGroup(
|
|
2593
2906
|
_CfnResource_9df397a6,
|
|
2594
2907
|
metaclass=jsii.JSIIMeta,
|
|
2595
2908
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup",
|
|
2596
2909
|
):
|
|
2597
|
-
'''Use the
|
|
2598
|
-
|
|
2599
|
-
You use rule groups in an ``FirewallPolicy`` to specify the filtering behavior of an ``Firewall`` .
|
|
2910
|
+
'''Use the ` <https://docs.aws.amazon.com/RuleGroup>`_ to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an firewall policy to specify the filtering behavior of an firewall.
|
|
2600
2911
|
|
|
2601
2912
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
|
|
2602
2913
|
:cloudformationResource: AWS::NetworkFirewall::RuleGroup
|
|
@@ -2709,6 +3020,9 @@ class CfnRuleGroup(
|
|
|
2709
3020
|
rule_order="ruleOrder"
|
|
2710
3021
|
)
|
|
2711
3022
|
),
|
|
3023
|
+
summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
3024
|
+
rule_options=["ruleOptions"]
|
|
3025
|
+
),
|
|
2712
3026
|
tags=[CfnTag(
|
|
2713
3027
|
key="key",
|
|
2714
3028
|
value="value"
|
|
@@ -2726,9 +3040,11 @@ class CfnRuleGroup(
|
|
|
2726
3040
|
type: builtins.str,
|
|
2727
3041
|
description: typing.Optional[builtins.str] = None,
|
|
2728
3042
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.RuleGroupProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3043
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.SummaryConfigurationProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2729
3044
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2730
3045
|
) -> None:
|
|
2731
|
-
'''
|
|
3046
|
+
'''Create a new ``AWS::NetworkFirewall::RuleGroup``.
|
|
3047
|
+
|
|
2732
3048
|
:param scope: Scope in which this resource is defined.
|
|
2733
3049
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
2734
3050
|
:param capacity: The maximum operating resources that this rule group can use. You can't change a rule group's capacity setting after you create the rule group. When you update a rule group, you are limited to this capacity. When you reference a rule group from a firewall policy, Network Firewall reserves this capacity for the rule group.
|
|
@@ -2736,6 +3052,7 @@ class CfnRuleGroup(
|
|
|
2736
3052
|
:param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
|
|
2737
3053
|
:param description: A description of the rule group.
|
|
2738
3054
|
:param rule_group: An object that defines the rule group rules.
|
|
3055
|
+
:param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
|
|
2739
3056
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
2740
3057
|
'''
|
|
2741
3058
|
if __debug__:
|
|
@@ -2748,6 +3065,7 @@ class CfnRuleGroup(
|
|
|
2748
3065
|
type=type,
|
|
2749
3066
|
description=description,
|
|
2750
3067
|
rule_group=rule_group,
|
|
3068
|
+
summary_configuration=summary_configuration,
|
|
2751
3069
|
tags=tags,
|
|
2752
3070
|
)
|
|
2753
3071
|
|
|
@@ -2786,7 +3104,7 @@ class CfnRuleGroup(
|
|
|
2786
3104
|
@builtins.property
|
|
2787
3105
|
@jsii.member(jsii_name="attrRuleGroupArn")
|
|
2788
3106
|
def attr_rule_group_arn(self) -> builtins.str:
|
|
2789
|
-
'''The Amazon Resource Name (ARN) of the
|
|
3107
|
+
'''The Amazon Resource Name (ARN) of the rule group.
|
|
2790
3108
|
|
|
2791
3109
|
:cloudformationAttribute: RuleGroupArn
|
|
2792
3110
|
'''
|
|
@@ -2795,7 +3113,7 @@ class CfnRuleGroup(
|
|
|
2795
3113
|
@builtins.property
|
|
2796
3114
|
@jsii.member(jsii_name="attrRuleGroupId")
|
|
2797
3115
|
def attr_rule_group_id(self) -> builtins.str:
|
|
2798
|
-
'''The unique ID of the
|
|
3116
|
+
'''The unique ID of the rule group resource.
|
|
2799
3117
|
|
|
2800
3118
|
:cloudformationAttribute: RuleGroupId
|
|
2801
3119
|
'''
|
|
@@ -2806,6 +3124,12 @@ class CfnRuleGroup(
|
|
|
2806
3124
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2807
3125
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
2808
3126
|
|
|
3127
|
+
@builtins.property
|
|
3128
|
+
@jsii.member(jsii_name="ruleGroupRef")
|
|
3129
|
+
def rule_group_ref(self) -> _RuleGroupReference_b514c132:
|
|
3130
|
+
'''A reference to a RuleGroup resource.'''
|
|
3131
|
+
return typing.cast(_RuleGroupReference_b514c132, jsii.get(self, "ruleGroupRef"))
|
|
3132
|
+
|
|
2809
3133
|
@builtins.property
|
|
2810
3134
|
@jsii.member(jsii_name="tags")
|
|
2811
3135
|
def tags(self) -> _TagManager_0a598cb3:
|
|
@@ -2883,13 +3207,31 @@ class CfnRuleGroup(
|
|
|
2883
3207
|
jsii.set(self, "ruleGroup", value) # pyright: ignore[reportArgumentType]
|
|
2884
3208
|
|
|
2885
3209
|
@builtins.property
|
|
2886
|
-
@jsii.member(jsii_name="
|
|
2887
|
-
def
|
|
2888
|
-
|
|
2889
|
-
|
|
3210
|
+
@jsii.member(jsii_name="summaryConfiguration")
|
|
3211
|
+
def summary_configuration(
|
|
3212
|
+
self,
|
|
3213
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]]:
|
|
3214
|
+
'''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .'''
|
|
3215
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]], jsii.get(self, "summaryConfiguration"))
|
|
2890
3216
|
|
|
2891
|
-
@
|
|
2892
|
-
def
|
|
3217
|
+
@summary_configuration.setter
|
|
3218
|
+
def summary_configuration(
|
|
3219
|
+
self,
|
|
3220
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.SummaryConfigurationProperty"]],
|
|
3221
|
+
) -> None:
|
|
3222
|
+
if __debug__:
|
|
3223
|
+
type_hints = typing.get_type_hints(_typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0)
|
|
3224
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
3225
|
+
jsii.set(self, "summaryConfiguration", value) # pyright: ignore[reportArgumentType]
|
|
3226
|
+
|
|
3227
|
+
@builtins.property
|
|
3228
|
+
@jsii.member(jsii_name="tagsRaw")
|
|
3229
|
+
def tags_raw(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
3230
|
+
'''An array of key-value pairs to apply to this resource.'''
|
|
3231
|
+
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tagsRaw"))
|
|
3232
|
+
|
|
3233
|
+
@tags_raw.setter
|
|
3234
|
+
def tags_raw(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
|
|
2893
3235
|
if __debug__:
|
|
2894
3236
|
type_hints = typing.get_type_hints(_typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5)
|
|
2895
3237
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
@@ -2969,7 +3311,7 @@ class CfnRuleGroup(
|
|
|
2969
3311
|
def __init__(self, *, address_definition: builtins.str) -> None:
|
|
2970
3312
|
'''A single IP address specification.
|
|
2971
3313
|
|
|
2972
|
-
This is used in the
|
|
3314
|
+
This is used in the match attributes source and destination specifications.
|
|
2973
3315
|
|
|
2974
3316
|
:param address_definition: Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6. Examples: - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify ``192.0.2.44/32`` . - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify ``192.0.2.0/24`` . - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify ``1111:0000:0000:0000:0000:0000:0000:0111/128`` . - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify ``1111:0000:0000:0000:0000:0000:0000:0000/64`` . For more information about CIDR notation, see the Wikipedia entry `Classless Inter-Domain Routing <https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing>`_ .
|
|
2975
3317
|
|
|
@@ -3048,8 +3390,8 @@ class CfnRuleGroup(
|
|
|
3048
3390
|
|
|
3049
3391
|
You can use custom actions in the following places:
|
|
3050
3392
|
|
|
3051
|
-
- In
|
|
3052
|
-
- In an
|
|
3393
|
+
- In a ``StatelessRulesAndCustomActions`` . The custom actions are available for use by name inside the ``StatelessRulesAndCustomActions`` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes.
|
|
3394
|
+
- In an firewall policy specification, in ``StatelessCustomActions`` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
|
|
3053
3395
|
|
|
3054
3396
|
:param action_definition: The custom action associated with the action name.
|
|
3055
3397
|
:param action_name: The descriptive name of the custom action. You can't change the name of a custom action after you create it.
|
|
@@ -3363,7 +3705,7 @@ class CfnRuleGroup(
|
|
|
3363
3705
|
) -> None:
|
|
3364
3706
|
'''A list of IP addresses and address ranges, in CIDR notation.
|
|
3365
3707
|
|
|
3366
|
-
This is part of a ``
|
|
3708
|
+
This is part of a ``RuleVariables`` .
|
|
3367
3709
|
|
|
3368
3710
|
:param definition: The list of IP addresses and address ranges, in CIDR notation.
|
|
3369
3711
|
|
|
@@ -3418,11 +3760,11 @@ class CfnRuleGroup(
|
|
|
3418
3760
|
*,
|
|
3419
3761
|
reference_arn: typing.Optional[builtins.str] = None,
|
|
3420
3762
|
) -> None:
|
|
3421
|
-
'''Configures one or more
|
|
3763
|
+
'''Configures one or more IP set references for a Suricata-compatible rule group.
|
|
3422
3764
|
|
|
3423
3765
|
An IP set reference is a rule variable that references a resource that you create and manage in another AWS service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall , see `Using IP set references <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall Developer Guide* .
|
|
3424
3766
|
|
|
3425
|
-
:param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the
|
|
3767
|
+
:param reference_arn: The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
|
|
3426
3768
|
|
|
3427
3769
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html
|
|
3428
3770
|
:exampleMetadata: fixture=_generated
|
|
@@ -3446,7 +3788,7 @@ class CfnRuleGroup(
|
|
|
3446
3788
|
|
|
3447
3789
|
@builtins.property
|
|
3448
3790
|
def reference_arn(self) -> typing.Optional[builtins.str]:
|
|
3449
|
-
'''The Amazon Resource Name (ARN) of the resource to include in the
|
|
3791
|
+
'''The Amazon Resource Name (ARN) of the resource to include in the IP set reference.
|
|
3450
3792
|
|
|
3451
3793
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ipsetreference.html#cfn-networkfirewall-rulegroup-ipsetreference-referencearn
|
|
3452
3794
|
'''
|
|
@@ -3657,7 +3999,7 @@ class CfnRuleGroup(
|
|
|
3657
3999
|
def __init__(self, *, from_port: jsii.Number, to_port: jsii.Number) -> None:
|
|
3658
4000
|
'''A single port range specification.
|
|
3659
4001
|
|
|
3660
|
-
This is used for source and destination port ranges in the stateless
|
|
4002
|
+
This is used for source and destination port ranges in the stateless match attributes.
|
|
3661
4003
|
|
|
3662
4004
|
:param from_port: The lower limit of the port range. This must be less than or equal to the ``ToPort`` specification.
|
|
3663
4005
|
:param to_port: The upper limit of the port range. This must be greater than or equal to the ``FromPort`` specification.
