aws-sdk-route53resolver 1.71.0 → 1.73.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-route53resolver/client.rb +91 -18
- data/lib/aws-sdk-route53resolver/client_api.rb +15 -3
- data/lib/aws-sdk-route53resolver/endpoint_parameters.rb +9 -6
- data/lib/aws-sdk-route53resolver/endpoints.rb +2 -746
- data/lib/aws-sdk-route53resolver/plugins/endpoints.rb +1 -142
- data/lib/aws-sdk-route53resolver/types.rb +125 -46
- data/lib/aws-sdk-route53resolver.rb +1 -1
- data/sig/client.rbs +11 -5
- data/sig/types.rbs +9 -0
- metadata +4 -4
@@ -27,7 +27,7 @@ The endpoint provider used to resolve endpoints. Any object that responds to
|
|
27
27
|
class Handler < Seahorse::Client::Handler
|
28
28
|
def call(context)
|
29
29
|
unless context[:discovered_endpoint]
|
30
|
-
params = parameters_for_operation(context)
|
30
|
+
params = Aws::Route53Resolver::Endpoints.parameters_for_operation(context)
|
31
31
|
endpoint = context.config.endpoint_provider.resolve_endpoint(params)
|
32
32
|
|
33
33
|
context.http_request.endpoint = endpoint.url
|
@@ -67,147 +67,6 @@ The endpoint provider used to resolve endpoints. Any object that responds to
|
|
67
67
|
context.http_request.headers[key] = value
|
68
68
|
end
|
69
69
|
end
|
70
|
-
|
71
|
-
def parameters_for_operation(context)
|
72
|
-
case context.operation_name
|
73
|
-
when :associate_firewall_rule_group
|
74
|
-
Aws::Route53Resolver::Endpoints::AssociateFirewallRuleGroup.build(context)
|
75
|
-
when :associate_resolver_endpoint_ip_address
|
76
|
-
Aws::Route53Resolver::Endpoints::AssociateResolverEndpointIpAddress.build(context)
|
77
|
-
when :associate_resolver_query_log_config
|
78
|
-
Aws::Route53Resolver::Endpoints::AssociateResolverQueryLogConfig.build(context)
|
79
|
-
when :associate_resolver_rule
|
80
|
-
Aws::Route53Resolver::Endpoints::AssociateResolverRule.build(context)
|
81
|
-
when :create_firewall_domain_list
|
82
|
-
Aws::Route53Resolver::Endpoints::CreateFirewallDomainList.build(context)
|
83
|
-
when :create_firewall_rule
|
84
|
-
Aws::Route53Resolver::Endpoints::CreateFirewallRule.build(context)
|
85
|
-
when :create_firewall_rule_group
|
86
|
-
Aws::Route53Resolver::Endpoints::CreateFirewallRuleGroup.build(context)
|
87
|
-
when :create_outpost_resolver
|
88
|
-
Aws::Route53Resolver::Endpoints::CreateOutpostResolver.build(context)
|
89
|
-
when :create_resolver_endpoint
|
90
|
-
Aws::Route53Resolver::Endpoints::CreateResolverEndpoint.build(context)
|
91
|
-
when :create_resolver_query_log_config
|
92
|
-
Aws::Route53Resolver::Endpoints::CreateResolverQueryLogConfig.build(context)
|
93
|
-
when :create_resolver_rule
|
94
|
-
Aws::Route53Resolver::Endpoints::CreateResolverRule.build(context)
|
95
|
-
when :delete_firewall_domain_list
|
96
|
-
Aws::Route53Resolver::Endpoints::DeleteFirewallDomainList.build(context)
|
97
|
-
when :delete_firewall_rule
|
98
|
-
Aws::Route53Resolver::Endpoints::DeleteFirewallRule.build(context)
|
99
|
-
when :delete_firewall_rule_group
|
100
|
-
Aws::Route53Resolver::Endpoints::DeleteFirewallRuleGroup.build(context)
|
101
|
-
when :delete_outpost_resolver
|
102
|
-
Aws::Route53Resolver::Endpoints::DeleteOutpostResolver.build(context)
|
103
|
-
when :delete_resolver_endpoint
|
104
|
-
Aws::Route53Resolver::Endpoints::DeleteResolverEndpoint.build(context)
|
105
|
-
when :delete_resolver_query_log_config
|
106
|
-
Aws::Route53Resolver::Endpoints::DeleteResolverQueryLogConfig.build(context)
|
107
|
-
when :delete_resolver_rule
|
108
|
-
Aws::Route53Resolver::Endpoints::DeleteResolverRule.build(context)
|
109
|
-
when :disassociate_firewall_rule_group
|
110
|
-
Aws::Route53Resolver::Endpoints::DisassociateFirewallRuleGroup.build(context)
|
111
|
-
when :disassociate_resolver_endpoint_ip_address
|
112
|
-
Aws::Route53Resolver::Endpoints::DisassociateResolverEndpointIpAddress.build(context)
|
113
|
-
