aws-sdk-route53resolver 1.55.0 → 1.57.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 64fe753f55b9a7ddc5973160322750c22693f6b548df2fa97b6dd5606dbd934e
4
- data.tar.gz: ba037006bc592cc87fe92f74d730ad9cf534c2406d0fc7b34d7e0415901cfa5c
3
+ metadata.gz: ea6df74f22122a6568bf0aa3448ff267bac4f9a9b4036c854e9f0fde03df8ac6
4
+ data.tar.gz: 78bf710b31d0266eae5ec04fab18b132a322b3f6ec123ee08def4abc22fe8e71
5
5
  SHA512:
6
- metadata.gz: 6e2253a1844ad9bdca630fda0955b70a2583fc319664463f8ebb6841fe9c169ffaa0758d6d1559ed2a64a3684e19a438271912f66f6027fa03b481c3fff3244b
7
- data.tar.gz: '019105861157819de394b69c7f46c0e1c503b48a1b9dda916f14fbf788abe7a2b34d0f6061e84bf84d6dcbd273ee713097b74a93a2f9c10b65c083059dd31a89'
6
+ metadata.gz: db4692a109a21a2890261dd70c931b642a23ba37f981f55ed2ef6fd063882827bb5b5e0844d8e2713108b1cf67d82d1a12995f44b9ea1760b46989317e9c45dd
7
+ data.tar.gz: d24e16b14c06593fd9caea37ed53a3df9915cca506a8d2524621900b73ccf1943c0fbf2357c9f8da6751c9b7c825ed41250b0994b932e6efdada2f27fabfb4ba
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.57.0 (2024-05-09)
5
+ ------------------
6
+
7
+ * Feature - Update the DNS Firewall settings to correct a spelling issue.
8
+
9
+ 1.56.0 (2024-04-30)
10
+ ------------------
11
+
12
+ * Feature - Release of FirewallDomainRedirectionAction parameter on the Route 53 DNS Firewall Rule. This allows customers to configure a DNS Firewall rule to inspect all the domains in the DNS redirection chain (default) , such as CNAME, ALIAS, DNAME, etc., or just the first domain and trust the rest.
13
+
4
14
  1.55.0 (2024-04-25)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.55.0
1
+ 1.57.0
@@ -837,6 +837,18 @@ module Aws::Route53Resolver
837
837
  # @option params [required, String] :name
838
838
  # A name that lets you identify the rule in the rule group.
839
839
  #
840
+ # @option params [String] :firewall_domain_redirection_action
841
+ # How you want the the rule to evaluate DNS redirection in the DNS
842
+ # redirection chain, such as CNAME or DNAME.
843
+ #
844
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
845
+ # redirection chain. The individual domains in the redirection chain
846
+ # must be added to the domain list.
847
+ #
848
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
849
+ # redirection chain. You don't need to add the subsequent domains in
850
+ # the domain in the redirection list to the domain list.
851
+ #
840
852
  # @option params [String] :qtype
841
853
  # The DNS query type you want the rule to evaluate. Allowed values are;
842
854
  #
@@ -868,6 +880,15 @@ module Aws::Route53Resolver
868
880
  #
869
881
  # * TXT: Verifies email senders and application-specific values.
870
882
  #
883
+ # * A query type you define by using the DNS type ID, for example 28 for
884
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
885
+ # be 1-65334, for example, TYPE28. For more information, see [List of
886
+ # DNS record types][1].
887
+ #
888
+ #
889
+ #
890
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
891
+ #
871
892
  # @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
872
893
  #
873
894
  # * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -885,6 +906,7 @@ module Aws::Route53Resolver
885
906
  # block_override_dns_type: "CNAME", # accepts CNAME
886
907
  # block_override_ttl: 1,
887
908
  # name: "Name", # required
909
+ # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
888
910
  # qtype: "Qtype",
889
911
  # })
890
912
  #
@@ -902,6 +924,7 @@ module Aws::Route53Resolver
902
924
  # resp.firewall_rule.creator_request_id #=> String
903
925
  # resp.firewall_rule.creation_time #=> String
904
926
  # resp.firewall_rule.modification_time #=> String
927
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
905
928
  # resp.firewall_rule.qtype #=> String
906
929
  #
907
930
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
@@ -1072,6 +1095,18 @@ module Aws::Route53Resolver
1072
1095
  # outbound access, open the port that you're using for DNS queries on
1073
1096
  # your network.
1074
1097
  #
1098
+ # Some security group rules will cause your connection to be tracked.
