{-# LANGUAGE DeriveGeneric #-}
{-# LANGUAGE DuplicateRecordFields #-}
{-# LANGUAGE NamedFieldPuns #-}
{-# LANGUAGE OverloadedStrings #-}
{-# LANGUAGE RecordWildCards #-}
{-# LANGUAGE StrictData #-}
{-# LANGUAGE NoImplicitPrelude #-}
{-# OPTIONS_GHC -fno-warn-unused-imports #-}
{-# OPTIONS_GHC -fno-warn-unused-matches #-}

-- Derived from AWS service descriptions, licensed under Apache 2.0.

-- |
-- Module      : Amazonka.NetworkFirewall.Types.RuleDefinition
-- Copyright   : (c) 2013-2021 Brendan Hay
-- License     : Mozilla Public License, v. 2.0.
-- Maintainer  : Brendan Hay <brendan.g.hay+amazonka@gmail.com>
-- Stability   : auto-generated
-- Portability : non-portable (GHC extensions)
module Amazonka.NetworkFirewall.Types.RuleDefinition where

import qualified Amazonka.Core as Core
import qualified Amazonka.Lens as Lens
import Amazonka.NetworkFirewall.Types.MatchAttributes
import qualified Amazonka.Prelude as Prelude

-- | The inspection criteria and action for a single stateless rule. AWS
-- Network Firewall inspects each packet for the specified matching
-- criteria. When a packet matches the criteria, Network Firewall performs
-- the rule\'s actions on the packet.
--
-- /See:/ 'newRuleDefinition' smart constructor.
data RuleDefinition = RuleDefinition'
  { -- | Criteria for Network Firewall to use to inspect an individual packet in
    -- stateless rule inspection. Each match attributes set can include one or
    -- more items such as IP address, CIDR range, port number, protocol, and
    -- TCP flags.
    RuleDefinition -> MatchAttributes
matchAttributes :: MatchAttributes,
    -- | The actions to take on a packet that matches one of the stateless rule
    -- definition\'s match attributes. You must specify a standard action and
    -- you can add custom actions.
    --
    -- Network Firewall only forwards a packet for stateful rule inspection if
    -- you specify @aws:forward_to_sfe@ for a rule that the packet matches, or
    -- if the packet doesn\'t match any stateless rule and you specify
    -- @aws:forward_to_sfe@ for the @StatelessDefaultActions@ setting for the
    -- FirewallPolicy.
    --
    -- For every rule, you must specify exactly one of the following standard
    -- actions.
    --
    -- -   __aws:pass__ - Discontinues all inspection of the packet and permits
    --     it to go to its intended destination.
    --
    -- -   __aws:drop__ - Discontinues all inspection of the packet and blocks
    --     it from going to its intended destination.
    --
    -- -   __aws:forward_to_sfe__ - Discontinues stateless inspection of the
    --     packet and forwards it to the stateful rule engine for inspection.
    --
    -- Additionally, you can specify a custom action. To do this, you define a
    -- custom action by name and type, then provide the name you\'ve assigned
    -- to the action in this @Actions@ setting. For information about the
    -- options, see CustomAction.
    --
    -- To provide more than one action in this setting, separate the settings
    -- with a comma. For example, if you have a custom @PublishMetrics@ action
    -- that you\'ve named @MyMetricsAction@, then you could specify the
    -- standard action @aws:pass@ and the custom action with
    -- @[“aws:pass”, “MyMetricsAction”]@.
    RuleDefinition -> [Text]
actions :: [Prelude.Text]
  }
  deriving (RuleDefinition -> RuleDefinition -> Bool
(RuleDefinition -> RuleDefinition -> Bool)
-> (RuleDefinition -> RuleDefinition -> Bool) -> Eq RuleDefinition
forall a. (a -> a -> Bool) -> (a -> a -> Bool) -> Eq a
/= :: RuleDefinition -> RuleDefinition -> Bool
$c/= :: RuleDefinition -> RuleDefinition -> Bool
== :: RuleDefinition -> RuleDefinition -> Bool
$c== :: RuleDefinition -> RuleDefinition -> Bool
Prelude.Eq, ReadPrec [RuleDefinition]
ReadPrec RuleDefinition
Int -> ReadS RuleDefinition
ReadS [RuleDefinition]
(Int -> ReadS RuleDefinition)
-> ReadS [RuleDefinition]
-> ReadPrec RuleDefinition
-> ReadPrec [RuleDefinition]
-> Read RuleDefinition
forall a.
(Int -> ReadS a)
-> ReadS [a] -> ReadPrec a -> ReadPrec [a] -> Read a
readListPrec :: ReadPrec [RuleDefinition]
$creadListPrec :: ReadPrec [RuleDefinition]
readPrec :: ReadPrec RuleDefinition
$creadPrec :: ReadPrec RuleDefinition
readList :: ReadS [RuleDefinition]
$creadList :: ReadS [RuleDefinition]
readsPrec :: Int -> ReadS RuleDefinition
$creadsPrec :: Int -> ReadS RuleDefinition
Prelude.Read, Int -> RuleDefinition -> ShowS
[RuleDefinition] -> ShowS
RuleDefinition -> String
(Int -> RuleDefinition -> ShowS)
-> (RuleDefinition -> String)
-> ([RuleDefinition] -> ShowS)
-> Show RuleDefinition
forall a.
(Int -> a -> ShowS) -> (a -> String) -> ([a] -> ShowS) -> Show a
showList :: [RuleDefinition] -> ShowS
$cshowList :: [RuleDefinition] -> ShowS
show :: RuleDefinition -> String
$cshow :: RuleDefinition -> String
showsPrec :: Int -> RuleDefinition -> ShowS
$cshowsPrec :: Int -> RuleDefinition -> ShowS
Prelude.Show, (forall x. RuleDefinition -> Rep RuleDefinition x)
-> (forall x. Rep RuleDefinition x -> RuleDefinition)
-> Generic RuleDefinition
forall x. Rep RuleDefinition x -> RuleDefinition
forall x. RuleDefinition -> Rep RuleDefinition x
forall a.
(forall x. a -> Rep a x) -> (forall x. Rep a x -> a) -> Generic a
$cto :: forall x. Rep RuleDefinition x -> RuleDefinition
$cfrom :: forall x. RuleDefinition -> Rep RuleDefinition x
Prelude.Generic)