|
|
@@ -3847,7 +4189,7 @@ class CfnRuleGroup(
|
|
|
3847
4189
|
*,
|
|
3848
4190
|
ip_set_references: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetReferenceProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
3849
4191
|
) -> None:
|
|
3850
|
-
'''Configures the
|
|
4192
|
+
'''Configures the reference sets for a stateful rule group.
|
|
3851
4193
|
|
|
3852
4194
|
For more information, see the `Using IP set references in Suricata compatible rule groups <https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html>`_ in the *Network Firewall User Guide* .
|
|
3853
4195
|
|
|
@@ -3915,7 +4257,7 @@ class CfnRuleGroup(
|
|
|
3915
4257
|
|
|
3916
4258
|
AWS Network Firewall inspects each packet for the specified matching criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on the packet.
|
|
3917
4259
|
|
|
3918
|
-
:param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the
|
|
4260
|
+
:param actions: The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action and you can add custom actions. .. epigraph:: Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy. For every rule, you must specify exactly one of the following standard actions. - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this ``Actions`` setting. To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named ``MyMetricsAction`` , then you could specify the standard action ``aws:pass`` combined with the custom action using ``[“aws:pass”, “MyMetricsAction”]`` .
|
|
3919
4261
|
:param match_attributes: Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection. Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags.
|
|
3920
4262
|
|
|
3921
4263
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-ruledefinition.html
|
|
@@ -3970,7 +4312,7 @@ class CfnRuleGroup(
|
|
|
3970
4312
|
You must specify a standard action and you can add custom actions.
|
|
3971
4313
|
.. epigraph::
|
|
3972
4314
|
|
|
3973
|
-
Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the
|
|
4315
|
+
Network Firewall only forwards a packet for stateful rule inspection if you specify ``aws:forward_to_sfe`` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify ``aws:forward_to_sfe`` for the ``StatelessDefaultActions`` setting for the firewall policy.
|
|
3974
4316
|
|
|
3975
4317
|
For every rule, you must specify exactly one of the following standard actions.
|
|
3976
4318
|
|
|
@@ -4312,7 +4654,7 @@ class CfnRuleGroup(
|
|
|
4312
4654
|
ip_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.IPSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
4313
4655
|
port_sets: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Mapping[builtins.str, typing.Union[_IResolvable_da3f097b, typing.Union["CfnRuleGroup.PortSetProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
4314
4656
|
) -> None:
|
|
4315
|
-
'''Settings that are available for use in the rules in the
|
|
4657
|
+
'''Settings that are available for use in the rules in the rule group where this is defined.
|
|
4316
4658
|
|
|
4317
4659
|
:param ip_sets: A list of IP addresses and address ranges, in CIDR notation.
|
|
4318
4660
|
:param port_sets: A list of port ranges.
|
|
@@ -4403,9 +4745,9 @@ class CfnRuleGroup(
|
|
|
4403
4745
|
|
|
4404
4746
|
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
|
|
4405
4747
|
|
|
4406
|
-
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``
|
|
4748
|
+
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the ``HOME_NET`` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see ``RuleVariables`` in this guide and `Stateful domain list rule groups in AWS Network Firewall <https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html>`_ in the *Network Firewall Developer Guide*
|
|
4407
4749
|
|
|
4408
|
-
:param generated_rules_type: Whether you want to allow or
|
|
4750
|
+
:param generated_rules_type: Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list. .. epigraph:: When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
|
|
4409
4751
|
:param targets: The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:. - Explicit names. For example, ``abc.example.com`` matches only the domain ``abc.example.com`` . - Names that use a domain wildcard, which you indicate with an initial ' ``.`` '. For example, ``.example.com`` matches ``example.com`` and matches all subdomains of ``example.com`` , such as ``abc.example.com`` and ``www.example.com`` .
|
|
4410
4752
|
:param target_types: The types of targets to inspect for. Valid values are ``TLS_SNI`` and ``HTTP_HOST`` .
|
|
4411
4753
|
|
|
@@ -4437,7 +4779,11 @@ class CfnRuleGroup(
|
|
|
4437
4779
|
|
|
4438
4780
|
@builtins.property
|
|
4439
4781
|
def generated_rules_type(self) -> builtins.str:
|
|
4440
|
-
'''Whether you want to allow or
|
|
4782
|
+
'''Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
|
|
4783
|
+
|
|
4784
|
+
.. epigraph::
|
|
4785
|
+
|
|
4786
|
+
When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
|
|
4441
4787
|
|
|
4442
4788
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessourcelist.html#cfn-networkfirewall-rulegroup-rulessourcelist-generatedrulestype
|
|
4443
4789
|
'''
|
|
@@ -4505,7 +4851,7 @@ class CfnRuleGroup(
|
|
|
4505
4851
|
Each rule group requires a single ``RulesSource`` . You can use an instance of this for either stateless rules or stateful rules.
|
|
4506
4852
|
|
|
4507
4853
|
:param rules_source_list: Stateful inspection criteria for a domain list rule group.
|
|
4508
|
-
:param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in
|
|
4854
|
+
:param rules_string: Stateful inspection criteria, provided in Suricata compatible rules. Suricata is an open-source threat detection framework that includes a standard rule-based language for network traffic inspection. These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. .. epigraph:: You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
|
|
4509
4855
|
:param stateful_rules: An array of individual stateful rules inspection criteria to be used together in a stateful rule group. Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
|
|
4510
4856
|
:param stateless_rules_and_custom_actions: Stateless inspection criteria to be used in a stateless rule group.
|
|
4511
4857
|
|
|
@@ -4623,7 +4969,7 @@ class CfnRuleGroup(
|
|
|
4623
4969
|
These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting.
|
|
4624
4970
|
.. epigraph::
|
|
4625
4971
|
|
|
4626
|
-
You can't use the ``priority`` keyword if the ``RuleOrder`` option in
|
|
4972
|
+
You can't use the ``priority`` keyword if the ``RuleOrder`` option in StatefulRuleOptions is set to ``STRICT_ORDER`` .
|
|
4627
4973
|
|
|
4628
4974
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-rulessource.html#cfn-networkfirewall-rulegroup-rulessource-rulesstring
|
|
4629
4975
|
'''
|
|
@@ -4741,7 +5087,7 @@ class CfnRuleGroup(
|
|
|
4741
5087
|
|
|
4742
5088
|
Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata ``Rules`` format, see `Rules Format <https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-7.0.3/rules/intro.html>`_ .
|
|
4743
5089
|
|
|
4744
|
-
:param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5090
|
+
:param action: Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. The actions for a stateful rule are defined as follows: - *PASS* - Permits the packets to go to the intended destination. - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. - *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic. - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration. You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` . - *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration. ``REJECT`` isn't currently available for use with IMAP and FTP protocols.
|
|
4745
5091
|
:param header: The stateful inspection criteria for this rule, used to inspect traffic flows.
|
|
4746
5092
|
:param rule_options: Additional settings for a stateful rule, provided as keywords and settings.
|
|
4747
5093
|
|
|
@@ -4792,13 +5138,13 @@ class CfnRuleGroup(
|
|
|
4792
5138
|
The actions for a stateful rule are defined as follows:
|
|
4793
5139
|
|
|
4794
5140
|
- *PASS* - Permits the packets to go to the intended destination.
|
|
4795
|
-
- *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5141
|
+
- *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
4796
5142
|
- *REJECT* - Drops traffic that matches the conditions of the stateful rule and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. ``REJECT`` is available only for TCP traffic.
|
|
4797
|
-
- *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
|
|
5143
|
+
- *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall logging configuration.
|
|
4798
5144
|
|
|
4799
5145
|
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with ``ALERT`` action, verify in the logs that the rule is filtering as you want, then change the action to ``DROP`` .
|
|
4800
5146
|
|
|
4801
|
-
- *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the
|
|
5147
|
+
- *REJECT* - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a ``RST`` bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the firewall logging configuration.
|
|
4802
5148
|
|
|
4803
5149
|
``REJECT`` isn't currently available for use with IMAP and FTP protocols.
|
|
4804
5150
|
|
|
@@ -4857,7 +5203,7 @@ class CfnRuleGroup(
|
|
|
4857
5203
|
) -> None:
|
|
4858
5204
|
'''A single stateless rule.
|
|
4859
5205
|
|
|
4860
|
-
This is used in ``
|
|
5206
|
+
This is used in ``StatelessRulesAndCustomActions`` .
|
|
4861
5207
|
|
|
4862
5208
|
:param priority: Indicates the order in which to run this rule relative to all of the rules that are defined for a stateless rule group. Network Firewall evaluates the rules in a rule group starting with the lowest priority setting. You must ensure that the priority settings are unique for the rule group. Each stateless rule group uses exactly one ``StatelessRulesAndCustomActions`` object, and each ``StatelessRulesAndCustomActions`` contains exactly one ``StatelessRules`` object. To ensure unique priority settings for your rule groups, set unique priorities for the stateless rules that you define inside any single ``StatelessRules`` object. You can change the priority settings of your rules at any time. To make it easier to insert rules later, number them so there's a wide range in between, for example use 100, 200, and so on.
|
|
4863
5209
|
:param rule_definition: Defines the stateless 5-tuple packet inspection criteria and the action to take on a packet that matches the criteria.
|
|
@@ -4969,7 +5315,7 @@ class CfnRuleGroup(
|
|
|
4969
5315
|
Each stateless rule group uses exactly one of these data types to define its stateless rules.
|
|
4970
5316
|
|
|
4971
5317
|
:param stateless_rules: Defines the set of stateless rules for use in a stateless rule group.
|
|
4972
|
-
:param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule
|
|
5318
|
+
:param custom_actions: Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification. You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
|
|
4973
5319
|
|
|
4974
5320
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html
|
|
4975
5321
|
:exampleMetadata: fixture=_generated
|
|
@@ -5052,7 +5398,7 @@ class CfnRuleGroup(
|
|
|
5052
5398
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnRuleGroup.CustomActionProperty"]]]]:
|
|
5053
5399
|
'''Defines an array of individual custom action definitions that are available for use by the stateless rules in this ``StatelessRulesAndCustomActions`` specification.
|
|
5054
5400
|
|
|
5055
|
-
You name each custom action that you define, and then you can use it by name in your stateless rule
|
|
5401
|
+
You name each custom action that you define, and then you can use it by name in your stateless rule definition ``Actions`` specification.
|
|
5056
5402
|
|
|
5057
5403
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-statelessrulesandcustomactions.html#cfn-networkfirewall-rulegroup-statelessrulesandcustomactions-customactions
|
|
5058
5404
|
'''
|
|
@@ -5070,6 +5416,65 @@ class CfnRuleGroup(
|
|
|
5070
5416
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
5071
5417
|
)
|
|
5072
5418
|
|
|
5419
|
+
@jsii.data_type(
|
|
5420
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.SummaryConfigurationProperty",
|
|
5421
|
+
jsii_struct_bases=[],
|
|
5422
|
+
name_mapping={"rule_options": "ruleOptions"},
|
|
5423
|
+
)
|
|
5424
|
+
class SummaryConfigurationProperty:
|
|
5425
|
+
def __init__(
|
|
5426
|
+
self,
|
|
5427
|
+
*,
|
|
5428
|
+
rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5429
|
+
) -> None:
|
|
5430
|
+
'''A complex type that specifies which Suricata rule metadata fields to use when displaying threat information. Contains:.
|
|
5431
|
+
|
|
5432
|
+
- ``RuleOptions`` - The Suricata rule options fields to extract and display
|
|
5433
|
+
|
|
5434
|
+
These settings affect how threat information appears in both the console and API responses. Summaries are available for rule groups you manage and for active threat defense AWS managed rule groups.
