aws-sdk-route53resolver 1.55.0 → 1.57.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-route53resolver/client.rb +70 -1
- data/lib/aws-sdk-route53resolver/client_api.rb +5 -0
- data/lib/aws-sdk-route53resolver/types.rb +93 -0
- data/lib/aws-sdk-route53resolver.rb +1 -1
- data/sig/client.rbs +2 -0
- data/sig/types.rbs +3 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ea6df74f22122a6568bf0aa3448ff267bac4f9a9b4036c854e9f0fde03df8ac6
|
4
|
+
data.tar.gz: 78bf710b31d0266eae5ec04fab18b132a322b3f6ec123ee08def4abc22fe8e71
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: db4692a109a21a2890261dd70c931b642a23ba37f981f55ed2ef6fd063882827bb5b5e0844d8e2713108b1cf67d82d1a12995f44b9ea1760b46989317e9c45dd
|
7
|
+
data.tar.gz: d24e16b14c06593fd9caea37ed53a3df9915cca506a8d2524621900b73ccf1943c0fbf2357c9f8da6751c9b7c825ed41250b0994b932e6efdada2f27fabfb4ba
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.57.0 (2024-05-09)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Update the DNS Firewall settings to correct a spelling issue.
|
8
|
+
|
9
|
+
1.56.0 (2024-04-30)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - Release of FirewallDomainRedirectionAction parameter on the Route 53 DNS Firewall Rule. This allows customers to configure a DNS Firewall rule to inspect all the domains in the DNS redirection chain (default) , such as CNAME, ALIAS, DNAME, etc., or just the first domain and trust the rest.