-- |
-- Create a value of 'RuleDefinition' with all optional fields omitted.
--
-- Use <https://hackage.haskell.org/package/generic-lens generic-lens> or <https://hackage.haskell.org/package/optics optics> to modify other optional fields.
--
-- The following record fields are available, with the corresponding lenses provided
-- for backwards compatibility:
--
-- 'matchAttributes', 'ruleDefinition_matchAttributes' - Criteria for Network Firewall to use to inspect an individual packet in
-- stateless rule inspection. Each match attributes set can include one or
-- more items such as IP address, CIDR range, port number, protocol, and
-- TCP flags.
--
-- 'actions', 'ruleDefinition_actions' - The actions to take on a packet that matches one of the stateless rule
-- definition\'s match attributes. You must specify a standard action and
-- you can add custom actions.
--
-- Network Firewall only forwards a packet for stateful rule inspection if
-- you specify @aws:forward_to_sfe@ for a rule that the packet matches, or
-- if the packet doesn\'t match any stateless rule and you specify
-- @aws:forward_to_sfe@ for the @StatelessDefaultActions@ setting for the
-- FirewallPolicy.
--
-- For every rule, you must specify exactly one of the following standard
-- actions.
--
-- -   __aws:pass__ - Discontinues all inspection of the packet and permits
--     it to go to its intended destination.
--
-- -   __aws:drop__ - Discontinues all inspection of the packet and blocks
--     it from going to its intended destination.
--
-- -   __aws:forward_to_sfe__ - Discontinues stateless inspection of the
--     packet and forwards it to the stateful rule engine for inspection.
--
-- Additionally, you can specify a custom action. To do this, you define a
-- custom action by name and type, then provide the name you\'ve assigned
-- to the action in this @Actions@ setting. For information about the
-- options, see CustomAction.
--
-- To provide more than one action in this setting, separate the settings
-- with a comma. For example, if you have a custom @PublishMetrics@ action
-- that you\'ve named @MyMetricsAction@, then you could specify the
-- standard action @aws:pass@ and the custom action with
-- @[“aws:pass”, “MyMetricsAction”]@.
newRuleDefinition ::
  -- | 'matchAttributes'
  MatchAttributes ->
  RuleDefinition
newRuleDefinition :: MatchAttributes -> RuleDefinition
newRuleDefinition MatchAttributes
pMatchAttributes_ =
  RuleDefinition' :: MatchAttributes -> [Text] -> RuleDefinition
RuleDefinition'
    { $sel:matchAttributes:RuleDefinition' :: MatchAttributes
matchAttributes =
        MatchAttributes
pMatchAttributes_,
      $sel:actions:RuleDefinition' :: [Text]
actions = [Text]
forall a. Monoid a => a
Prelude.mempty
    }