|
|
5435
|
+
|
|
5436
|
+
:param rule_options: Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
|
|
5437
|
+
|
|
5438
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html
|
|
5439
|
+
:exampleMetadata: fixture=_generated
|
|
5440
|
+
|
|
5441
|
+
Example::
|
|
5442
|
+
|
|
5443
|
+
# The code below shows an example of how to instantiate this type.
|
|
5444
|
+
# The values are placeholders you should change.
|
|
5445
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
5446
|
+
|
|
5447
|
+
summary_configuration_property = networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
5448
|
+
rule_options=["ruleOptions"]
|
|
5449
|
+
)
|
|
5450
|
+
'''
|
|
5451
|
+
if __debug__:
|
|
5452
|
+
type_hints = typing.get_type_hints(_typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307)
|
|
5453
|
+
check_type(argname="argument rule_options", value=rule_options, expected_type=type_hints["rule_options"])
|
|
5454
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
5455
|
+
if rule_options is not None:
|
|
5456
|
+
self._values["rule_options"] = rule_options
|
|
5457
|
+
|
|
5458
|
+
@builtins.property
|
|
5459
|
+
def rule_options(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
5460
|
+
'''Specifies the selected rule options returned by ``DescribeRuleGroupSummary`` .
|
|
5461
|
+
|
|
5462
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-summaryconfiguration.html#cfn-networkfirewall-rulegroup-summaryconfiguration-ruleoptions
|
|
5463
|
+
'''
|
|
5464
|
+
result = self._values.get("rule_options")
|
|
5465
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
5466
|
+
|
|
5467
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
5468
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
5469
|
+
|
|
5470
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
5471
|
+
return not (rhs == self)
|
|
5472
|
+
|
|
5473
|
+
def __repr__(self) -> str:
|
|
5474
|
+
return "SummaryConfigurationProperty(%s)" % ", ".join(
|
|
5475
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
5476
|
+
)
|
|
5477
|
+
|
|
5073
5478
|
@jsii.data_type(
|
|
5074
5479
|
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnRuleGroup.TCPFlagFieldProperty",
|
|
5075
5480
|
jsii_struct_bases=[],
|
|
@@ -5082,7 +5487,7 @@ class CfnRuleGroup(
|
|
|
5082
5487
|
flags: typing.Sequence[builtins.str],
|
|
5083
5488
|
masks: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
5084
5489
|
) -> None:
|
|
5085
|
-
'''TCP flags and masks to inspect packets for. This is used in the
|
|
5490
|
+
'''TCP flags and masks to inspect packets for. This is used in the match attributes specification.
|
|
5086
5491
|
|
|
5087
5492
|
For example:
|
|
5088
5493
|
|
|
@@ -5166,6 +5571,7 @@ class CfnRuleGroup(
|
|
|
5166
5571
|
"type": "type",
|
|
5167
5572
|
"description": "description",
|
|
5168
5573
|
"rule_group": "ruleGroup",
|
|
5574
|
+
"summary_configuration": "summaryConfiguration",
|
|
5169
5575
|
"tags": "tags",
|
|
5170
5576
|
},
|
|
5171
5577
|
)
|
|
@@ -5178,6 +5584,7 @@ class CfnRuleGroupProps:
|
|
|
5178
5584
|
type: builtins.str,
|
|
5179
5585
|
description: typing.Optional[builtins.str] = None,
|
|
5180
5586
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5587
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5181
5588
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5182
5589
|
) -> None:
|
|
5183
5590
|
'''Properties for defining a ``CfnRuleGroup``.
|
|
@@ -5187,6 +5594,7 @@ class CfnRuleGroupProps:
|
|
|
5187
5594
|
:param type: Indicates whether the rule group is stateless or stateful. If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules.
|
|
5188
5595
|
:param description: A description of the rule group.
|
|
5189
5596
|
:param rule_group: An object that defines the rule group rules.
|
|
5597
|
+
:param summary_configuration: A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` . - The ``RuleOptions`` specified in ``SummaryConfiguration`` - Rule metadata organization preferences
|
|
5190
5598
|
:param tags: An array of key-value pairs to apply to this resource. For more information, see `Tag <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html>`_ .
|
|
5191
5599
|
|
|
5192
5600
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html
|
|
@@ -5299,6 +5707,9 @@ class CfnRuleGroupProps:
|
|
|
5299
5707
|
rule_order="ruleOrder"
|
|
5300
5708
|
)
|
|
5301
5709
|
),
|
|
5710
|
+
summary_configuration=networkfirewall.CfnRuleGroup.SummaryConfigurationProperty(
|
|
5711
|
+
rule_options=["ruleOptions"]
|
|
5712
|
+
),
|
|
5302
5713
|
tags=[CfnTag(
|
|
5303
5714
|
key="key",
|
|
5304
5715
|
value="value"
|
|
@@ -5312,6 +5723,7 @@ class CfnRuleGroupProps:
|
|
|
5312
5723
|
check_type(argname="argument type", value=type, expected_type=type_hints["type"])
|
|
5313
5724
|
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
5314
5725
|
check_type(argname="argument rule_group", value=rule_group, expected_type=type_hints["rule_group"])
|
|
5726
|
+
check_type(argname="argument summary_configuration", value=summary_configuration, expected_type=type_hints["summary_configuration"])
|
|
5315
5727
|
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
5316
5728
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
5317
5729
|
"capacity": capacity,
|
|
@@ -5322,6 +5734,8 @@ class CfnRuleGroupProps:
|
|
|
5322
5734
|
self._values["description"] = description
|
|
5323
5735
|
if rule_group is not None:
|
|
5324
5736
|
self._values["rule_group"] = rule_group
|
|
5737
|
+
if summary_configuration is not None:
|
|
5738
|
+
self._values["summary_configuration"] = summary_configuration
|
|
5325
5739
|
if tags is not None:
|
|
5326
5740
|
self._values["tags"] = tags
|
|
5327
5741
|
|
|
@@ -5382,6 +5796,20 @@ class CfnRuleGroupProps:
|
|
|
5382
5796
|
result = self._values.get("rule_group")
|
|
5383
5797
|
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.RuleGroupProperty]], result)
|
|
5384
5798
|
|
|
5799
|
+
@builtins.property
|
|
5800
|
+
def summary_configuration(
|
|
5801
|
+
self,
|
|
5802
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]]:
|
|
5803
|
+
'''A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by ``DescribeRuleGroupSummary`` .
|
|
5804
|
+
|
|
5805
|
+
- The ``RuleOptions`` specified in ``SummaryConfiguration``
|
|
5806
|
+
- Rule metadata organization preferences
|
|
5807
|
+
|
|
5808
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-rulegroup.html#cfn-networkfirewall-rulegroup-summaryconfiguration
|
|
5809
|
+
'''
|
|
5810
|
+
result = self._values.get("summary_configuration")
|
|
5811
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]], result)
|
|
5812
|
+
|
|
5385
5813
|
@builtins.property
|
|
5386
5814
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
5387
5815
|
'''An array of key-value pairs to apply to this resource.
|
|
@@ -5405,7 +5833,7 @@ class CfnRuleGroupProps:
|
|
|
5405
5833
|
)
|
|
5406
5834
|
|
|
5407
5835
|
|
|
5408
|
-
@jsii.implements(_IInspectable_c2943556, _ITaggableV2_4e6798f8)
|
|
5836
|
+
@jsii.implements(_IInspectable_c2943556, _ITLSInspectionConfigurationRef_6d0a6d9c, _ITaggableV2_4e6798f8)
|
|
5409
5837
|
class CfnTLSInspectionConfiguration(
|
|
5410
5838
|
_CfnResource_9df397a6,
|
|
5411
5839
|
metaclass=jsii.JSIIMeta,
|
|
@@ -5478,10 +5906,11 @@ class CfnTLSInspectionConfiguration(
|
|
|
5478
5906
|
description: typing.Optional[builtins.str] = None,
|
|
5479
5907
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
5480
5908
|
) -> None:
|
|
5481
|
-
'''
|
|
5909
|
+
'''Create a new ``AWS::NetworkFirewall::TLSInspectionConfiguration``.
|
|
5910
|
+
|
|
5482
5911
|
:param scope: Scope in which this resource is defined.
|
|
5483
5912
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
5484
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
5913
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5485
5914
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
5486
5915
|
:param description: A description of the TLS inspection configuration.
|
|
5487
5916
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -5560,6 +5989,14 @@ class CfnTLSInspectionConfiguration(
|
|
|
5560
5989
|
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
5561
5990
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
5562
5991
|
|
|
5992
|
+
@builtins.property
|
|
5993
|
+
@jsii.member(jsii_name="tlsInspectionConfigurationRef")
|
|
5994
|
+
def tls_inspection_configuration_ref(
|
|
5995
|
+
self,
|
|
5996
|
+
) -> _TLSInspectionConfigurationReference_52bd7dd3:
|
|
5997
|
+
'''A reference to a TLSInspectionConfiguration resource.'''
|
|
5998
|
+
return typing.cast(_TLSInspectionConfigurationReference_52bd7dd3, jsii.get(self, "tlsInspectionConfigurationRef"))
|
|
5999
|
+
|
|
5563
6000
|
@builtins.property
|
|
5564
6001
|
@jsii.member(jsii_name="tlsInspectionConfiguration")
|
|
5565
6002
|
def tls_inspection_configuration(
|
|
@@ -5699,7 +6136,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
5699
6136
|
) -> None:
|
|
5700
6137
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
5701
6138
|
|
|
5702
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6139
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5703
6140
|
|
|
5704
6141
|
:param revoked_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has a revoked status. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
5705
6142
|
:param unknown_status_action: Configures how Network Firewall processes traffic when it determines that the certificate presented by the server in the SSL/TLS connection has an unknown status, or a status that cannot be determined for any other reason, including when the service is unable to connect to the OCSP and CRL endpoints for the certificate. - *PASS* - Allow the connection to continue, and pass subsequent packets to the stateful engine for inspection. - *DROP* - Network Firewall closes the connection and drops subsequent packets for that connection. - *REJECT* - Network Firewall sends a TCP reject packet back to your client. The service closes the connection and drops subsequent packets for that connection. ``REJECT`` is available only for TCP traffic.
|
|
@@ -5856,14 +6293,14 @@ class CfnTLSInspectionConfiguration(
|
|
|
5856
6293
|
scopes: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateScopeProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
5857
6294
|
server_certificates: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTLSInspectionConfiguration.ServerCertificateProperty", typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
5858
6295
|
) -> None:
|
|
5859
|
-
'''Configures the
|
|
6296
|
+
'''Configures the Certificate Manager certificates and scope that Network Firewall uses to decrypt and re-encrypt traffic using a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ . You can configure ``ServerCertificates`` for inbound SSL/TLS inspection, a ``CertificateAuthorityArn`` for outbound SSL/TLS inspection, or both. For information about working with certificates for TLS inspection, see `Using SSL/TLS server certficiates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5860
6297
|
|
|
5861
6298
|
.. epigraph::
|
|
5862
6299
|
|
|
5863
|
-
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6300
|
+
If a server certificate that's associated with your `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ is revoked, deleted, or expired it can result in client-side TLS errors.
