aws-sdk-route53resolver 1.52.0 → 1.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2d5a98651b3531cafa45212a8cd7d50cd04bb4de53ff3fa779531ce3b4b6c88e
4
- data.tar.gz: 5442089f8b439efe058edb70da81a90259b52c694421f13e2507f82169129b6f
3
+ metadata.gz: 640e69524c15876c58e54ee6aab673a86b82889ea4f5e1364e71084ff1f7daa1
4
+ data.tar.gz: 30dfc29e654b1e6fbe717b7deda5bbd05dcbb3b23e060c0d1ac9201f53e17613
5
5
  SHA512:
6
- metadata.gz: 1ce45c125ecb6c6b62c8069bc5af82bb7ee8e784a7edf8c52e28eae76997d94e48a0be5960f895e3399c908f9839b15ae25daa18b632d151d48838dbccd91d64
7
- data.tar.gz: f82c04c30a70c423cc4a5d489b283f593ef2c150da1b617cc872e7f1e99d1fc87274ab50581298f43ccaf41774cf3669ccb764e58d1eade0dba95e6b655cdaab
6
+ metadata.gz: 95aa5495e7331372fc6881844f69472cf67cc6df0338b0bdfba347867367a2a878a43d06a926cc675a412495937eb14e436f672614550e3bb3b2d22cdacdc9e7
7
+ data.tar.gz: 331eb4c4b5eda728bc12bb6edde7f2a611344190a17fa8144bef59f4c2e07df41398f27b2f2ee5129fd742c6940638b587e47f356d98b594ca2bc14cd0441fde
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.54.0 (2024-01-26)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.53.0 (2024-01-08)
10
+ ------------------
11
+
12
+ * Feature - This release adds support for query type configuration on firewall rules that enables customers for granular action (ALLOW, ALERT, BLOCK) by DNS query type.
13
+
4
14
  1.52.0 (2023-12-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.52.0
1
+ 1.54.0
@@ -813,6 +813,37 @@ module Aws::Route53Resolver
813
813
  # @option params [required, String] :name
814
814
  # A name that lets you identify the rule in the rule group.
815
815
  #
816
+ # @option params [String] :qtype
817
+ # The DNS query type you want the rule to evaluate. Allowed values are;
818
+ #
819
+ # * A: Returns an IPv4 address.
820
+ #
821
+ # * AAAA: Returns an Ipv6 address.
822
+ #
823
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
824
+ # domain.
825
+ #
826
+ # * CNAME: Returns another domain name.
827
+ #
828
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
829
+ # zone.
830
+ #
831
+ # * MX: Specifies mail servers.
832
+ #
833
+ # * NAPTR: Regular-expression-based rewriting of domain names.
834
+ #
835
+ # * NS: Authoritative name servers.
836
+ #
837
+ # * PTR: Maps an IP address to a domain name.
838
+ #
839
+ # * SOA: Start of authority record for the zone.
840
+ #
841
+ # * SPF: Lists the servers authorized to send emails from a domain.
842
+ #
843
+ # * SRV: Application specific values that identify servers.
844
+ #
845
+ # * TXT: Verifies email senders and application-specific values.
846
+ #
816
847
  # @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
817
848
  #
818
849
  # * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -830,6 +861,7 @@ module Aws::Route53Resolver
830
861
  # block_override_dns_type: "CNAME", # accepts CNAME
831
862
  # block_override_ttl: 1,
832
863
  # name: "Name", # required
864
+ # qtype: "Qtype",
833
865
  # })
834
866
  #
835
867
  # @example Response structure
@@ -846,6 +878,7 @@ module Aws::Route53Resolver
846
878
  # resp.firewall_rule.creator_request_id #=> String
847
879
  # resp.firewall_rule.creation_time #=> String
848
880
  # resp.firewall_rule.modification_time #=> String
881
+ # resp.firewall_rule.qtype #=> String
849
882
  #
850
883
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
851
884
  #
@@ -1395,6 +1428,38 @@ module Aws::Route53Resolver
1395
1428
  # @option params [required, String] :firewall_domain_list_id
1396
1429
  # The ID of the domain list that's used in the rule.
1397
1430
  #
1431
+ # @option params [String] :qtype
1432
+ # The DNS query type that the rule you are deleting evaluates. Allowed
1433
+ # values are;
1434
+ #
1435
+ # * A: Returns an IPv4 address.