-- | Criteria for Network Firewall to use to inspect an individual packet in
-- stateless rule inspection. Each match attributes set can include one or
-- more items such as IP address, CIDR range, port number, protocol, and
-- TCP flags.
ruleDefinition_matchAttributes :: Lens.Lens' RuleDefinition MatchAttributes
ruleDefinition_matchAttributes :: (MatchAttributes -> f MatchAttributes)
-> RuleDefinition -> f RuleDefinition
ruleDefinition_matchAttributes = (RuleDefinition -> MatchAttributes)
-> (RuleDefinition -> MatchAttributes -> RuleDefinition)
-> Lens
     RuleDefinition RuleDefinition MatchAttributes MatchAttributes
forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\RuleDefinition' {MatchAttributes
matchAttributes :: MatchAttributes
$sel:matchAttributes:RuleDefinition' :: RuleDefinition -> MatchAttributes
matchAttributes} -> MatchAttributes
matchAttributes) (\s :: RuleDefinition
s@RuleDefinition' {} MatchAttributes
a -> RuleDefinition
s {$sel:matchAttributes:RuleDefinition' :: MatchAttributes
matchAttributes = MatchAttributes
a} :: RuleDefinition)

-- | The actions to take on a packet that matches one of the stateless rule
-- definition\'s match attributes. You must specify a standard action and
-- you can add custom actions.
--
-- Network Firewall only forwards a packet for stateful rule inspection if
-- you specify @aws:forward_to_sfe@ for a rule that the packet matches, or
-- if the packet doesn\'t match any stateless rule and you specify
-- @aws:forward_to_sfe@ for the @StatelessDefaultActions@ setting for the
-- FirewallPolicy.
--
-- For every rule, you must specify exactly one of the following standard
-- actions.
--
-- -   __aws:pass__ - Discontinues all inspection of the packet and permits
--     it to go to its intended destination.
--
-- -   __aws:drop__ - Discontinues all inspection of the packet and blocks
--     it from going to its intended destination.
--
-- -   __aws:forward_to_sfe__ - Discontinues stateless inspection of the
--     packet and forwards it to the stateful rule engine for inspection.
--
-- Additionally, you can specify a custom action. To do this, you define a
-- custom action by name and type, then provide the name you\'ve assigned
-- to the action in this @Actions@ setting. For information about the
-- options, see CustomAction.
--
-- To provide more than one action in this setting, separate the settings
-- with a comma. For example, if you have a custom @PublishMetrics@ action
-- that you\'ve named @MyMetricsAction@, then you could specify the
-- standard action @aws:pass@ and the custom action with
-- @[“aws:pass”, “MyMetricsAction”]@.
ruleDefinition_actions :: Lens.Lens' RuleDefinition [Prelude.Text]
ruleDefinition_actions :: ([Text] -> f [Text]) -> RuleDefinition -> f RuleDefinition
ruleDefinition_actions = (RuleDefinition -> [Text])
-> (RuleDefinition -> [Text] -> RuleDefinition)
-> Lens RuleDefinition RuleDefinition [Text] [Text]
forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\RuleDefinition' {[Text]
actions :: [Text]
$sel:actions:RuleDefinition' :: RuleDefinition -> [Text]
actions} -> [Text]
actions) (\s :: RuleDefinition
s@RuleDefinition' {} [Text]
a -> RuleDefinition
s {$sel:actions:RuleDefinition' :: [Text]
actions = [Text]
a} :: RuleDefinition) (([Text] -> f [Text]) -> RuleDefinition -> f RuleDefinition)
-> (([Text] -> f [Text]) -> [Text] -> f [Text])
-> ([Text] -> f [Text])
-> RuleDefinition
-> f RuleDefinition
forall b c a. (b -> c) -> (a -> b) -> a -> c
Prelude.. ([Text] -> f [Text]) -> [Text] -> f [Text]
forall s t a b. (Coercible s a, Coercible t b) => Iso s t a b
Lens.coerced