|
13
|
+
|
4
14
|
1.55.0 (2024-04-25)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.57.0
|
@@ -837,6 +837,18 @@ module Aws::Route53Resolver
|
|
837
837
|
# @option params [required, String] :name
|
838
838
|
# A name that lets you identify the rule in the rule group.
|
839
839
|
#
|
840
|
+
# @option params [String] :firewall_domain_redirection_action
|
841
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
842
|
+
# redirection chain, such as CNAME or DNAME.
|
843
|
+
#
|
844
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
845
|
+
# redirection chain. The individual domains in the redirection chain
|
846
|
+
# must be added to the domain list.
|
847
|
+
#
|
848
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
849
|
+
# redirection chain. You don't need to add the subsequent domains in
|
850
|
+
# the domain in the redirection list to the domain list.
|
851
|
+
#
|
840
852
|
# @option params [String] :qtype
|
841
853
|
# The DNS query type you want the rule to evaluate. Allowed values are;
|
842
854
|
#
|
@@ -868,6 +880,15 @@ module Aws::Route53Resolver
|
|
868
880
|
#
|
869
881
|
# * TXT: Verifies email senders and application-specific values.
|
870
882
|
#
|
883
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
884
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
885
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
886
|
+
# DNS record types][1].
|
887
|
+
#
|
888
|
+
#
|
889
|
+
#
|
890
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
891
|
+
#
|
871
892
|
# @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
872
893
|
#
|
873
894
|
# * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -885,6 +906,7 @@ module Aws::Route53Resolver
|
|
885
906
|
# block_override_dns_type: "CNAME", # accepts CNAME
|
886
907
|
# block_override_ttl: 1,
|
887
908
|
# name: "Name", # required
|
909
|
+
# firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
|
888
910
|
# qtype: "Qtype",
|
889
911
|
# })
|
890
912
|
#
|
@@ -902,6 +924,7 @@ module Aws::Route53Resolver
|
|
902
924
|
# resp.firewall_rule.creator_request_id #=> String
|
903
925
|
# resp.firewall_rule.creation_time #=> String
|
904
926
|
# resp.firewall_rule.modification_time #=> String
|
927
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
905
928
|
# resp.firewall_rule.qtype #=> String
|
906
929
|
#
|
907
930
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
|
@@ -1072,6 +1095,18 @@ module Aws::Route53Resolver
|
|
1072
1095
|
# outbound access, open the port that you're using for DNS queries on
|
1073
1096
|
# your network.
|
1074
1097
|
#
|
1098
|
+
# Some security group rules will cause your connection to be tracked.
|
1099
|
+
# For outbound resolver endpoint, it can potentially impact the maximum
|
1100
|
+
# queries per second from outbound endpoint to your target name server.
|
1101
|
+
# For inbound resolver endpoint, it can bring down the overall maximum
|
1102
|
+
# queries per second per IP address to as low as 1500. To avoid
|
1103
|
+
# connection tracking caused by security group, see [Untracked
|
1104
|
+
# connections][1].
|
1105
|
+
#
|
1106
|
+
#
|
1107
|
+
#
|
1108
|
+
# [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
|
1109
|
+
#
|
1075
1110
|
# @option params [required, String] :direction
|
1076
1111
|
# Specify the applicable value:
|
1077
1112
|
#
|
@@ -1484,6 +1519,15 @@ module Aws::Route53Resolver
|
|
1484
1519
|
#
|
1485
1520
|
# * TXT: Verifies email senders and application-specific values.
|
1486
1521
|
#
|
1522
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
1523
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
1524
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
1525
|
+
# DNS record types][1].
|
1526
|
+
#
|
1527
|
+
#
|
1528
|
+
#
|
1529
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
1530
|
+
#
|
1487
1531
|
# @return [Types::DeleteFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1488
1532
|
#
|
1489
1533
|
# * {Types::DeleteFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -1510,6 +1554,7 @@ module Aws::Route53Resolver
|
|
1510
1554
|
# resp.firewall_rule.creator_request_id #=> String
|
1511
1555
|
# resp.firewall_rule.creation_time #=> String
|
1512
1556
|
# resp.firewall_rule.modification_time #=> String
|
1557
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
1513
1558
|
# resp.firewall_rule.qtype #=> String
|
1514
1559
|
#
|
1515
1560
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
|
@@ -2990,6 +3035,7 @@ module Aws::Route53Resolver
|
|
2990
3035
|
# resp.firewall_rules[0].creator_request_id #=> String
|
2991
3036
|
# resp.firewall_rules[0].creation_time #=> String
|
2992
3037
|
# resp.firewall_rules[0].modification_time #=> String
|
3038
|
+
# resp.firewall_rules[0].firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
2993
3039
|
# resp.firewall_rules[0].qtype #=> String
|
2994
3040
|
#
|
2995
3041
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
|
@@ -4216,6 +4262,18 @@ module Aws::Route53Resolver
|
|
4216
4262
|
# @option params [String] :name
|
4217
4263
|
# The name of the rule.
|
4218
4264
|
#
|
4265
|
+
# @option params [String] :firewall_domain_redirection_action
|
4266
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
4267
|
+
# redirection chain, such as CNAME or DNAME.
|
4268
|
+
#
|
4269
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
4270
|
+
# redirection chain. The individual domains in the redirection chain
|
4271
|
+
# must be added to the domain list.
|
4272
|
+
#
|
4273
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
4274
|
+
# redirection chain. You don't need to add the subsequent domains in
|
4275
|
+
# the domain in the redirection list to the domain list.
|
4276
|
+
#
|
4219
4277
|
# @option params [String] :qtype
|
4220
4278
|
# The DNS query type you want the rule to evaluate. Allowed values are;
|
4221
4279
|
#
|
@@ -4247,6 +4305,15 @@ module Aws::Route53Resolver
|
|
4247
4305
|
#
|
4248
4306
|
# * TXT: Verifies email senders and application-specific values.
|
4249
4307
|
#
|
4308
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
4309
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
4310
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
4311
|
+
# DNS record types][1].
|
4312
|
+
#
|
4313
|
+
#
|
4314
|
+
#
|
4315
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
4316
|
+
#
|
4250
4317
|
# @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
4251
4318
|
#
|
4252
4319
|
# * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -4263,6 +4330,7 @@ module Aws::Route53Resolver
|
|
4263
4330
|
# block_override_dns_type: "CNAME", # accepts CNAME
|
4264
4331
|
# block_override_ttl: 1,
|
4265
4332
|
# name: "Name",
|
4333
|
+
# firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
|
4266
4334
|
# qtype: "Qtype",
|
4267
4335
|
# })
|
4268
4336
|
#
|
@@ -4280,6 +4348,7 @@ module Aws::Route53Resolver
|
|
4280
4348
|
# resp.firewall_rule.creator_request_id #=> String
|
4281
4349
|
# resp.firewall_rule.creation_time #=> String
|
4282
4350
|
# resp.firewall_rule.modification_time #=> String
|
4351
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
4283
4352
|
# resp.firewall_rule.qtype #=> String
|
4284
4353
|
#
|
4285
4354
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
|
@@ -4683,7 +4752,7 @@ module Aws::Route53Resolver
|
|
4683
4752
|
params: params,
|
4684
4753
|
config: config)
|
4685
4754
|
context[:gem_name] = 'aws-sdk-route53resolver'
|
4686
|
-
context[:gem_version] = '1.