|
|
5864
6301
|
|
|
5865
|
-
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
5866
|
-
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6302
|
+
:param certificate_authority_arn: The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection. The following limitations apply: - You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM. - You can't use certificates issued by AWS Private Certificate Authority . For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* . For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
6303
|
+
:param check_certificate_revocation_status: When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status. If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5867
6304
|
:param scopes: A list of scopes.
|
|
5868
6305
|
:param server_certificates: The list of server certificates to use for inbound SSL/TLS inspection.
|
|
5869
6306
|
|
|
@@ -5922,16 +6359,16 @@ class CfnTLSInspectionConfiguration(
|
|
|
5922
6359
|
|
|
5923
6360
|
@builtins.property
|
|
5924
6361
|
def certificate_authority_arn(self) -> typing.Optional[builtins.str]:
|
|
5925
|
-
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within
|
|
6362
|
+
'''The Amazon Resource Name (ARN) of the imported certificate authority (CA) certificate within Certificate Manager (ACM) to use for outbound SSL/TLS inspection.
|
|
5926
6363
|
|
|
5927
6364
|
The following limitations apply:
|
|
5928
6365
|
|
|
5929
6366
|
- You can use CA certificates that you imported into ACM, but you can't generate CA certificates with ACM.
|
|
5930
6367
|
- You can't use certificates issued by AWS Private Certificate Authority .
|
|
5931
6368
|
|
|
5932
|
-
For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with
|
|
6369
|
+
For more information about configuring certificates for outbound inspection, see `Using SSL/TLS certificates with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
5933
6370
|
|
|
5934
|
-
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *
|
|
6371
|
+
For information about working with certificates in ACM, see `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
5935
6372
|
|
|
5936
6373
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-certificateauthorityarn
|
|
5937
6374
|
'''
|
|
@@ -5944,7 +6381,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
5944
6381
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnTLSInspectionConfiguration.CheckCertificateRevocationStatusProperty"]]:
|
|
5945
6382
|
'''When enabled, Network Firewall checks if the server certificate presented by the server in the SSL/TLS connection has a revoked or unkown status.
|
|
5946
6383
|
|
|
5947
|
-
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/
|
|
6384
|
+
If the certificate has an unknown or revoked status, you must specify the actions that Network Firewall takes on outbound traffic. To check the certificate revocation status, you must also specify a ``CertificateAuthorityArn`` in `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-servercertificateconfiguration.html>`_ .
|
|
5948
6385
|
|
|
5949
6386
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration-checkcertificaterevocationstatus
|
|
5950
6387
|
'''
|
|
@@ -5995,9 +6432,9 @@ class CfnTLSInspectionConfiguration(
|
|
|
5995
6432
|
*,
|
|
5996
6433
|
resource_arn: typing.Optional[builtins.str] = None,
|
|
5997
6434
|
) -> None:
|
|
5998
|
-
'''Any
|
|
6435
|
+
'''Any Certificate Manager (ACM) Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a `ServerCertificateConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificateconfiguration.html>`_ . Used in a `TLSInspectionConfiguration <https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-networkfirewall-tlsinspectionconfiguration.html>`_ for inspection of inbound traffic to your firewall. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. AWS Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager , see `Request a public certificate <https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html>`_ or `Importing certificates <https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html>`_ in the *Certificate Manager User Guide* .
|
|
5999
6436
|
|
|
6000
|
-
:param resource_arn: The Amazon Resource Name (ARN) of the
|
|
6437
|
+
:param resource_arn: The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
6001
6438
|
|
|
6002
6439
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html
|
|
6003
6440
|
:exampleMetadata: fixture=_generated
|
|
@@ -6021,7 +6458,7 @@ class CfnTLSInspectionConfiguration(
|
|
|
6021
6458
|
|
|
6022
6459
|
@builtins.property
|
|
6023
6460
|
def resource_arn(self) -> typing.Optional[builtins.str]:
|
|
6024
|
-
'''The Amazon Resource Name (ARN) of the
|
|
6461
|
+
'''The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate that's used for inbound SSL/TLS inspection.
|
|
6025
6462
|
|
|
6026
6463
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-tlsinspectionconfiguration-servercertificate.html#cfn-networkfirewall-tlsinspectionconfiguration-servercertificate-resourcearn
|
|
6027
6464
|
'''
|
|
@@ -6309,7 +6746,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6309
6746
|
) -> None:
|
|
6310
6747
|
'''Properties for defining a ``CfnTLSInspectionConfiguration``.
|
|
6311
6748
|
|
|
6312
|
-
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
6749
|
+
:param tls_inspection_configuration: The object that defines a TLS inspection configuration. AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6313
6750
|
:param tls_inspection_configuration_name: The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.
|
|
6314
6751
|
:param description: A description of the TLS inspection configuration.
|
|
6315
6752
|
:param tags: The key:value pairs to associate with the resource.
|
|
@@ -6384,7 +6821,7 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6384
6821
|
) -> typing.Union[_IResolvable_da3f097b, CfnTLSInspectionConfiguration.TLSInspectionConfigurationProperty]:
|
|
6385
6822
|
'''The object that defines a TLS inspection configuration.
|
|
6386
6823
|
|
|
6387
|
-
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using
|
|
6824
|
+
AWS Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, AWS Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using Certificate Manager , create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall. For more information about using TLS inspection configurations, see `Inspecting SSL/TLS traffic with TLS inspection configurations <https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6388
6825
|
|
|
6389
6826
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-tlsinspectionconfiguration.html#cfn-networkfirewall-tlsinspectionconfiguration-tlsinspectionconfiguration
|
|
6390
6827
|
'''
|
|
@@ -6434,140 +6871,617 @@ class CfnTLSInspectionConfigurationProps:
|
|
|
6434
6871
|
)
|
|
6435
6872
|
|
|
6436
6873
|
|
|
6437
|
-
|
|
6438
|
-
|
|
6439
|
-
|
|
6440
|
-
|
|
6441
|
-
"
|
|
6442
|
-
|
|
6443
|
-
|
|
6444
|
-
"CfnRuleGroup",
|
|
6445
|
-
"CfnRuleGroupProps",
|
|
6446
|
-
"CfnTLSInspectionConfiguration",
|
|
6447
|
-
"CfnTLSInspectionConfigurationProps",
|
|
6448
|
-
]
|
|
6874
|
+
@jsii.implements(_IInspectable_c2943556, _IVpcEndpointAssociationRef_bd0818d9, _ITaggableV2_4e6798f8)
|
|
6875
|
+
class CfnVpcEndpointAssociation(
|
|
6876
|
+
_CfnResource_9df397a6,
|
|
6877
|
+
metaclass=jsii.JSIIMeta,
|
|
6878
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation",
|
|
6879
|
+
):
|
|
6880
|
+
'''A VPC endpoint association defines a single subnet to use for a firewall endpoint for a ``Firewall`` .
|
|
6449
6881
|
|
|
6450
|
-
|
|
6882
|
+
You can define VPC endpoint associations only in the Availability Zones that already have a subnet mapping defined in the ``Firewall`` resource.
|
|
6883
|
+
.. epigraph::
|
|
6451
6884
|
|
|
6452
|
-
|
|
6453
|
-
scope: _constructs_77d1e7e8.Construct,
|
|
6454
|
-
id: builtins.str,
|
|
6455
|
-
*,
|
|
6456
|
-
firewall_name: builtins.str,
|
|
6457
|
-
firewall_policy_arn: builtins.str,
|
|
6458
|
-
subnet_mappings: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]],
|
|
6459
|
-
vpc_id: builtins.str,
|
|
6460
|
-
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6461
|
-
description: typing.Optional[builtins.str] = None,
|
|
6462
|
-
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6463
|
-
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6464
|
-
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6465
|
-
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6466
|
-
) -> None:
|
|
6467
|
-
"""Type checking stubs"""
|
|
6468
|
-
pass
|
|
6885
|
+
You can retrieve the list of Availability Zones that are available for use by calling ``DescribeFirewallMetadata`` .
|
|
6469
6886
|
|
|
6470
|
-
|
|
6471
|
-
inspector: _TreeInspector_488e0dd5,
|
|
6472
|
-
) -> None:
|
|
6473
|
-
"""Type checking stubs"""
|
|
6474
|
-
pass
|
|
6887
|
+
To manage firewall endpoints, first, in the ``Firewall`` specification, you specify a single VPC and one subnet for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as VPC endpoint associations.
|
|
6475
6888
|
|
|
6476
|
-
|
|
6477
|
-
props: typing.Mapping[builtins.str, typing.Any],
|
|
6478
|
-
) -> None:
|
|
6479
|
-
"""Type checking stubs"""
|
|
6480
|
-
pass
|
|
6889
|
+
You can use VPC endpoint associations to expand the protections of the firewall as follows:
|
|
6481
6890
|
|
|
6482
|
-
|
|
6483
|
-
|
|
6484
|
-
) -> None:
|
|
6485
|
-
"""Type checking stubs"""
|
|
6486
|
-
pass
|
|
6891
|
+
- *Protect multiple VPCs with a single firewall* - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the ``Firewall`` subnet mappings.
|
|
6892
|
+
- *Define multiple firewall endpoints for a VPC in an Availability Zone* - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the ``Firewall`` subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.
|
|
6487
6893
|
|
|
6488
|
-
|
|
6489
|
-
value: builtins.str,
|
|
6490
|
-
) -> None:
|
|
6491
|
-
"""Type checking stubs"""
|
|
6492
|
-
pass
|
|
6894
|
+
You can use AWS Resource Access Manager to share a ``Firewall`` that you own with other accounts, which gives them the ability to use the firewall to create VPC endpoint associations. For information about sharing a firewall, see ``PutResourcePolicy`` in this guide and see `Sharing Network Firewall resources <https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html>`_ in the *AWS Network Firewall Developer Guide* .
|
|
6493
6895
|
|
|
6494
|
-
|
|
6495
|
-
value: typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]],
|
|
6496
|
-
) -> None:
|
|
6497
|
-
"""Type checking stubs"""
|
|
6498
|
-
pass
|
|
6896
|
+
The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic, is provided in the corresponding VPC endpoint association status. You can retrieve both the association and its status by calling ``DescribeVpcEndpointAssociation`` .