instance Core.FromJSON RuleDefinition where
  parseJSON :: Value -> Parser RuleDefinition
parseJSON =
    String
-> (Object -> Parser RuleDefinition)
-> Value
-> Parser RuleDefinition
forall a. String -> (Object -> Parser a) -> Value -> Parser a
Core.withObject
      String
"RuleDefinition"
      ( \Object
x ->
          MatchAttributes -> [Text] -> RuleDefinition
RuleDefinition'
            (MatchAttributes -> [Text] -> RuleDefinition)
-> Parser MatchAttributes -> Parser ([Text] -> RuleDefinition)
forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> (Object
x Object -> Text -> Parser MatchAttributes
forall a. FromJSON a => Object -> Text -> Parser a
Core..: Text
"MatchAttributes")
            Parser ([Text] -> RuleDefinition)
-> Parser [Text] -> Parser RuleDefinition
forall (f :: * -> *) a b. Applicative f => f (a -> b) -> f a -> f b
Prelude.<*> (Object
x Object -> Text -> Parser (Maybe [Text])
forall a. FromJSON a => Object -> Text -> Parser (Maybe a)
Core..:? Text
"Actions" Parser (Maybe [Text]) -> [Text] -> Parser [Text]
forall a. Parser (Maybe a) -> a -> Parser a
Core..!= [Text]
forall a. Monoid a => a
Prelude.mempty)
      )

instance Prelude.Hashable RuleDefinition

instance Prelude.NFData RuleDefinition

instance Core.ToJSON RuleDefinition where
  toJSON :: RuleDefinition -> Value
toJSON RuleDefinition' {[Text]
MatchAttributes
actions :: [Text]
matchAttributes :: MatchAttributes
$sel:actions:RuleDefinition' :: RuleDefinition -> [Text]
$sel:matchAttributes:RuleDefinition' :: RuleDefinition -> MatchAttributes
..} =
    [Pair] -> Value
Core.object
      ( [Maybe Pair] -> [Pair]
forall a. [Maybe a] -> [a]
Prelude.catMaybes
          [ Pair -> Maybe Pair
forall a. a -> Maybe a
Prelude.Just
              (Text
"MatchAttributes" Text -> MatchAttributes -> Pair
forall kv v. (KeyValue kv, ToJSON v) => Text -> v -> kv
Core..= MatchAttributes
matchAttributes),
            Pair -> Maybe Pair
forall a. a -> Maybe a
Prelude.Just (Text
"Actions" Text -> [Text] -> Pair
forall kv v. (KeyValue kv, ToJSON v) => Text -> v -> kv
Core..= [Text]
actions)
          ]
      )