1099
+ # For outbound resolver endpoint, it can potentially impact the maximum
1100
+ # queries per second from outbound endpoint to your target name server.
1101
+ # For inbound resolver endpoint, it can bring down the overall maximum
1102
+ # queries per second per IP address to as low as 1500. To avoid
1103
+ # connection tracking caused by security group, see [Untracked
1104
+ # connections][1].
1105
+ #
1106
+ #
1107
+ #
1108
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
1109
+ #
1075
1110
  # @option params [required, String] :direction
1076
1111
  # Specify the applicable value:
1077
1112
  #
@@ -1484,6 +1519,15 @@ module Aws::Route53Resolver
1484
1519
  #
1485
1520
  # * TXT: Verifies email senders and application-specific values.
1486
1521
  #
1522
+ # * A query type you define by using the DNS type ID, for example 28 for
1523
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
1524
+ # be 1-65334, for example, TYPE28. For more information, see [List of
1525
+ # DNS record types][1].
1526
+ #
1527
+ #
1528
+ #
1529
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
1530
+ #
1487
1531
  # @return [Types::DeleteFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1488
1532
  #
1489
1533
  # * {Types::DeleteFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -1510,6 +1554,7 @@ module Aws::Route53Resolver
1510
1554
  # resp.firewall_rule.creator_request_id #=> String
1511
1555
  # resp.firewall_rule.creation_time #=> String
1512
1556
  # resp.firewall_rule.modification_time #=> String
1557
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
1513
1558
  # resp.firewall_rule.qtype #=> String
1514
1559
  #
1515
1560
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
@@ -2990,6 +3035,7 @@ module Aws::Route53Resolver
2990
3035
  # resp.firewall_rules[0].creator_request_id #=> String
2991
3036
  # resp.firewall_rules[0].creation_time #=> String
2992
3037
  # resp.firewall_rules[0].modification_time #=> String
3038
+ # resp.firewall_rules[0].firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
2993
3039
  # resp.firewall_rules[0].qtype #=> String
2994
3040
  #
2995
3041
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
@@ -4216,6 +4262,18 @@ module Aws::Route53Resolver
4216
4262
  # @option params [String] :name
4217
4263
  # The name of the rule.
4218
4264
  #
4265
+ # @option params [String] :firewall_domain_redirection_action
4266
+ # How you want the the rule to evaluate DNS redirection in the DNS
4267
+ # redirection chain, such as CNAME or DNAME.
4268
+ #
4269
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
4270
+ # redirection chain. The individual domains in the redirection chain
4271
+ # must be added to the domain list.
4272
+ #
4273
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
4274
+ # redirection chain. You don't need to add the subsequent domains in
4275
+ # the domain in the redirection list to the domain list.
4276
+ #
4219
4277
  # @option params [String] :qtype
4220
4278
  # The DNS query type you want the rule to evaluate. Allowed values are;
4221
4279
  #
@@ -4247,6 +4305,15 @@ module Aws::Route53Resolver
4247
4305
  #
4248
4306
  # * TXT: Verifies email senders and application-specific values.
4249
4307
  #
4308
+ # * A query type you define by using the DNS type ID, for example 28 for
4309
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
4310
+ # be 1-65334, for example, TYPE28. For more information, see [List of
4311
+ # DNS record types][1].