|
|
6499
6897
|
|
|
6500
|
-
|
|
6501
|
-
|
|
6502
|
-
|
|
6503
|
-
"""Type checking stubs"""
|
|
6504
|
-
pass
|
|
6898
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
|
|
6899
|
+
:cloudformationResource: AWS::NetworkFirewall::VpcEndpointAssociation
|
|
6900
|
+
:exampleMetadata: fixture=_generated
|
|
6505
6901
|
|
|
6506
|
-
|
|
6507
|
-
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
6508
|
-
) -> None:
|
|
6509
|
-
"""Type checking stubs"""
|
|
6510
|
-
pass
|
|
6902
|
+
Example::
|
|
6511
6903
|
|
|
6512
|
-
|
|
6513
|
-
|
|
6514
|
-
|
|
6515
|
-
|
|
6516
|
-
|
|
6904
|
+
# The code below shows an example of how to instantiate this type.
|
|
6905
|
+
# The values are placeholders you should change.
|
|
6906
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
6907
|
+
|
|
6908
|
+
cfn_vpc_endpoint_association = networkfirewall.CfnVpcEndpointAssociation(self, "MyCfnVpcEndpointAssociation",
|
|
6909
|
+
firewall_arn="firewallArn",
|
|
6910
|
+
subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
6911
|
+
subnet_id="subnetId",
|
|
6912
|
+
|
|
6913
|
+
# the properties below are optional
|
|
6914
|
+
ip_address_type="ipAddressType"
|
|
6915
|
+
),
|
|
6916
|
+
vpc_id="vpcId",
|
|
6917
|
+
|
|
6918
|
+
# the properties below are optional
|
|
6919
|
+
description="description",
|
|
6920
|
+
tags=[CfnTag(
|
|
6921
|
+
key="key",
|
|
6922
|
+
value="value"
|
|
6923
|
+
)]
|
|
6924
|
+
)
|
|
6925
|
+
'''
|
|
6517
6926
|
|
|
6518
|
-
def
|
|
6519
|
-
|
|
6520
|
-
|
|
6521
|
-
|
|
6522
|
-
|
|
6927
|
+
def __init__(
|
|
6928
|
+
self,
|
|
6929
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
6930
|
+
id: builtins.str,
|
|
6931
|
+
*,
|
|
6932
|
+
firewall_arn: builtins.str,
|
|
6933
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union["CfnVpcEndpointAssociation.SubnetMappingProperty", typing.Dict[builtins.str, typing.Any]]],
|
|
6934
|
+
vpc_id: builtins.str,
|
|
6935
|
+
description: typing.Optional[builtins.str] = None,
|
|
6936
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6937
|
+
) -> None:
|
|
6938
|
+
'''Create a new ``AWS::NetworkFirewall::VpcEndpointAssociation``.
|
|
6523
6939
|
|
|
6524
|
-
|
|
6525
|
-
|
|
6526
|
-
)
|
|
6527
|
-
|
|
6528
|
-
|
|
6940
|
+
:param scope: Scope in which this resource is defined.
|
|
6941
|
+
:param id: Construct identifier for this resource (unique in its scope).
|
|
6942
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
|
|
6943
|
+
:param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
6944
|
+
:param vpc_id: The unique identifier of the VPC for the endpoint association.
|
|
6945
|
+
:param description: A description of the VPC endpoint association.
|
|
6946
|
+
:param tags: The key:value pairs to associate with the resource.
|
|
6947
|
+
'''
|
|
6948
|
+
if __debug__:
|
|
6949
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3)
|
|
6950
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
6951
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
6952
|
+
props = CfnVpcEndpointAssociationProps(
|
|
6953
|
+
firewall_arn=firewall_arn,
|
|
6954
|
+
subnet_mapping=subnet_mapping,
|
|
6955
|
+
vpc_id=vpc_id,
|
|
6956
|
+
description=description,
|
|
6957
|
+
tags=tags,
|
|
6958
|
+
)
|
|
6529
6959
|
|
|
6530
|
-
|
|
6531
|
-
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
6532
|
-
) -> None:
|
|
6533
|
-
"""Type checking stubs"""
|
|
6534
|
-
pass
|
|
6960
|
+
jsii.create(self.__class__, self, [scope, id, props])
|
|
6535
6961
|
|
|
6536
|
-
|
|
6537
|
-
|
|
6538
|
-
|
|
6539
|
-
"""Type checking stubs"""
|
|
6540
|
-
pass
|
|
6962
|
+
@jsii.member(jsii_name="inspect")
|
|
6963
|
+
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
6964
|
+
'''Examines the CloudFormation resource and discloses attributes.
|
|
6541
6965
|
|
|
6542
|
-
|
|
6543
|
-
|
|
6544
|
-
|
|
6545
|
-
|
|
6546
|
-
|
|
6547
|
-
|
|
6548
|
-
pass
|
|
6966
|
+
:param inspector: tree inspector to collect and process attributes.
|
|
6967
|
+
'''
|
|
6968
|
+
if __debug__:
|
|
6969
|
+
type_hints = typing.get_type_hints(_typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac)
|
|
6970
|
+
check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
|
|
6971
|
+
return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
|
|
6549
6972
|
|
|
6550
|
-
|
|
6551
|
-
|
|
6552
|
-
|
|
6553
|
-
|
|
6554
|
-
|
|
6555
|
-
|
|
6556
|
-
|
|
6557
|
-
|
|
6558
|
-
|
|
6559
|
-
|
|
6560
|
-
|
|
6973
|
+
@jsii.member(jsii_name="renderProperties")
|
|
6974
|
+
def _render_properties(
|
|
6975
|
+
self,
|
|
6976
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
6977
|
+
) -> typing.Mapping[builtins.str, typing.Any]:
|
|
6978
|
+
'''
|
|
6979
|
+
:param props: -
|
|
6980
|
+
'''
|
|
6981
|
+
if __debug__:
|
|
6982
|
+
type_hints = typing.get_type_hints(_typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036)
|
|
6983
|
+
check_type(argname="argument props", value=props, expected_type=type_hints["props"])
|
|
6984
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
|
|
6561
6985
|
|
|
6562
|
-
|
|
6563
|
-
|
|
6564
|
-
) ->
|
|
6565
|
-
|
|
6566
|
-
|
|
6986
|
+
@jsii.python.classproperty
|
|
6987
|
+
@jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
|
|
6988
|
+
def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
|
|
6989
|
+
'''The CloudFormation resource type name for this resource class.'''
|
|
6990
|
+
return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
|
|
6567
6991
|
|
|
6568
|
-
|
|
6569
|
-
|
|
6570
|
-
) ->
|
|
6992
|
+
@builtins.property
|
|
6993
|
+
@jsii.member(jsii_name="attrEndpointId")
|
|
6994
|
+
def attr_endpoint_id(self) -> builtins.str:
|
|
6995
|
+
'''The unique ID of the firewall endpoint for the subnet that you attached to the firewall.For example: "vpce-111122223333".
|
|
6996
|
+
|
|
6997
|
+
:cloudformationAttribute: EndpointId
|
|
6998
|
+
'''
|
|
6999
|
+
return typing.cast(builtins.str, jsii.get(self, "attrEndpointId"))
|
|
7000
|
+
|
|
7001
|
+
@builtins.property
|
|
7002
|
+
@jsii.member(jsii_name="attrVpcEndpointAssociationArn")
|
|
7003
|
+
def attr_vpc_endpoint_association_arn(self) -> builtins.str:
|
|
7004
|
+
'''The Amazon Resource Name (ARN) of a VPC endpoint association.
|
|
7005
|
+
|
|
7006
|
+
:cloudformationAttribute: VpcEndpointAssociationArn
|
|
7007
|
+
'''
|
|
7008
|
+
return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationArn"))
|
|
7009
|
+
|
|
7010
|
+
@builtins.property
|
|
7011
|
+
@jsii.member(jsii_name="attrVpcEndpointAssociationId")
|
|
7012
|
+
def attr_vpc_endpoint_association_id(self) -> builtins.str:
|
|
7013
|
+
'''The unique identifier of the VPC endpoint association.
|
|
7014
|
+
|
|
7015
|
+
:cloudformationAttribute: VpcEndpointAssociationId
|
|
7016
|
+
'''
|
|
7017
|
+
return typing.cast(builtins.str, jsii.get(self, "attrVpcEndpointAssociationId"))
|
|
7018
|
+
|
|
7019
|
+
@builtins.property
|
|
7020
|
+
@jsii.member(jsii_name="cdkTagManager")
|
|
7021
|
+
def cdk_tag_manager(self) -> _TagManager_0a598cb3:
|
|
7022
|
+
'''Tag Manager which manages the tags for this resource.'''
|
|
7023
|
+
return typing.cast(_TagManager_0a598cb3, jsii.get(self, "cdkTagManager"))
|
|
7024
|
+
|
|
7025
|
+
@builtins.property
|
|
7026
|
+
@jsii.member(jsii_name="cfnProperties")
|
|
7027
|
+
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
7028
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
7029
|
+
|
|
7030
|
+
@builtins.property
|
|
7031
|
+
@jsii.member(jsii_name="vpcEndpointAssociationRef")
|
|
7032
|
+
def vpc_endpoint_association_ref(self) -> _VpcEndpointAssociationReference_d627bc37:
|
|
7033
|
+
'''A reference to a VpcEndpointAssociation resource.'''
|
|
7034
|
+
return typing.cast(_VpcEndpointAssociationReference_d627bc37, jsii.get(self, "vpcEndpointAssociationRef"))
|
|
7035
|
+
|
|
7036
|
+
@builtins.property
|
|
7037
|
+
@jsii.member(jsii_name="firewallArn")
|
|
7038
|
+
def firewall_arn(self) -> builtins.str:
|
|
7039
|
+
'''The Amazon Resource Name (ARN) of the firewall.'''
|
|
7040
|
+
return typing.cast(builtins.str, jsii.get(self, "firewallArn"))
|
|
7041
|
+
|
|
7042
|
+
@firewall_arn.setter
|
|
7043
|
+
def firewall_arn(self, value: builtins.str) -> None:
|
|
7044
|
+
if __debug__:
|
|
7045
|
+
type_hints = typing.get_type_hints(_typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3)
|
|
7046
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7047
|
+
jsii.set(self, "firewallArn", value) # pyright: ignore[reportArgumentType]
|
|
7048
|
+
|
|
7049
|
+
@builtins.property
|
|
7050
|
+
@jsii.member(jsii_name="subnetMapping")
|
|
7051
|
+
def subnet_mapping(
|
|
7052
|
+
self,
|
|
7053
|
+
) -> typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"]:
|
|
7054
|
+
'''The ID for a subnet that's used in an association with a firewall.'''
|
|
7055
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"], jsii.get(self, "subnetMapping"))
|
|
7056
|
+
|
|
7057
|
+
@subnet_mapping.setter
|
|
7058
|
+
def subnet_mapping(
|
|
7059
|
+
self,
|
|
7060
|
+
value: typing.Union[_IResolvable_da3f097b, "CfnVpcEndpointAssociation.SubnetMappingProperty"],
|
|
7061
|
+
) -> None:
|
|
7062
|
+
if __debug__:
|
|
7063
|
+
type_hints = typing.get_type_hints(_typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593)
|
|
7064
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7065
|
+
jsii.set(self, "subnetMapping", value) # pyright: ignore[reportArgumentType]
|
|
7066
|
+
|
|
7067
|
+
@builtins.property
|
|
7068
|
+
@jsii.member(jsii_name="vpcId")
|
|
7069
|
+
def vpc_id(self) -> builtins.str:
|
|
7070
|
+
'''The unique identifier of the VPC for the endpoint association.'''
|
|
7071
|
+
return typing.cast(builtins.str, jsii.get(self, "vpcId"))
|
|
7072
|
+
|
|
7073
|
+
@vpc_id.setter
|
|
7074
|
+
def vpc_id(self, value: builtins.str) -> None:
|
|
7075
|
+
if __debug__:
|
|
7076
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767)
|
|
7077
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7078
|
+
jsii.set(self, "vpcId", value) # pyright: ignore[reportArgumentType]
|
|
7079
|
+
|
|
7080
|
+
@builtins.property
|
|
7081
|
+
@jsii.member(jsii_name="description")
|
|
7082
|
+
def description(self) -> typing.Optional[builtins.str]:
|
|
7083
|
+
'''A description of the VPC endpoint association.'''