1436
+ #
1437
+ # * AAAA: Returns an Ipv6 address.
1438
+ #
1439
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
1440
+ # domain.
1441
+ #
1442
+ # * CNAME: Returns another domain name.
1443
+ #
1444
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
1445
+ # zone.
1446
+ #
1447
+ # * MX: Specifies mail servers.
1448
+ #
1449
+ # * NAPTR: Regular-expression-based rewriting of domain names.
1450
+ #
1451
+ # * NS: Authoritative name servers.
1452
+ #
1453
+ # * PTR: Maps an IP address to a domain name.
1454
+ #
1455
+ # * SOA: Start of authority record for the zone.
1456
+ #
1457
+ # * SPF: Lists the servers authorized to send emails from a domain.
1458
+ #
1459
+ # * SRV: Application specific values that identify servers.
1460
+ #
1461
+ # * TXT: Verifies email senders and application-specific values.
1462
+ #
1398
1463
  # @return [Types::DeleteFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1399
1464
  #
1400
1465
  # * {Types::DeleteFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -1404,6 +1469,7 @@ module Aws::Route53Resolver
1404
1469
  # resp = client.delete_firewall_rule({
1405
1470
  # firewall_rule_group_id: "ResourceId", # required
1406
1471
  # firewall_domain_list_id: "ResourceId", # required
1472
+ # qtype: "Qtype",
1407
1473
  # })
1408
1474
  #
1409
1475
  # @example Response structure
@@ -1420,6 +1486,7 @@ module Aws::Route53Resolver
1420
1486
  # resp.firewall_rule.creator_request_id #=> String
1421
1487
  # resp.firewall_rule.creation_time #=> String
1422
1488
  # resp.firewall_rule.modification_time #=> String
1489
+ # resp.firewall_rule.qtype #=> String
1423
1490
  #
1424
1491
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
1425
1492
  #
@@ -2899,6 +2966,7 @@ module Aws::Route53Resolver
2899
2966
  # resp.firewall_rules[0].creator_request_id #=> String
2900
2967
  # resp.firewall_rules[0].creation_time #=> String
2901
2968
  # resp.firewall_rules[0].modification_time #=> String
2969
+ # resp.firewall_rules[0].qtype #=> String
2902
2970
  #
2903
2971
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
2904
2972
  #
@@ -4124,6 +4192,37 @@ module Aws::Route53Resolver
4124
4192
  # @option params [String] :name
4125
4193
  # The name of the rule.
4126
4194
  #
4195
+ # @option params [String] :qtype
4196
+ # The DNS query type you want the rule to evaluate. Allowed values are;
4197
+ #
4198
+ # * A: Returns an IPv4 address.
4199
+ #
4200
+ # * AAAA: Returns an Ipv6 address.
4201
+ #
4202
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
4203
+ # domain.
4204
+ #
4205
+ # * CNAME: Returns another domain name.
4206
+ #
4207
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
4208
+ # zone.
4209
+ #
4210
+ # * MX: Specifies mail servers.
4211
+ #
4212
+ # * NAPTR: Regular-expression-based rewriting of domain names.
4213
+ #
4214
+ # * NS: Authoritative name servers.
4215
+ #
4216
+ # * PTR: Maps an IP address to a domain name.
4217
+ #
4218
+ # * SOA: Start of authority record for the zone.
4219
+ #
4220
+ # * SPF: Lists the servers authorized to send emails from a domain.
4221
+ #
4222
+ # * SRV: Application specific values that identify servers.
4223
+ #
4224
+ # * TXT: Verifies email senders and application-specific values.