4312
+ #
4313
+ #
4314
+ #
4315
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
4316
+ #
4250
4317
  # @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4251
4318
  #
4252
4319
  # * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -4263,6 +4330,7 @@ module Aws::Route53Resolver
4263
4330
  # block_override_dns_type: "CNAME", # accepts CNAME
4264
4331
  # block_override_ttl: 1,
4265
4332
  # name: "Name",
4333
+ # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
4266
4334
  # qtype: "Qtype",
4267
4335
  # })
4268
4336
  #
@@ -4280,6 +4348,7 @@ module Aws::Route53Resolver
4280
4348
  # resp.firewall_rule.creator_request_id #=> String
4281
4349
  # resp.firewall_rule.creation_time #=> String
4282
4350
  # resp.firewall_rule.modification_time #=> String
4351
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
4283
4352
  # resp.firewall_rule.qtype #=> String
4284
4353
  #
4285
4354
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
@@ -4683,7 +4752,7 @@ module Aws::Route53Resolver
4683
4752
  params: params,
4684
4753
  config: config)
4685
4754
  context[:gem_name] = 'aws-sdk-route53resolver'
4686
- context[:gem_version] = '1.55.0'
4755
+ context[:gem_version] = '1.57.0'
4687
4756
  Seahorse::Client::Request.new(handlers, context)
4688
4757
  end
4689
4758
 
@@ -87,6 +87,7 @@ module Aws::Route53Resolver
87
87
  FirewallDomainListMetadataList = Shapes::ListShape.new(name: 'FirewallDomainListMetadataList')
88
88
  FirewallDomainListStatus = Shapes::StringShape.new(name: 'FirewallDomainListStatus')
89
89
  FirewallDomainName = Shapes::StringShape.new(name: 'FirewallDomainName')
90
+ FirewallDomainRedirectionAction = Shapes::StringShape.new(name: 'FirewallDomainRedirectionAction')
90
91
  FirewallDomainUpdateOperation = Shapes::StringShape.new(name: 'FirewallDomainUpdateOperation')
91
92
  FirewallDomains = Shapes::ListShape.new(name: 'FirewallDomains')
92
93
  FirewallFailOpenStatus = Shapes::StringShape.new(name: 'FirewallFailOpenStatus')
@@ -354,6 +355,7 @@ module Aws::Route53Resolver
354
355
  CreateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
355
356
  CreateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
356
357
  CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
358
+ CreateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
357
359
  CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
358
360
  CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
359
361
 
@@ -529,6 +531,7 @@ module Aws::Route53Resolver
529
531
  FirewallRule.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, location_name: "CreatorRequestId"))
530
532
  FirewallRule.add_member(:creation_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "CreationTime"))
531
533
  FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
534
+ FirewallRule.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction"))
532
535
  FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
533
536
  FirewallRule.struct_class = Types::FirewallRule
534
537
 
@@ -1103,6 +1106,7 @@ module Aws::Route53Resolver
1103
1106
  UpdateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
1104
1107
  UpdateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
1105
1108
  UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
1109
+ UpdateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
1106
1110
  UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
1107
1111
  UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
1108
1112
 
@@ -1169,6 +1173,7 @@ module Aws::Route53Resolver
1169
1173
  "endpointPrefix" => "route53resolver",
1170
1174
  "jsonVersion" => "1.1",
1171
1175
  "protocol" => "json",
1176
+ "protocols" => ["json"],
1172
1177
  "serviceAbbreviation" => "Route53Resolver",
1173
1178
  "serviceFullName" => "Amazon Route 53 Resolver",
1174
1179
  "serviceId" => "Route53Resolver",
@@ -13,6 +13,9 @@ module Aws::Route53Resolver
13
13
  # The current account doesn't have the IAM permissions required to
14
14
  # perform the specified Resolver operation.
15
15
  #
16
+ # This error can also be thrown when a customer has reached the 5120
17
+ # character limit for a resource policy for CloudWatch Logs.
18
+ #
16
19
  # @!attribute [rw] message
17
20
  # @return [String]
18
21
  #
@@ -401,6 +404,19 @@ module Aws::Route53Resolver
401
404
  # A name that lets you identify the rule in the rule group.
402
405
  # @return [String]
403
406
  #
407
+ # @!attribute [rw] firewall_domain_redirection_action
408
+ # How you want the the rule to evaluate DNS redirection in the DNS
409
+ # redirection chain, such as CNAME or DNAME.
410
+ #
411
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
412
+ # redirection chain. The individual domains in the redirection chain
413
+ # must be added to the domain list.
414
+ #
415
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
416
+ # redirection chain. You don't need to add the subsequent domains in
417
+ # the domain in the redirection list to the domain list.