|
|
7084
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "description"))
|
|
7085
|
+
|
|
7086
|
+
@description.setter
|
|
7087
|
+
def description(self, value: typing.Optional[builtins.str]) -> None:
|
|
7088
|
+
if __debug__:
|
|
7089
|
+
type_hints = typing.get_type_hints(_typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80)
|
|
7090
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7091
|
+
jsii.set(self, "description", value) # pyright: ignore[reportArgumentType]
|
|
7092
|
+
|
|
7093
|
+
@builtins.property
|
|
7094
|
+
@jsii.member(jsii_name="tags")
|
|
7095
|
+
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
7096
|
+
'''The key:value pairs to associate with the resource.'''
|
|
7097
|
+
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
|
|
7098
|
+
|
|
7099
|
+
@tags.setter
|
|
7100
|
+
def tags(self, value: typing.Optional[typing.List[_CfnTag_f6864754]]) -> None:
|
|
7101
|
+
if __debug__:
|
|
7102
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2)
|
|
7103
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
7104
|
+
jsii.set(self, "tags", value) # pyright: ignore[reportArgumentType]
|
|
7105
|
+
|
|
7106
|
+
@jsii.data_type(
|
|
7107
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty",
|
|
7108
|
+
jsii_struct_bases=[],
|
|
7109
|
+
name_mapping={"subnet_id": "subnetId", "ip_address_type": "ipAddressType"},
|
|
7110
|
+
)
|
|
7111
|
+
class SubnetMappingProperty:
|
|
7112
|
+
def __init__(
|
|
7113
|
+
self,
|
|
7114
|
+
*,
|
|
7115
|
+
subnet_id: builtins.str,
|
|
7116
|
+
ip_address_type: typing.Optional[builtins.str] = None,
|
|
7117
|
+
) -> None:
|
|
7118
|
+
'''The ID for a subnet that's used in an association with a firewall.
|
|
7119
|
+
|
|
7120
|
+
This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7121
|
+
|
|
7122
|
+
:param subnet_id: The unique identifier for the subnet.
|
|
7123
|
+
:param ip_address_type: The subnet's IP address type. You can't change the IP address type after you create the subnet.
|
|
7124
|
+
|
|
7125
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html
|
|
7126
|
+
:exampleMetadata: fixture=_generated
|
|
7127
|
+
|
|
7128
|
+
Example::
|
|
7129
|
+
|
|
7130
|
+
# The code below shows an example of how to instantiate this type.
|
|
7131
|
+
# The values are placeholders you should change.
|
|
7132
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
7133
|
+
|
|
7134
|
+
subnet_mapping_property = networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
7135
|
+
subnet_id="subnetId",
|
|
7136
|
+
|
|
7137
|
+
# the properties below are optional
|
|
7138
|
+
ip_address_type="ipAddressType"
|
|
7139
|
+
)
|
|
7140
|
+
'''
|
|
7141
|
+
if __debug__:
|
|
7142
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015)
|
|
7143
|
+
check_type(argname="argument subnet_id", value=subnet_id, expected_type=type_hints["subnet_id"])
|
|
7144
|
+
check_type(argname="argument ip_address_type", value=ip_address_type, expected_type=type_hints["ip_address_type"])
|
|
7145
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
7146
|
+
"subnet_id": subnet_id,
|
|
7147
|
+
}
|
|
7148
|
+
if ip_address_type is not None:
|
|
7149
|
+
self._values["ip_address_type"] = ip_address_type
|
|
7150
|
+
|
|
7151
|
+
@builtins.property
|
|
7152
|
+
def subnet_id(self) -> builtins.str:
|
|
7153
|
+
'''The unique identifier for the subnet.
|
|
7154
|
+
|
|
7155
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-subnetid
|
|
7156
|
+
'''
|
|
7157
|
+
result = self._values.get("subnet_id")
|
|
7158
|
+
assert result is not None, "Required property 'subnet_id' is missing"
|
|
7159
|
+
return typing.cast(builtins.str, result)
|
|
7160
|
+
|
|
7161
|
+
@builtins.property
|
|
7162
|
+
def ip_address_type(self) -> typing.Optional[builtins.str]:
|
|
7163
|
+
'''The subnet's IP address type.
|
|
7164
|
+
|
|
7165
|
+
You can't change the IP address type after you create the subnet.
|
|
7166
|
+
|
|
7167
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-vpcendpointassociation-subnetmapping.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping-ipaddresstype
|
|
7168
|
+
'''
|
|
7169
|
+
result = self._values.get("ip_address_type")
|
|
7170
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
7171
|
+
|
|
7172
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
7173
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
7174
|
+
|
|
7175
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
7176
|
+
return not (rhs == self)
|
|
7177
|
+
|
|
7178
|
+
def __repr__(self) -> str:
|
|
7179
|
+
return "SubnetMappingProperty(%s)" % ", ".join(
|
|
7180
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
7181
|
+
)
|
|
7182
|
+
|
|
7183
|
+
|
|
7184
|
+
@jsii.data_type(
|
|
7185
|
+
jsii_type="aws-cdk-lib.aws_networkfirewall.CfnVpcEndpointAssociationProps",
|
|
7186
|
+
jsii_struct_bases=[],
|
|
7187
|
+
name_mapping={
|
|
7188
|
+
"firewall_arn": "firewallArn",
|
|
7189
|
+
"subnet_mapping": "subnetMapping",
|
|
7190
|
+
"vpc_id": "vpcId",
|
|
7191
|
+
"description": "description",
|
|
7192
|
+
"tags": "tags",
|
|
7193
|
+
},
|
|
7194
|
+
)
|
|
7195
|
+
class CfnVpcEndpointAssociationProps:
|
|
7196
|
+
def __init__(
|
|
7197
|
+
self,
|
|
7198
|
+
*,
|
|
7199
|
+
firewall_arn: builtins.str,
|
|
7200
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7201
|
+
vpc_id: builtins.str,
|
|
7202
|
+
description: typing.Optional[builtins.str] = None,
|
|
7203
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7204
|
+
) -> None:
|
|
7205
|
+
'''Properties for defining a ``CfnVpcEndpointAssociation``.
|
|
7206
|
+
|
|
7207
|
+
:param firewall_arn: The Amazon Resource Name (ARN) of the firewall.
|
|
7208
|
+
:param subnet_mapping: The ID for a subnet that's used in an association with a firewall. This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7209
|
+
:param vpc_id: The unique identifier of the VPC for the endpoint association.
|
|
7210
|
+
:param description: A description of the VPC endpoint association.
|
|
7211
|
+
:param tags: The key:value pairs to associate with the resource.
|
|
7212
|
+
|
|
7213
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html
|
|
7214
|
+
:exampleMetadata: fixture=_generated
|
|
7215
|
+
|
|
7216
|
+
Example::
|
|
7217
|
+
|
|
7218
|
+
# The code below shows an example of how to instantiate this type.
|
|
7219
|
+
# The values are placeholders you should change.
|
|
7220
|
+
from aws_cdk import aws_networkfirewall as networkfirewall
|
|
7221
|
+
|
|
7222
|
+
cfn_vpc_endpoint_association_props = networkfirewall.CfnVpcEndpointAssociationProps(
|
|
7223
|
+
firewall_arn="firewallArn",
|
|
7224
|
+
subnet_mapping=networkfirewall.CfnVpcEndpointAssociation.SubnetMappingProperty(
|
|
7225
|
+
subnet_id="subnetId",
|
|
7226
|
+
|
|
7227
|
+
# the properties below are optional
|
|
7228
|
+
ip_address_type="ipAddressType"
|
|
7229
|
+
),
|
|
7230
|
+
vpc_id="vpcId",
|
|
7231
|
+
|
|
7232
|
+
# the properties below are optional
|
|
7233
|
+
description="description",
|
|
7234
|
+
tags=[CfnTag(
|
|
7235
|
+
key="key",
|
|
7236
|
+
value="value"
|
|
7237
|
+
)]
|
|
7238
|
+
)
|
|
7239
|
+
'''
|
|
7240
|
+
if __debug__:
|
|
7241
|
+
type_hints = typing.get_type_hints(_typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76)
|
|
7242
|
+
check_type(argname="argument firewall_arn", value=firewall_arn, expected_type=type_hints["firewall_arn"])
|
|
7243
|
+
check_type(argname="argument subnet_mapping", value=subnet_mapping, expected_type=type_hints["subnet_mapping"])
|
|
7244
|
+
check_type(argname="argument vpc_id", value=vpc_id, expected_type=type_hints["vpc_id"])
|
|
7245
|
+
check_type(argname="argument description", value=description, expected_type=type_hints["description"])
|
|
7246
|
+
check_type(argname="argument tags", value=tags, expected_type=type_hints["tags"])
|
|
7247
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
7248
|
+
"firewall_arn": firewall_arn,
|
|
7249
|
+
"subnet_mapping": subnet_mapping,
|
|
7250
|
+
"vpc_id": vpc_id,
|
|
7251
|
+
}
|
|
7252
|
+
if description is not None:
|
|
7253
|
+
self._values["description"] = description
|
|
7254
|
+
if tags is not None:
|
|
7255
|
+
self._values["tags"] = tags
|
|
7256
|
+
|
|
7257
|
+
@builtins.property
|
|
7258
|
+
def firewall_arn(self) -> builtins.str:
|
|
7259
|
+
'''The Amazon Resource Name (ARN) of the firewall.
|
|
7260
|
+
|
|
7261
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-firewallarn
|
|
7262
|
+
'''
|
|
7263
|
+
result = self._values.get("firewall_arn")
|
|
7264
|
+
assert result is not None, "Required property 'firewall_arn' is missing"
|
|
7265
|
+
return typing.cast(builtins.str, result)
|
|
7266
|
+
|
|
7267
|
+
@builtins.property
|
|
7268
|
+
def subnet_mapping(
|
|
7269
|
+
self,
|
|
7270
|
+
) -> typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty]:
|
|
7271
|
+
'''The ID for a subnet that's used in an association with a firewall.
|
|
7272
|
+
|
|
7273
|
+
This is used in ``CreateFirewall`` , ``AssociateSubnets`` , and ``CreateVpcEndpointAssociation`` . AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
|
|
7274
|
+
|
|
7275
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-subnetmapping
|
|
7276
|
+
'''
|
|
7277
|
+
result = self._values.get("subnet_mapping")
|
|
7278
|
+
assert result is not None, "Required property 'subnet_mapping' is missing"
|
|
7279
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty], result)
|
|
7280
|
+
|
|
7281
|
+
@builtins.property
|
|
7282
|
+
def vpc_id(self) -> builtins.str:
|
|
7283
|
+
'''The unique identifier of the VPC for the endpoint association.
|
|
7284
|
+
|
|
7285
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-vpcid
|
|
7286
|
+
'''
|
|
7287
|
+
result = self._values.get("vpc_id")
|
|
7288
|
+
assert result is not None, "Required property 'vpc_id' is missing"
|
|
7289
|
+
return typing.cast(builtins.str, result)
|
|
7290
|
+
|
|
7291
|
+
@builtins.property
|
|
7292
|
+
def description(self) -> typing.Optional[builtins.str]:
|
|
7293
|
+
'''A description of the VPC endpoint association.
|
|
7294
|
+
|
|
7295
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-description
|
|
7296
|
+
'''
|
|
7297
|
+
result = self._values.get("description")
|
|
7298
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
7299
|
+
|
|
7300
|
+
@builtins.property
|
|
7301
|
+
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
7302
|
+
'''The key:value pairs to associate with the resource.