|
4755
|
+
context[:gem_version] = '1.57.0'
|
4687
4756
|
Seahorse::Client::Request.new(handlers, context)
|
4688
4757
|
end
|
4689
4758
|
|
@@ -87,6 +87,7 @@ module Aws::Route53Resolver
|
|
87
87
|
FirewallDomainListMetadataList = Shapes::ListShape.new(name: 'FirewallDomainListMetadataList')
|
88
88
|
FirewallDomainListStatus = Shapes::StringShape.new(name: 'FirewallDomainListStatus')
|
89
89
|
FirewallDomainName = Shapes::StringShape.new(name: 'FirewallDomainName')
|
90
|
+
FirewallDomainRedirectionAction = Shapes::StringShape.new(name: 'FirewallDomainRedirectionAction')
|
90
91
|
FirewallDomainUpdateOperation = Shapes::StringShape.new(name: 'FirewallDomainUpdateOperation')
|
91
92
|
FirewallDomains = Shapes::ListShape.new(name: 'FirewallDomains')
|
92
93
|
FirewallFailOpenStatus = Shapes::StringShape.new(name: 'FirewallFailOpenStatus')
|
@@ -354,6 +355,7 @@ module Aws::Route53Resolver
|
|
354
355
|
CreateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
|
355
356
|
CreateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
|
356
357
|
CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
|
358
|
+
CreateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
|
357
359
|
CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
|
358
360
|
CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
|
359
361
|
|
@@ -529,6 +531,7 @@ module Aws::Route53Resolver
|
|
529
531
|
FirewallRule.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, location_name: "CreatorRequestId"))
|
530
532
|
FirewallRule.add_member(:creation_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "CreationTime"))
|
531
533
|
FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
|
534
|
+
FirewallRule.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction"))