4225
+ #
4127
4226
  # @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4128
4227
  #
4129
4228
  # * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -4140,6 +4239,7 @@ module Aws::Route53Resolver
4140
4239
  # block_override_dns_type: "CNAME", # accepts CNAME
4141
4240
  # block_override_ttl: 1,
4142
4241
  # name: "Name",
4242
+ # qtype: "Qtype",
4143
4243
  # })
4144
4244
  #
4145
4245
  # @example Response structure
@@ -4156,6 +4256,7 @@ module Aws::Route53Resolver
4156
4256
  # resp.firewall_rule.creator_request_id #=> String
4157
4257
  # resp.firewall_rule.creation_time #=> String
4158
4258
  # resp.firewall_rule.modification_time #=> String
4259
+ # resp.firewall_rule.qtype #=> String
4159
4260
  #
4160
4261
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
4161
4262
  #
@@ -4558,7 +4659,7 @@ module Aws::Route53Resolver
4558
4659
  params: params,
4559
4660
  config: config)
4560
4661
  context[:gem_name] = 'aws-sdk-route53resolver'
4561
- context[:gem_version] = '1.52.0'
4662
+ context[:gem_version] = '1.54.0'
4562
4663
  Seahorse::Client::Request.new(handlers, context)
4563
4664
  end
4564
4665
 
@@ -205,6 +205,7 @@ module Aws::Route53Resolver
205
205
  PutResolverQueryLogConfigPolicyResponse = Shapes::StructureShape.new(name: 'PutResolverQueryLogConfigPolicyResponse')
206
206
  PutResolverRulePolicyRequest = Shapes::StructureShape.new(name: 'PutResolverRulePolicyRequest')
207
207
  PutResolverRulePolicyResponse = Shapes::StructureShape.new(name: 'PutResolverRulePolicyResponse')
208
+ Qtype = Shapes::StringShape.new(name: 'Qtype')
208
209
  ResolverAutodefinedReverseStatus = Shapes::StringShape.new(name: 'ResolverAutodefinedReverseStatus')
209
210
  ResolverConfig = Shapes::StructureShape.new(name: 'ResolverConfig')
210
211
  ResolverConfigList = Shapes::ListShape.new(name: 'ResolverConfigList')
@@ -353,6 +354,7 @@ module Aws::Route53Resolver
353
354
  CreateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
354
355
  CreateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
355
356
  CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
357
+ CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
356
358
  CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
357
359
 
358
360
  CreateFirewallRuleResponse.add_member(:firewall_rule, Shapes::ShapeRef.new(shape: FirewallRule, location_name: "FirewallRule"))
@@ -419,6 +421,7 @@ module Aws::Route53Resolver
419
421
 
420
422
  DeleteFirewallRuleRequest.add_member(:firewall_rule_group_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallRuleGroupId"))
421
423
  DeleteFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallDomainListId"))
424
+ DeleteFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
422
425
  DeleteFirewallRuleRequest.struct_class = Types::DeleteFirewallRuleRequest
423
426
 
424
427
  DeleteFirewallRuleResponse.add_member(:firewall_rule, Shapes::ShapeRef.new(shape: FirewallRule, location_name: "FirewallRule"))
@@ -526,6 +529,7 @@ module Aws::Route53Resolver
526
529
  FirewallRule.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, location_name: "CreatorRequestId"))
527
530
  FirewallRule.add_member(:creation_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "CreationTime"))
528
531
  FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
532
+ FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
529
533
  FirewallRule.struct_class = Types::FirewallRule
530
534
 
531
535
  FirewallRuleGroup.add_member(:id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "Id"))
@@ -1099,6 +1103,7 @@ module Aws::Route53Resolver
1099
1103
  UpdateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
1100
1104
  UpdateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
1101
1105
  UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
1106
+ UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
1102
1107
  UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
1103
1108
 
1104
1109
  UpdateFirewallRuleResponse.add_member(:firewall_rule, Shapes::ShapeRef.new(shape: FirewallRule, location_name: "FirewallRule"))