|
|
7303
|
+
|
|
7304
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-networkfirewall-vpcendpointassociation.html#cfn-networkfirewall-vpcendpointassociation-tags
|
|
7305
|
+
'''
|
|
7306
|
+
result = self._values.get("tags")
|
|
7307
|
+
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], result)
|
|
7308
|
+
|
|
7309
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
7310
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
7311
|
+
|
|
7312
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
7313
|
+
return not (rhs == self)
|
|
7314
|
+
|
|
7315
|
+
def __repr__(self) -> str:
|
|
7316
|
+
return "CfnVpcEndpointAssociationProps(%s)" % ", ".join(
|
|
7317
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
7318
|
+
)
|
|
7319
|
+
|
|
7320
|
+
|
|
7321
|
+
__all__ = [
|
|
7322
|
+
"CfnFirewall",
|
|
7323
|
+
"CfnFirewallPolicy",
|
|
7324
|
+
"CfnFirewallPolicyProps",
|
|
7325
|
+
"CfnFirewallProps",
|
|
7326
|
+
"CfnLoggingConfiguration",
|
|
7327
|
+
"CfnLoggingConfigurationProps",
|
|
7328
|
+
"CfnRuleGroup",
|
|
7329
|
+
"CfnRuleGroupProps",
|
|
7330
|
+
"CfnTLSInspectionConfiguration",
|
|
7331
|
+
"CfnTLSInspectionConfigurationProps",
|
|
7332
|
+
"CfnVpcEndpointAssociation",
|
|
7333
|
+
"CfnVpcEndpointAssociationProps",
|
|
7334
|
+
]
|
|
7335
|
+
|
|
7336
|
+
publication.publish()
|
|
7337
|
+
|
|
7338
|
+
def _typecheckingstub__8735e4ce7e79159823190ad059af802b7721b71930c6b4b8805c4676b38d4d56(
|
|
7339
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
7340
|
+
id: builtins.str,
|
|
7341
|
+
*,
|
|
7342
|
+
firewall_name: builtins.str,
|
|
7343
|
+
firewall_policy_arn: builtins.str,
|
|
7344
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7345
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
7346
|
+
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7347
|
+
description: typing.Optional[builtins.str] = None,
|
|
7348
|
+
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
7349
|
+
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7350
|
+
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7351
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
7352
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7353
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
7354
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
7355
|
+
) -> None:
|
|
7356
|
+
"""Type checking stubs"""
|
|
7357
|
+
pass
|
|
7358
|
+
|
|
7359
|
+
def _typecheckingstub__c7c4e2793da1cf8bea450c2122d2557d378fad5e129ebb26f114a36cfc6506a2(
|
|
7360
|
+
inspector: _TreeInspector_488e0dd5,
|
|
7361
|
+
) -> None:
|
|
7362
|
+
"""Type checking stubs"""
|
|
7363
|
+
pass
|
|
7364
|
+
|
|
7365
|
+
def _typecheckingstub__46677a58d997dd59fd033c9a9ee94e3689cafff9e028d3e2d162ddfeee718547(
|
|
7366
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
7367
|
+
) -> None:
|
|
7368
|
+
"""Type checking stubs"""
|
|
7369
|
+
pass
|
|
7370
|
+
|
|
7371
|
+
def _typecheckingstub__fdb28f607bba18f9f1db46f554b41c7ddfaaf01fe3c74c5f99726bd72458a115(
|
|
7372
|
+
value: builtins.str,
|
|
7373
|
+
) -> None:
|
|
7374
|
+
"""Type checking stubs"""
|
|
7375
|
+
pass
|
|
7376
|
+
|
|
7377
|
+
def _typecheckingstub__c711ef7af7567ab69b12f083b26c4033f7cdf1593bf27227f989d7c73e8c9fc2(
|
|
7378
|
+
value: builtins.str,
|
|
7379
|
+
) -> None:
|
|
7380
|
+
"""Type checking stubs"""
|
|
7381
|
+
pass
|
|
7382
|
+
|
|
7383
|
+
def _typecheckingstub__9264301e2259874347a035c96f8c2b41c3eace108b10ab012df466442d7477f1(
|
|
7384
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7385
|
+
) -> None:
|
|
7386
|
+
"""Type checking stubs"""
|
|
7387
|
+
pass
|
|
7388
|
+
|
|
7389
|
+
def _typecheckingstub__cf571f7b78cee2a31a1b36a9ada83e153f52c7a14fea3f65c9362d1d4634dd77(
|
|
7390
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.AvailabilityZoneMappingProperty]]]],
|
|
7391
|
+
) -> None:
|
|
7392
|
+
"""Type checking stubs"""
|
|
7393
|
+
pass
|
|
7394
|
+
|
|
7395
|
+
def _typecheckingstub__12d69795554b50f9f4f46a0470d9cf06e4d826d030dcab9f0adfc3a3d566c8b3(
|
|
7396
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7397
|
+
) -> None:
|
|
7398
|
+
"""Type checking stubs"""
|
|
7399
|
+
pass
|
|
7400
|
+
|
|
7401
|
+
def _typecheckingstub__fea0349bbbe56acfbf8d2e11ce10cdd2221eb418df0a6df3602174f8015ca4f6(
|
|
7402
|
+
value: typing.Optional[builtins.str],
|
|
7403
|
+
) -> None:
|
|
7404
|
+
"""Type checking stubs"""
|
|
7405
|
+
pass
|
|
7406
|
+
|
|
7407
|
+
def _typecheckingstub__dfc5ed44d930f34c8aab89f35a98f79157366d4a6307eb58bfc63ed737000a53(
|
|
7408
|
+
value: typing.Optional[typing.List[builtins.str]],
|
|
7409
|
+
) -> None:
|
|
7410
|
+
"""Type checking stubs"""
|
|
7411
|
+
pass
|
|
7412
|
+
|
|
7413
|
+
def _typecheckingstub__ee50239d13ab311a798770d372dccb418872f67c3e07c873f5d87e11df129a35(
|
|
7414
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7415
|
+
) -> None:
|
|
7416
|
+
"""Type checking stubs"""
|
|
7417
|
+
pass
|
|
7418
|
+
|
|
7419
|
+
def _typecheckingstub__3edeae6cf81be7cb1d87c21080d7c060fb1fdbd872b4292af576701d514ade47(
|
|
7420
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7421
|
+
) -> None:
|
|
7422
|
+
"""Type checking stubs"""
|
|
7423
|
+
pass
|
|
7424
|
+
|
|
7425
|
+
def _typecheckingstub__0f2f1e41c3294b6f9ed43f3936b8feb28ed4bd73021f059aae4743db717241ab(
|
|
7426
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnFirewall.SubnetMappingProperty]]]],
|
|
7427
|
+
) -> None:
|
|
7428
|
+
"""Type checking stubs"""
|
|
7429
|
+
pass
|
|
7430
|
+
|
|
7431
|
+
def _typecheckingstub__e1b2b141c4b9a04d63365f9d8a2a5636d417c4a087ebfbfd40be7336d4d258da(
|
|
7432
|
+
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
7433
|
+
) -> None:
|
|
7434
|
+
"""Type checking stubs"""
|
|
7435
|
+
pass
|
|
7436
|
+
|
|
7437
|
+
def _typecheckingstub__ebf25e7b4ccdda1a25794e9d426e24b28f37c786df4576a4b499042b55c26bc6(
|
|
7438
|
+
value: typing.Optional[builtins.str],
|
|
7439
|
+
) -> None:
|
|
7440
|
+
"""Type checking stubs"""
|
|
7441
|
+
pass
|
|
7442
|
+
|
|
7443
|
+
def _typecheckingstub__ba092b3d0c9ca8819ad31fd4320cebdee3150a45603af80de70f2c0bbb9e04b5(
|
|
7444
|
+
value: typing.Optional[builtins.str],
|
|
7445
|
+
) -> None:
|
|
7446
|
+
"""Type checking stubs"""
|
|
7447
|
+
pass
|
|
7448
|
+
|
|
7449
|
+
def _typecheckingstub__e12d4b074bc6fa59b990e1d43ef30390330da9da999dbf3bac9bf5e98eb30caf(
|
|
7450
|
+
*,
|
|
7451
|
+
availability_zone: builtins.str,
|
|
7452
|
+
) -> None:
|
|
7453
|
+
"""Type checking stubs"""
|
|
7454
|
+
pass
|
|
7455
|
+
|
|
7456
|
+
def _typecheckingstub__cf86d50b8eec902ee512afbe0dfd3b1ee2bc8f0b9f4fb9acb4ac637ae3662fc0(
|
|
7457
|
+
*,
|
|
7458
|
+
subnet_id: builtins.str,
|
|
7459
|
+
ip_address_type: typing.Optional[builtins.str] = None,
|
|
7460
|
+
) -> None:
|
|
7461
|
+
"""Type checking stubs"""
|
|
7462
|
+
pass
|
|
7463
|
+
|
|
7464
|
+
def _typecheckingstub__d88babb6ad6946bc506d4761908231f5bd58eca8a4b6bc16dfccccad329a61ca(
|
|
7465
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
7466
|
+
id: builtins.str,
|
|
7467
|
+
*,
|
|
7468
|
+
firewall_policy: typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.FirewallPolicyProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7469
|
+
firewall_policy_name: builtins.str,
|
|
7470
|
+
description: typing.Optional[builtins.str] = None,
|
|
7471
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7472
|
+
) -> None:
|
|
7473
|
+
"""Type checking stubs"""
|
|
7474
|
+
pass
|
|
7475
|
+
|
|
7476
|
+
def _typecheckingstub__6d5c5132a5b6e646e64fbde7a0f144884b26ad6646fb61ce294ea7f055ebdea9(
|
|
7477
|
+
inspector: _TreeInspector_488e0dd5,
|
|
7478
|
+
) -> None:
|
|
7479
|
+
"""Type checking stubs"""
|
|
7480
|
+
pass
|
|
7481
|
+
|
|
7482
|
+
def _typecheckingstub__56698f8e6b1c138a730626856a3d169be448aa17fd1614293c276d6b465f45a2(
|
|
7483
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
7484
|
+
) -> None:
|
|
6571
7485
|
"""Type checking stubs"""
|
|
6572
7486
|
pass
|
|
6573
7487
|
|
|
@@ -6621,6 +7535,7 @@ def _typecheckingstub__1b6a6014864b81482e4c4a383921c58673d84e8e882dc4fb7cea71a2d
|
|
|
6621
7535
|
*,
|
|
6622
7536
|
stateless_default_actions: typing.Sequence[builtins.str],
|
|
6623
7537
|
stateless_fragment_default_actions: typing.Sequence[builtins.str],
|
|
7538
|
+
enable_tls_session_holding: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6624
7539
|
policy_variables: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.PolicyVariablesProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6625
7540
|
stateful_default_actions: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6626
7541
|
stateful_engine_options: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulEngineOptionsProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -6679,6 +7594,7 @@ def _typecheckingstub__62be7baa7c0ae22655f34e1d3316236c114457fe368caf2a958ba1fd9
|
|
|
6679
7594
|
def _typecheckingstub__b35f780a3045f4df1ecbf5bb69deb711659429dcfd9f87d388080942e7b17ef8(
|
|
6680
7595
|
*,
|
|
6681
7596
|
resource_arn: builtins.str,
|
|
7597
|
+
deep_threat_inspection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6682
7598
|
