Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.awsnative.networkfirewall.kotlin.inputs
import com.pulumi.awsnative.networkfirewall.inputs.FirewallPolicyArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property policyVariables Contains variables that you can use to override default Suricata settings in your firewall policy.
* @property statefulDefaultActions The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
* Valid values of the stateful default action:
* - aws:drop_strict
* - aws:drop_established
* - aws:alert_strict
* - aws:alert_established
* For more information, see [Strict evaluation order](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* .
* @property statefulEngineOptions Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
* @property statefulRuleGroupReferences References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
* @property statelessCustomActions The custom action definitions that are available for use in the firewall policy's `StatelessDefaultActions` setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
* @property statelessDefaultActions The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify `aws:forward_to_sfe` .
* You must specify one of the standard actions: `aws:pass` , `aws:drop` , or `aws:forward_to_sfe` . In addition, you can specify custom actions that are compatible with your standard section choice.
* For example, you could specify `["aws:pass"]` or you could specify `["aws:pass", "customActionName"]` . For information about compatibility, see the custom action descriptions.
* @property statelessFragmentDefaultActions The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. If you want non-matching fragmented packets to be forwarded for stateful inspection, specify `aws:forward_to_sfe` .
* You must specify one of the standard actions: `aws:pass` , `aws:drop` , or `aws:forward_to_sfe` . In addition, you can specify custom actions that are compatible with your standard section choice.
* For example, you could specify `["aws:pass"]` or you could specify `["aws:pass", "customActionName"]` . For information about compatibility, see the custom action descriptions.
* @property statelessRuleGroupReferences References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
* @property tlsInspectionConfigurationArn The Amazon Resource Name (ARN) of the TLS inspection configuration.
*/
public data class FirewallPolicyArgs(
public val policyVariables: Output? = null,
public val statefulDefaultActions: Output>? = null,
public val statefulEngineOptions: Output? = null,
public val statefulRuleGroupReferences: Output>? = null,
public val statelessCustomActions: Output>? = null,
public val statelessDefaultActions: Output>,
public val statelessFragmentDefaultActions: Output>,
public val statelessRuleGroupReferences: Output>? = null,
public val tlsInspectionConfigurationArn: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.awsnative.networkfirewall.inputs.FirewallPolicyArgs =
com.pulumi.awsnative.networkfirewall.inputs.FirewallPolicyArgs.builder()
.policyVariables(policyVariables?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.statefulDefaultActions(
statefulDefaultActions?.applyValue({ args0 ->
args0.map({ args0 ->
args0
})
}),
)
.statefulEngineOptions(
statefulEngineOptions?.applyValue({ args0 ->
args0.let({ args0 ->
args0.toJava()
})
}),
)
.statefulRuleGroupReferences(
statefulRuleGroupReferences?.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> args0.toJava() })
})
}),
)
.statelessCustomActions(
statelessCustomActions?.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> args0.toJava() })
})
}),
)
.statelessDefaultActions(
statelessDefaultActions.applyValue({ args0 ->
args0.map({ args0 ->
args0
})
}),
)
.statelessFragmentDefaultActions(
statelessFragmentDefaultActions.applyValue({ args0 ->
args0.map({ args0 -> args0 })
}),
)
.statelessRuleGroupReferences(
statelessRuleGroupReferences?.applyValue({ args0 ->
args0.map({ args0 -> args0.let({ args0 -> args0.toJava() }) })
}),
)
.tlsInspectionConfigurationArn(
tlsInspectionConfigurationArn?.applyValue({ args0 ->
args0
}),
).build()
}
/**
* Builder for [FirewallPolicyArgs].
*/
@PulumiTagMarker
public class FirewallPolicyArgsBuilder internal constructor() {
private var policyVariables: Output? = null
private var statefulDefaultActions: Output>? = null
private var statefulEngineOptions: Output? = null
private var statefulRuleGroupReferences:
Output>? = null
private var statelessCustomActions: Output>? = null
private var statelessDefaultActions: Output>? = null
private var statelessFragmentDefaultActions: Output>? = null
private var statelessRuleGroupReferences:
Output>? = null
private var tlsInspectionConfigurationArn: Output? = null
/**
* @param value Contains variables that you can use to override default Suricata settings in your firewall policy.
*/
@JvmName("hgbufcaswrrhrvre")
public suspend fun policyVariables(`value`: Output) {
this.policyVariables = value
}
/**
* @param value The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
* Valid values of the stateful default action:
* - aws:drop_strict
* - aws:drop_established
* - aws:alert_strict
* - aws:alert_established
* For more information, see [Strict evaluation order](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* .
*/
@JvmName("xtxmsmxnjruuhbpd")
public suspend fun statefulDefaultActions(`value`: Output>) {
this.statefulDefaultActions = value
}
@JvmName("kuqdnfomgpbghhxa")
public suspend fun statefulDefaultActions(vararg values: Output) {
this.statefulDefaultActions = Output.all(values.asList())
}
/**
* @param values The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
* Valid values of the stateful default action:
* - aws:drop_strict
* - aws:drop_established
* - aws:alert_strict
* - aws:alert_established
* For more information, see [Strict evaluation order](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* .
*/
@JvmName("sxltmcvfhvwqacfq")
public suspend fun statefulDefaultActions(values: List