@@ -14,6 +14,7 @@ module Aws::Route53Resolver
14
14
  option(
15
15
  :endpoint_provider,
16
16
  doc_type: 'Aws::Route53Resolver::EndpointProvider',
17
+ rbs_type: 'untyped',
17
18
  docstring: 'The endpoint provider used to resolve endpoints. Any '\
18
19
  'object that responds to `#resolve_endpoint(parameters)` '\
19
20
  'where `parameters` is a Struct similar to '\
@@ -401,6 +401,39 @@ module Aws::Route53Resolver
401
401
  # A name that lets you identify the rule in the rule group.
402
402
  # @return [String]
403
403
  #
404
+ # @!attribute [rw] qtype
405
+ # The DNS query type you want the rule to evaluate. Allowed values
406
+ # are;
407
+ #
408
+ # * A: Returns an IPv4 address.
409
+ #
410
+ # * AAAA: Returns an Ipv6 address.
411
+ #
412
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
413
+ # domain.
414
+ #
415
+ # * CNAME: Returns another domain name.
416
+ #
417
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
418
+ # zone.
419
+ #
420
+ # * MX: Specifies mail servers.
421
+ #
422
+ # * NAPTR: Regular-expression-based rewriting of domain names.
423
+ #
424
+ # * NS: Authoritative name servers.
425
+ #
426
+ # * PTR: Maps an IP address to a domain name.
427
+ #
428
+ # * SOA: Start of authority record for the zone.
429
+ #
430
+ # * SPF: Lists the servers authorized to send emails from a domain.
431
+ #
432
+ # * SRV: Application specific values that identify servers.
433
+ #
434
+ # * TXT: Verifies email senders and application-specific values.
435
+ # @return [String]
436
+ #
404
437
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
405
438
  #
406
439
  class CreateFirewallRuleRequest < Struct.new(
@@ -413,7 +446,8 @@ module Aws::Route53Resolver
413
446
  :block_override_domain,
414
447
  :block_override_dns_type,
415
448
  :block_override_ttl,
416
- :name)
449
+ :name,
450
+ :qtype)
417
451
  SENSITIVE = []
418
452
  include Aws::Structure
419
453
  end
@@ -822,11 +856,45 @@ module Aws::Route53Resolver
822
856
  # The ID of the domain list that's used in the rule.
823
857
  # @return [String]
824
858
  #
859
+ # @!attribute [rw] qtype
860
+ # The DNS query type that the rule you are deleting evaluates. Allowed
861
+ # values are;
862
+ #
863
+ # * A: Returns an IPv4 address.
864
+ #
865
+ # * AAAA: Returns an Ipv6 address.
866
+ #
867
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
868
+ # domain.
869
+ #
870
+ # * CNAME: Returns another domain name.
871
+ #
872
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
873
+ # zone.
874
+ #
875
+ # * MX: Specifies mail servers.
876
+ #
877
+ # * NAPTR: Regular-expression-based rewriting of domain names.
878
+ #
879
+ # * NS: Authoritative name servers.
880
+ #
881
+ # * PTR: Maps an IP address to a domain name.
882
+ #
883
+ # * SOA: Start of authority record for the zone.
884
+ #
885
+ # * SPF: Lists the servers authorized to send emails from a domain.
886
+ #
887
+ # * SRV: Application specific values that identify servers.
888
+ #
889
+ # * TXT: Verifies email senders and application-specific values.
890
+ # @return [String]
891
+ #
825
892
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRuleRequest AWS API Documentation
826
893
  #
827
894
  class DeleteFirewallRuleRequest < Struct.new(
828
895
  :firewall_rule_group_id,
829
- :firewall_domain_list_id)
896
+ :firewall_domain_list_id,
897
+ :qtype)
830
898
  SENSITIVE = []
831
899
  include Aws::Structure
832
900
  end
@@ -1527,6 +1595,39 @@ module Aws::Route53Resolver
1527
1595
  # format and Coordinated Universal Time (UTC).
1528
1596
  # @return [String]
1529
1597
  #
1598
+ # @!attribute [rw] qtype
1599
+ # The DNS query type you want the rule to evaluate. Allowed values
1600
+ # are;
1601
+ #
1602
+ # * A: Returns an IPv4 address.