override: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewallPolicy.StatefulRuleGroupOverrideProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6683
7599
|
priority: typing.Optional[jsii.Number] = None,
|
|
6684
7600
|
) -> None:
|
|
@@ -6707,14 +7623,17 @@ def _typecheckingstub__8d4108d5c35b1608da0d36c8bb60f52501d3b0634ca4324342a71c57b
|
|
|
6707
7623
|
*,
|
|
6708
7624
|
firewall_name: builtins.str,
|
|
6709
7625
|
firewall_policy_arn: builtins.str,
|
|
6710
|
-
|
|
6711
|
-
|
|
7626
|
+
availability_zone_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7627
|
+
availability_zone_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.AvailabilityZoneMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6712
7628
|
delete_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6713
7629
|
description: typing.Optional[builtins.str] = None,
|
|
6714
7630
|
enabled_analysis_types: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6715
7631
|
firewall_policy_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6716
7632
|
subnet_change_protection: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
7633
|
+
subnet_mappings: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union[CfnFirewall.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]]]]] = None,
|
|
6717
7634
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7635
|
+
transit_gateway_id: typing.Optional[builtins.str] = None,
|
|
7636
|
+
vpc_id: typing.Optional[builtins.str] = None,
|
|
6718
7637
|
) -> None:
|
|
6719
7638
|
"""Type checking stubs"""
|
|
6720
7639
|
pass
|
|
@@ -6725,6 +7644,7 @@ def _typecheckingstub__71487a7865ce1877156cecd1cb83afa7ffd5f6428fa2611a7537c9ccf
|
|
|
6725
7644
|
*,
|
|
6726
7645
|
firewall_arn: builtins.str,
|
|
6727
7646
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7647
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6728
7648
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
6729
7649
|
) -> None:
|
|
6730
7650
|
"""Type checking stubs"""
|
|
@@ -6754,6 +7674,12 @@ def _typecheckingstub__6379a583f20adcddf04ea938455ca9e96ed6e0a2293ffa4b839685154
|
|
|
6754
7674
|
"""Type checking stubs"""
|
|
6755
7675
|
pass
|
|
6756
7676
|
|
|
7677
|
+
def _typecheckingstub__cd9d520dc417896b42fea56a33166ad81596a611f62bb71b7dca2be701c49cbe(
|
|
7678
|
+
value: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]],
|
|
7679
|
+
) -> None:
|
|
7680
|
+
"""Type checking stubs"""
|
|
7681
|
+
pass
|
|
7682
|
+
|
|
6757
7683
|
def _typecheckingstub__1e3640e7313e33945bc2b7c00caa777b47e14239e160ded6a349405aeb0b47da(
|
|
6758
7684
|
value: typing.Optional[builtins.str],
|
|
6759
7685
|
) -> None:
|
|
@@ -6780,6 +7706,7 @@ def _typecheckingstub__7dab36772798ea19c1d2e2f1e86d2099a88806994c157c7bd4e0d6217
|
|
|
6780
7706
|
*,
|
|
6781
7707
|
firewall_arn: builtins.str,
|
|
6782
7708
|
logging_configuration: typing.Union[_IResolvable_da3f097b, typing.Union[CfnLoggingConfiguration.LoggingConfigurationProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
7709
|
+
enable_monitoring_dashboard: typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]] = None,
|
|
6783
7710
|
firewall_name: typing.Optional[builtins.str] = None,
|
|
6784
7711
|
) -> None:
|
|
6785
7712
|
"""Type checking stubs"""
|
|
@@ -6794,6 +7721,7 @@ def _typecheckingstub__2f1d19cebb2e7dfe2bb3a674253e22bfdb540bd48dc9cd243370420d8
|
|
|
6794
7721
|
type: builtins.str,
|
|
6795
7722
|
description: typing.Optional[builtins.str] = None,
|
|
6796
7723
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7724
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6797
7725
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
6798
7726
|
) -> None:
|
|
6799
7727
|
"""Type checking stubs"""
|
|
@@ -6841,6 +7769,12 @@ def _typecheckingstub__6ed6ac96ae6360b92bfdf6614d9832ba1cad5080dce3a3257a75537c9
|
|
|
6841
7769
|
"""Type checking stubs"""
|
|
6842
7770
|
pass
|
|
6843
7771
|
|
|
7772
|
+
def _typecheckingstub__46973fc09b1e3c3e87b38c8ac10ef1cb472bfde25cd2947723ae44a7d98733e0(
|
|
7773
|
+
value: typing.Optional[typing.Union[_IResolvable_da3f097b, CfnRuleGroup.SummaryConfigurationProperty]],
|
|
7774
|
+
) -> None:
|
|
7775
|
+
"""Type checking stubs"""
|
|
7776
|
+
pass
|
|
7777
|
+
|
|
6844
7778
|
def _typecheckingstub__5969fe74fc1a24641d71678e96d3133e152f5f87c43e5f7d72af22aa055d7db5(
|
|
6845
7779
|
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
6846
7780
|
) -> None:
|
|
@@ -7028,6 +7962,13 @@ def _typecheckingstub__71d7a12c23bdb40d0d25319bf80720d55c4205129c386e8de5676df43
|
|
|
7028
7962
|
"""Type checking stubs"""
|
|
7029
7963
|
pass
|
|
7030
7964
|
|
|
7965
|
+
def _typecheckingstub__46f2fcadfd6cf356e80e3b58b0b02c7c119bd9a36d7ac33ac0ee324f887c1307(
|
|
7966
|
+
*,
|
|
7967
|
+
rule_options: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
7968
|
+
) -> None:
|
|
7969
|
+
"""Type checking stubs"""
|
|
7970
|
+
pass
|
|
7971
|
+
|
|
7031
7972
|
def _typecheckingstub__775fa1817d39168a6b1883b9e449352da902edc72fb398c55cda18aa8ead3039(
|
|
7032
7973
|
*,
|
|
7033
7974
|
flags: typing.Sequence[builtins.str],
|
|
@@ -7043,6 +7984,7 @@ def _typecheckingstub__775b93be404fbe10bf6b023b8192636307852f30e49da9892d7e20aa4
|
|
|
7043
7984
|
type: builtins.str,
|
|
7044
7985
|
description: typing.Optional[builtins.str] = None,
|
|
7045
7986
|
rule_group: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.RuleGroupProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7987
|
+
summary_configuration: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnRuleGroup.SummaryConfigurationProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7046
7988
|
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
7047
7989
|
) -> None:
|
|
7048
7990
|
"""Type checking stubs"""
|
|
@@ -7163,3 +8105,77 @@ def _typecheckingstub__f05137012f831af07bffb09e4ece1302036a8c7c23718d26dcb08f4bf
|
|
|
7163
8105
|
) -> None:
|
|
7164
8106
|
"""Type checking stubs"""
|
|
7165
8107
|
pass
|
|
8108
|
+
|
|
8109
|
+
def _typecheckingstub__0573bf1b4145f0cb77953642be7dcead4ba79ff19313c048d55d52f50b71e1b3(
|
|
8110
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
8111
|
+
id: builtins.str,
|
|
8112
|
+
*,
|
|
8113
|
+
firewall_arn: builtins.str,
|
|
8114
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
8115
|
+
vpc_id: builtins.str,
|
|
8116
|
+
description: typing.Optional[builtins.str] = None,
|
|
8117
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
8118
|
+
) -> None:
|
|
8119
|
+
"""Type checking stubs"""
|
|
8120
|
+
pass
|
|
8121
|
+
|
|
8122
|
+
def _typecheckingstub__65d7c392a601d79f2fd4192b7743a475440dc80e37155fc4e745f070fec7a4ac(
|
|
8123
|
+
inspector: _TreeInspector_488e0dd5,
|
|
8124
|
+
) -> None:
|
|
8125
|
+
"""Type checking stubs"""
|
|
8126
|
+
pass
|
|
8127
|
+
|
|
8128
|
+
def _typecheckingstub__92933d91056f4ba3495b844f1c559970dc539ea1af9552b31329e79d5d06e036(
|
|
8129
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
8130
|
+
) -> None:
|
|
8131
|
+
"""Type checking stubs"""
|
|
8132
|
+
pass
|
|
8133
|
+
|
|
8134
|
+
def _typecheckingstub__4873642090d846acb67b83d329a7b6809d25db02946e5fd84612c726b796b3e3(
|
|
8135
|
+
value: builtins.str,
|
|
8136
|
+
) -> None:
|
|
8137
|
+
"""Type checking stubs"""
|
|
8138
|
+
pass
|
|
8139
|
+
|
|
8140
|
+
def _typecheckingstub__a3d9b0b82919d3ce70488dc76e2455ae08bd18480a9794afad69806d772cd593(
|
|
8141
|
+
value: typing.Union[_IResolvable_da3f097b, CfnVpcEndpointAssociation.SubnetMappingProperty],
|
|
8142
|
+
) -> None:
|
|
8143
|
+
"""Type checking stubs"""
|
|
8144
|
+
pass
|
|
8145
|
+
|
|
8146
|
+
def _typecheckingstub__ebc60917207a96abc5156cbba4fef32ab70bea3895d16bee96406b9486bc0767(
|
|
8147
|
+
value: builtins.str,
|
|
8148
|
+
) -> None:
|
|
8149
|
+
"""Type checking stubs"""
|
|
8150
|
+
pass
|
|
8151
|
+
|
|
8152
|
+
def _typecheckingstub__64391adefe7631ddc6978ebdc3e7251c31e95e8ed23e78e1c1e9d7261fa16f80(
|
|
8153
|
+
value: typing.Optional[builtins.str],
|
|
8154
|
+
) -> None:
|
|
8155
|
+
"""Type checking stubs"""
|
|
8156
|
+
pass
|
|
8157
|
+
|
|
8158
|
+
def _typecheckingstub__c17d9f2411e238295a7de2e84411c37ec368c1d40468f81aec3ce8b756fcc4a2(
|
|
8159
|
+
value: typing.Optional[typing.List[_CfnTag_f6864754]],
|
|
8160
|
+
) -> None:
|
|
8161
|
+
"""Type checking stubs"""
|
|
8162
|
+
pass
|
|
8163
|
+
|
|
8164
|
+
def _typecheckingstub__ed6e084870d225a53477b08097053cc5b851f59b0c1d2ac3ce50dcb613b85015(
|
|
8165
|
+
*,
|
|
8166
|
+
subnet_id: builtins.str,
|
|
8167
|
+
ip_address_type: typing.Optional[builtins.str] = None,
|
|
8168
|
+
) -> None:
|
|
8169
|
+
"""Type checking stubs"""
|
|
8170
|
+
pass
|
|
8171
|
+
|
|
8172
|
+
def _typecheckingstub__3dbb62f97ee487edf99a31ab28f86b2ab2bef9c9c70286db4f91d315d1c53f76(
|
|
8173
|
+
*,
|
|
8174
|
+
firewall_arn: builtins.str,
|
|
8175
|
+
subnet_mapping: typing.Union[_IResolvable_da3f097b, typing.Union[CfnVpcEndpointAssociation.SubnetMappingProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
8176
|
+
vpc_id: builtins.str,
|
|
8177
|
+
description: typing.Optional[builtins.str] = None,
|
|
8178
|
+
tags: typing.Optional[typing.Sequence[typing.Union[_CfnTag_f6864754, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
8179
|
+
) -> None:
|
|
8180
|
+
"""Type checking stubs"""
|
|
8181
|
+
pass
|