418
+ # @return [String]
419
+ #
404
420
  # @!attribute [rw] qtype
405
421
  # The DNS query type you want the rule to evaluate. Allowed values
406
422
  # are;
@@ -432,6 +448,15 @@ module Aws::Route53Resolver
432
448
  # * SRV: Application specific values that identify servers.
433
449
  #
434
450
  # * TXT: Verifies email senders and application-specific values.
451
+ #
452
+ # * A query type you define by using the DNS type ID, for example 28
453
+ # for AAAA. The values must be defined as TYPENUMBER, where the
454
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
455
+ # see [List of DNS record types][1].
456
+ #
457
+ #
458
+ #
459
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
435
460
  # @return [String]
436
461
  #
437
462
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
@@ -447,6 +472,7 @@ module Aws::Route53Resolver
447
472
  :block_override_dns_type,
448
473
  :block_override_ttl,
449
474
  :name,
475
+ :firewall_domain_redirection_action,
450
476
  :qtype)
451
477
  SENSITIVE = []
452
478
  include Aws::Structure
@@ -543,6 +569,18 @@ module Aws::Route53Resolver
543
569
  # outbound rules must allow TCP and UDP access. For inbound access,
544
570
  # open port 53. For outbound access, open the port that you're using
545
571
  # for DNS queries on your network.
572
+ #
573
+ # Some security group rules will cause your connection to be tracked.
574
+ # For outbound resolver endpoint, it can potentially impact the
575
+ # maximum queries per second from outbound endpoint to your target
576
+ # name server. For inbound resolver endpoint, it can bring down the
577
+ # overall maximum queries per second per IP address to as low as 1500.
578
+ # To avoid connection tracking caused by security group, see
579
+ # [Untracked connections][1].
580
+ #
581
+ #
582
+ #
583
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
546
584
  # @return [Array<String>]
547
585
  #
548
586
  # @!attribute [rw] direction
@@ -887,6 +925,15 @@ module Aws::Route53Resolver
887
925
  # * SRV: Application specific values that identify servers.
888
926
  #
889
927
  # * TXT: Verifies email senders and application-specific values.
928
+ #
929
+ # * A query type you define by using the DNS type ID, for example 28
930
+ # for AAAA. The values must be defined as TYPENUMBER, where the
931
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
932
+ # see [List of DNS record types][1].
933
+ #
934
+ #
935
+ #
936
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
890
937
  # @return [String]
891
938
  #
892
939
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRuleRequest AWS API Documentation
@@ -1595,6 +1642,19 @@ module Aws::Route53Resolver
1595
1642
  # format and Coordinated Universal Time (UTC).
1596
1643
  # @return [String]
1597
1644
  #
1645
+ # @!attribute [rw] firewall_domain_redirection_action
1646
+ # How you want the the rule to evaluate DNS redirection in the DNS
1647
+ # redirection chain, such as CNAME or DNAME.
1648
+ #
1649
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
1650
+ # redirection chain. The individual domains in the redirection chain
1651
+ # must be added to the domain list.
1652
+ #
1653
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
1654
+ # redirection chain. You don't need to add the subsequent domains in
1655
+ # the domain in the redirection list to the domain list.
1656
+ # @return [String]
1657
+ #
1598
1658
  # @!attribute [rw] qtype
1599
1659
  # The DNS query type you want the rule to evaluate. Allowed values
1600
1660
  # are;
@@ -1626,6 +1686,15 @@ module Aws::Route53Resolver
1626
1686
  # * SRV: Application specific values that identify servers.
1627
1687
  #
1628
1688
  # * TXT: Verifies email senders and application-specific values.
1689
+ #
1690
+ # * A query type you define by using the DNS type ID, for example 28
1691
+ # for AAAA. The values must be defined as TYPENUMBER, where the
1692
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
1693
+ # see [List of DNS record types][1].