1603
+ #
1604
+ # * AAAA: Returns an Ipv6 address.
1605
+ #
1606
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
1607
+ # domain.
1608
+ #
1609
+ # * CNAME: Returns another domain name.
1610
+ #
1611
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
1612
+ # zone.
1613
+ #
1614
+ # * MX: Specifies mail servers.
1615
+ #
1616
+ # * NAPTR: Regular-expression-based rewriting of domain names.
1617
+ #
1618
+ # * NS: Authoritative name servers.
1619
+ #
1620
+ # * PTR: Maps an IP address to a domain name.
1621
+ #
1622
+ # * SOA: Start of authority record for the zone.
1623
+ #
1624
+ # * SPF: Lists the servers authorized to send emails from a domain.
1625
+ #
1626
+ # * SRV: Application specific values that identify servers.
1627
+ #
1628
+ # * TXT: Verifies email senders and application-specific values.
1629
+ # @return [String]
1630
+ #
1530
1631
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
1531
1632
  #
1532
1633
  class FirewallRule < Struct.new(
@@ -1541,7 +1642,8 @@ module Aws::Route53Resolver
1541
1642
  :block_override_ttl,
1542
1643
  :creator_request_id,
1543
1644
  :creation_time,
1544
- :modification_time)
1645
+ :modification_time,
1646
+ :qtype)
1545
1647
  SENSITIVE = []
1546
1648
  include Aws::Structure
1547
1649
  end
@@ -4972,6 +5074,39 @@ module Aws::Route53Resolver
4972
5074
  # The name of the rule.
4973
5075
  # @return [String]
4974
5076
  #
5077
+ # @!attribute [rw] qtype
5078
+ # The DNS query type you want the rule to evaluate. Allowed values
5079
+ # are;
5080
+ #
5081
+ # * A: Returns an IPv4 address.
5082
+ #
5083
+ # * AAAA: Returns an Ipv6 address.
5084
+ #
5085
+ # * CAA: Restricts CAs that can create SSL/TLS certifications for the
5086
+ # domain.
5087
+ #
5088
+ # * CNAME: Returns another domain name.
5089
+ #
5090
+ # * DS: Record that identifies the DNSSEC signing key of a delegated
5091
+ # zone.
5092
+ #
5093
+ # * MX: Specifies mail servers.
5094
+ #
5095
+ # * NAPTR: Regular-expression-based rewriting of domain names.
5096
+ #
5097
+ # * NS: Authoritative name servers.
5098
+ #
5099
+ # * PTR: Maps an IP address to a domain name.
5100
+ #
5101
+ # * SOA: Start of authority record for the zone.
5102
+ #
5103
+ # * SPF: Lists the servers authorized to send emails from a domain.
5104
+ #
5105
+ # * SRV: Application specific values that identify servers.
5106
+ #
5107
+ # * TXT: Verifies email senders and application-specific values.
5108
+ # @return [String]
5109
+ #
4975
5110
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
4976
5111
  #
4977
5112
  class UpdateFirewallRuleRequest < Struct.new(
@@ -4983,7 +5118,8 @@ module Aws::Route53Resolver
4983
5118
  :block_override_domain,
4984
5119
  :block_override_dns_type,
4985
5120
  :block_override_ttl,
4986
- :name)
5121
+ :name,
5122
+ :qtype)
4987
5123
  SENSITIVE = []
4988
5124
  include Aws::Structure
4989
5125
  end
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-route53resolver/customizations'
52
52
  # @!group service
53
53
  module Aws::Route53Resolver
54
54
 
55
- GEM_VERSION = '1.52.0'
55
+ GEM_VERSION = '1.54.0'
56
56
 
57
57
  end