|
532
535
|
FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
|
533
536
|
FirewallRule.struct_class = Types::FirewallRule
|
534
537
|
|
@@ -1103,6 +1106,7 @@ module Aws::Route53Resolver
|
|
1103
1106
|
UpdateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
|
1104
1107
|
UpdateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
|
1105
1108
|
UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
|
1109
|
+
UpdateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
|
1106
1110
|
UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
|
1107
1111
|
UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
|
1108
1112
|
|
@@ -1169,6 +1173,7 @@ module Aws::Route53Resolver
|
|
1169
1173
|
"endpointPrefix" => "route53resolver",
|
1170
1174
|
"jsonVersion" => "1.1",
|
1171
1175
|
"protocol" => "json",
|
1176
|
+
"protocols" => ["json"],
|
1172
1177
|
"serviceAbbreviation" => "Route53Resolver",
|
1173
1178
|
"serviceFullName" => "Amazon Route 53 Resolver",
|
1174
1179
|
"serviceId" => "Route53Resolver",
|
@@ -13,6 +13,9 @@ module Aws::Route53Resolver
|
|
13
13
|
# The current account doesn't have the IAM permissions required to
|
14
14
|
# perform the specified Resolver operation.
|
15
15
|
#
|
16
|
+
# This error can also be thrown when a customer has reached the 5120
|
17
|
+
# character limit for a resource policy for CloudWatch Logs.
|
18
|
+
#
|
16
19
|
# @!attribute [rw] message
|
17
20
|
# @return [String]
|
18
21
|
#
|
@@ -401,6 +404,19 @@ module Aws::Route53Resolver
|
|
401
404
|
# A name that lets you identify the rule in the rule group.
|
402
405
|
# @return [String]
|
403
406
|
#
|
407
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
408
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
409
|
+
# redirection chain, such as CNAME or DNAME.
|
410
|
+
#
|
411
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
412
|
+
# redirection chain. The individual domains in the redirection chain
|
413
|
+
# must be added to the domain list.
|
414
|
+
#
|
415
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
416
|
+
# redirection chain. You don't need to add the subsequent domains in
|
417
|
+
# the domain in the redirection list to the domain list.
|
418
|
+
# @return [String]
|
419
|
+
#
|
404
420
|
# @!attribute [rw] qtype
|
405
421
|
# The DNS query type you want the rule to evaluate. Allowed values
|
406
422
|
# are;
|
@@ -432,6 +448,15 @@ module Aws::Route53Resolver
|
|
432
448
|
# * SRV: Application specific values that identify servers.
|
433
449
|
#
|
434
450
|
# * TXT: Verifies email senders and application-specific values.
|
451
|
+
#
|
452
|
+
# * A query type you define by using the DNS type ID, for example 28
|
453
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
454
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
455
|
+
# see [List of DNS record types][1].
|
456
|
+
#
|
457
|
+
#
|
458
|
+
#
|
459
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
435
460
|
# @return [String]
|
436
461
|
#
|
437
462
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
|
@@ -447,6 +472,7 @@ module Aws::Route53Resolver
|
|
447
472
|
:block_override_dns_type,
|
448
473
|
:block_override_ttl,
|
449
474
|
:name,
|
475
|
+
:firewall_domain_redirection_action,
|
450
476
|
:qtype)
|
451
477
|
SENSITIVE = []
|
452
478
|
include Aws::Structure
|
@@ -543,6 +569,18 @@ module Aws::Route53Resolver
|
|
543
569
|
# outbound rules must allow TCP and UDP access. For inbound access,
|
544
570
|
# open port 53. For outbound access, open the port that you're using
|
545
571
|
# for DNS queries on your network.
|
572
|
+
#
|
573
|
+
# Some security group rules will cause your connection to be tracked.
|
574
|
+
# For outbound resolver endpoint, it can potentially impact the
|
575
|
+
# maximum queries per second from outbound endpoint to your target
|
576
|
+
# name server. For inbound resolver endpoint, it can bring down the
|
577
|
+
# overall maximum queries per second per IP address to as low as 1500.
|
578
|
+
# To avoid connection tracking caused by security group, see
|
579
|
+
# [Untracked connections][1].
|
580
|
+
#
|
581
|
+
#
|
582
|
+
#
|
583
|
+
# [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
|
546
584
|
# @return [Array<String>]
|
547
585
|
#
|
548
586
|
# @!attribute [rw] direction
|
@@ -887,6 +925,15 @@ module Aws::Route53Resolver
|
|
887
925
|
# * SRV: Application specific values that identify servers.
|
888
926
|
#
|
889
927
|
# * TXT: Verifies email senders and application-specific values.
|
928
|
+
#
|
929
|
+
# * A query type you define by using the DNS type ID, for example 28
|
930
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
931
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
932
|
+
# see [List of DNS record types][1].
|
933
|
+
#
|
934
|
+
#
|
935
|
+
#
|
936
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
890
937
|
# @return [String]
|
891
938
|
#
|
892
939
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRuleRequest AWS API Documentation