1694
+ #
1695
+ #
1696
+ #
1697
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
1629
1698
  # @return [String]
1630
1699
  #
1631
1700
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
@@ -1643,6 +1712,7 @@ module Aws::Route53Resolver
1643
1712
  :creator_request_id,
1644
1713
  :creation_time,
1645
1714
  :modification_time,
1715
+ :firewall_domain_redirection_action,
1646
1716
  :qtype)
1647
1717
  SENSITIVE = []
1648
1718
  include Aws::Structure
@@ -5074,6 +5144,19 @@ module Aws::Route53Resolver
5074
5144
  # The name of the rule.
5075
5145
  # @return [String]
5076
5146
  #
5147
+ # @!attribute [rw] firewall_domain_redirection_action
5148
+ # How you want the the rule to evaluate DNS redirection in the DNS
5149
+ # redirection chain, such as CNAME or DNAME.
5150
+ #
5151
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
5152
+ # redirection chain. The individual domains in the redirection chain
5153
+ # must be added to the domain list.
5154
+ #
5155
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
5156
+ # redirection chain. You don't need to add the subsequent domains in
5157
+ # the domain in the redirection list to the domain list.
5158
+ # @return [String]
5159
+ #
5077
5160
  # @!attribute [rw] qtype
5078
5161
  # The DNS query type you want the rule to evaluate. Allowed values
5079
5162
  # are;
@@ -5105,6 +5188,15 @@ module Aws::Route53Resolver
5105
5188
  # * SRV: Application specific values that identify servers.
5106
5189
  #
5107
5190
  # * TXT: Verifies email senders and application-specific values.
5191
+ #
5192
+ # * A query type you define by using the DNS type ID, for example 28
5193
+ # for AAAA. The values must be defined as TYPENUMBER, where the
5194
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
5195
+ # see [List of DNS record types][1].
5196
+ #
5197
+ #
5198
+ #
5199
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
5108
5200
  # @return [String]
5109
5201
  #
5110
5202
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
@@ -5119,6 +5211,7 @@ module Aws::Route53Resolver
5119
5211
  :block_override_dns_type,
5120
5212
  :block_override_ttl,
5121
5213
  :name,
5214
+ :firewall_domain_redirection_action,
5122
5215
  :qtype)
5123
5216
  SENSITIVE = []
5124
5217
  include Aws::Structure
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-route53resolver/customizations'
52
52
  # @!group service
53
53
  module Aws::Route53Resolver
54
54
 
55
- GEM_VERSION = '1.55.0'
55
+ GEM_VERSION = '1.57.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -166,6 +166,7 @@ module Aws
166
166
  ?block_override_dns_type: ("CNAME"),
167
167
  ?block_override_ttl: ::Integer,
168
168
  name: ::String,
169
+ ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
169
170
  ?qtype: ::String
170
171
  ) -> _CreateFirewallRuleResponseSuccess
171
172
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
@@ -918,6 +919,7 @@ module Aws
918
919
  ?block_override_dns_type: ("CNAME"),
919
920
  ?block_override_ttl: ::Integer,
920
921
  ?name: ::String,
922
+ ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
921
923
  ?qtype: ::String
922
924
  ) -> _UpdateFirewallRuleResponseSuccess
923
925
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
data/sig/types.rbs CHANGED
@@ -103,6 +103,7 @@ module Aws::Route53Resolver
103
103
  attr_accessor block_override_dns_type: ("CNAME")
104
104
  attr_accessor block_override_ttl: ::Integer
105
105
  attr_accessor name: ::String
106
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
106
107
  attr_accessor qtype: ::String
107
108
  SENSITIVE: []
108
109
  end
@@ -340,6 +341,7 @@ module Aws::Route53Resolver
340
341
  attr_accessor creator_request_id: ::String
341
342
  attr_accessor creation_time: ::String
342
343
  attr_accessor modification_time: ::String
344
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
343
345
  attr_accessor qtype: ::String
344
346
  SENSITIVE: []
345
347
  end
@@ -1100,6 +1102,7 @@ module Aws::Route53Resolver
1100
1102
  attr_accessor block_override_dns_type: ("CNAME")
1101
1103
  attr_accessor block_override_ttl: ::Integer
1102
1104
  attr_accessor name: ::String
1105
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
1103
1106
  attr_accessor qtype: ::String
1104
1107
  SENSITIVE: []
1105
1108
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-route53resolver
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.55.0
4
+ version: 1.57.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-25 00:00:00.000000000 Z
11
+ date: 2024-05-09 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core