|
@@ -1595,6 +1642,19 @@ module Aws::Route53Resolver
|
|
1595
1642
|
# format and Coordinated Universal Time (UTC).
|
1596
1643
|
# @return [String]
|
1597
1644
|
#
|
1645
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
1646
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
1647
|
+
# redirection chain, such as CNAME or DNAME.
|
1648
|
+
#
|
1649
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
1650
|
+
# redirection chain. The individual domains in the redirection chain
|
1651
|
+
# must be added to the domain list.
|
1652
|
+
#
|
1653
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
1654
|
+
# redirection chain. You don't need to add the subsequent domains in
|
1655
|
+
# the domain in the redirection list to the domain list.
|
1656
|
+
# @return [String]
|
1657
|
+
#
|
1598
1658
|
# @!attribute [rw] qtype
|
1599
1659
|
# The DNS query type you want the rule to evaluate. Allowed values
|
1600
1660
|
# are;
|
@@ -1626,6 +1686,15 @@ module Aws::Route53Resolver
|
|
1626
1686
|
# * SRV: Application specific values that identify servers.
|
1627
1687
|
#
|
1628
1688
|
# * TXT: Verifies email senders and application-specific values.
|
1689
|
+
#
|
1690
|
+
# * A query type you define by using the DNS type ID, for example 28
|
1691
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
1692
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
1693
|
+
# see [List of DNS record types][1].
|
1694
|
+
#
|
1695
|
+
#
|
1696
|
+
#
|
1697
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
1629
1698
|
# @return [String]
|
1630
1699
|
#
|
1631
1700
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
|
@@ -1643,6 +1712,7 @@ module Aws::Route53Resolver
|
|
1643
1712
|
:creator_request_id,
|
1644
1713
|
:creation_time,
|
1645
1714
|
:modification_time,
|
1715
|
+
:firewall_domain_redirection_action,
|
1646
1716
|
:qtype)
|
1647
1717
|
SENSITIVE = []
|
1648
1718
|
include Aws::Structure
|
@@ -5074,6 +5144,19 @@ module Aws::Route53Resolver
|
|
5074
5144
|
# The name of the rule.
|
5075
5145
|
# @return [String]
|
5076
5146
|
#
|
5147
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
5148
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
5149
|
+
# redirection chain, such as CNAME or DNAME.
|
5150
|
+
#
|
5151
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
5152
|
+
# redirection chain. The individual domains in the redirection chain
|
5153
|
+
# must be added to the domain list.
|
5154
|
+
#
|
5155
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
5156
|
+
# redirection chain. You don't need to add the subsequent domains in
|
5157
|
+
# the domain in the redirection list to the domain list.
|
5158
|
+
# @return [String]
|
5159
|
+
#
|
5077
5160
|
# @!attribute [rw] qtype
|
5078
5161
|
# The DNS query type you want the rule to evaluate. Allowed values
|
5079
5162
|
# are;
|
@@ -5105,6 +5188,15 @@ module Aws::Route53Resolver
|
|
5105
5188
|
# * SRV: Application specific values that identify servers.
|
5106
5189
|
#
|
5107
5190
|
# * TXT: Verifies email senders and application-specific values.
|
5191
|
+
#
|
5192
|
+
# * A query type you define by using the DNS type ID, for example 28
|
5193
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
5194
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
5195
|
+
# see [List of DNS record types][1].
|
5196
|
+
#
|
5197
|
+
#
|
5198
|
+
#
|
5199
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
5108
5200
|
# @return [String]
|
5109
5201
|
#
|
5110
5202
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
|
@@ -5119,6 +5211,7 @@ module Aws::Route53Resolver
|
|
5119
5211
|
:block_override_dns_type,
|
5120
5212
|
:block_override_ttl,
|
5121
5213
|
:name,
|
5214
|
+
:firewall_domain_redirection_action,
|
5122
5215
|
:qtype)
|
5123
5216
|
SENSITIVE = []
|
5124
5217
|
include Aws::Structure
|
data/sig/client.rbs
CHANGED
@@ -166,6 +166,7 @@ module Aws
|
|
166
166
|
?block_override_dns_type: ("CNAME"),
|
167
167
|
?block_override_ttl: ::Integer,
|
168
168
|
name: ::String,
|
169
|
+
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
169
170
|
?qtype: ::String
|
170
171
|
) -> _CreateFirewallRuleResponseSuccess
|
171
172
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
|
@@ -918,6 +919,7 @@ module Aws
|
|
918
919
|
?block_override_dns_type: ("CNAME"),
|
919
920
|
?block_override_ttl: ::Integer,
|
920
921
|
?name: ::String,
|
922
|
+
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
921
923
|
?qtype: ::String
|
922
924
|
) -> _UpdateFirewallRuleResponseSuccess
|
923
925
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -103,6 +103,7 @@ module Aws::Route53Resolver
|
|
103
103
|
attr_accessor block_override_dns_type: ("CNAME")
|
104
104
|
attr_accessor block_override_ttl: ::Integer
|
105
105
|
attr_accessor name: ::String
|
106
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
106
107
|
attr_accessor qtype: ::String
|
107
108
|
SENSITIVE: []
|
108
109
|
end
|
@@ -340,6 +341,7 @@ module Aws::Route53Resolver
|
|
340
341
|
attr_accessor creator_request_id: ::String
|
341
342
|
attr_accessor creation_time: ::String
|
342
343
|
attr_accessor modification_time: ::String
|
344
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
343
345
|
attr_accessor qtype: ::String
|
344
346
|
SENSITIVE: []
|
345
347
|
end
|
@@ -1100,6 +1102,7 @@ module Aws::Route53Resolver
|
|
1100
1102
|
attr_accessor block_override_dns_type: ("CNAME")
|
1101
1103
|
attr_accessor block_override_ttl: ::Integer
|
1102
1104
|
attr_accessor name: ::String
|
1105
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
1103
1106
|
attr_accessor qtype: ::String
|
1104
1107
|
SENSITIVE: []
|
1105
1108
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-route53resolver
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.57.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-05-09 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|