when :disassociate_resolver_query_log_config
|
114
|
-
Aws::Route53Resolver::Endpoints::DisassociateResolverQueryLogConfig.build(context)
|
115
|
-
when :disassociate_resolver_rule
|
116
|
-
Aws::Route53Resolver::Endpoints::DisassociateResolverRule.build(context)
|
117
|
-
when :get_firewall_config
|
118
|
-
Aws::Route53Resolver::Endpoints::GetFirewallConfig.build(context)
|
119
|
-
when :get_firewall_domain_list
|
120
|
-
Aws::Route53Resolver::Endpoints::GetFirewallDomainList.build(context)
|
121
|
-
when :get_firewall_rule_group
|
122
|
-
Aws::Route53Resolver::Endpoints::GetFirewallRuleGroup.build(context)
|
123
|
-
when :get_firewall_rule_group_association
|
124
|
-
Aws::Route53Resolver::Endpoints::GetFirewallRuleGroupAssociation.build(context)
|
125
|
-
when :get_firewall_rule_group_policy
|
126
|
-
Aws::Route53Resolver::Endpoints::GetFirewallRuleGroupPolicy.build(context)
|
127
|
-
when :get_outpost_resolver
|
128
|
-
Aws::Route53Resolver::Endpoints::GetOutpostResolver.build(context)
|
129
|
-
when :get_resolver_config
|
130
|
-
Aws::Route53Resolver::Endpoints::GetResolverConfig.build(context)
|
131
|
-
when :get_resolver_dnssec_config
|
132
|
-
Aws::Route53Resolver::Endpoints::GetResolverDnssecConfig.build(context)
|
133
|
-
when :get_resolver_endpoint
|
134
|
-
Aws::Route53Resolver::Endpoints::GetResolverEndpoint.build(context)
|
135
|
-
when :get_resolver_query_log_config
|
136
|
-
Aws::Route53Resolver::Endpoints::GetResolverQueryLogConfig.build(context)
|
137
|
-
when :get_resolver_query_log_config_association
|
138
|
-
Aws::Route53Resolver::Endpoints::GetResolverQueryLogConfigAssociation.build(context)
|
139
|
-
when :get_resolver_query_log_config_policy
|
140
|
-
Aws::Route53Resolver::Endpoints::GetResolverQueryLogConfigPolicy.build(context)
|
141
|
-
when :get_resolver_rule
|
142
|
-
Aws::Route53Resolver::Endpoints::GetResolverRule.build(context)
|
143
|
-
when :get_resolver_rule_association
|
144
|
-
Aws::Route53Resolver::Endpoints::GetResolverRuleAssociation.build(context)
|
145
|
-
when :get_resolver_rule_policy
|
146
|
-
Aws::Route53Resolver::Endpoints::GetResolverRulePolicy.build(context)
|
147
|
-
when :import_firewall_domains
|
148
|
-
Aws::Route53Resolver::Endpoints::ImportFirewallDomains.build(context)
|
149
|
-
when :list_firewall_configs
|
150
|
-
Aws::Route53Resolver::Endpoints::ListFirewallConfigs.build(context)
|
151
|
-
when :list_firewall_domain_lists
|
152
|
-
Aws::Route53Resolver::Endpoints::ListFirewallDomainLists.build(context)
|
153
|
-
when :list_firewall_domains
|
154
|
-
Aws::Route53Resolver::Endpoints::ListFirewallDomains.build(context)
|
155
|
-
when :list_firewall_rule_group_associations
|
156
|
-
Aws::Route53Resolver::Endpoints::ListFirewallRuleGroupAssociations.build(context)
|
157
|
-
when :list_firewall_rule_groups
|
158
|
-
Aws::Route53Resolver::Endpoints::ListFirewallRuleGroups.build(context)
|
159
|
-
when :list_firewall_rules
|
160
|
-
Aws::Route53Resolver::Endpoints::ListFirewallRules.build(context)
|
161
|
-
when :list_outpost_resolvers
|
162
|
-
Aws::Route53Resolver::Endpoints::ListOutpostResolvers.build(context)
|
163
|
-
when :list_resolver_configs
|
164
|
-
Aws::Route53Resolver::Endpoints::ListResolverConfigs.build(context)
|
165
|
-
when :list_resolver_dnssec_configs
|
166
|
-
Aws::Route53Resolver::Endpoints::ListResolverDnssecConfigs.build(context)
|
167
|
-
when :list_resolver_endpoint_ip_addresses
|
168
|
-
Aws::Route53Resolver::Endpoints::ListResolverEndpointIpAddresses.build(context)
|
169
|
-
when :list_resolver_endpoints
|
170
|
-
Aws::Route53Resolver::Endpoints::ListResolverEndpoints.build(context)
|
171
|
-
when :list_resolver_query_log_config_associations
|
172
|
-
Aws::Route53Resolver::Endpoints::ListResolverQueryLogConfigAssociations.build(context)
|
173
|
-
when :list_resolver_query_log_configs
|
174
|
-
Aws::Route53Resolver::Endpoints::ListResolverQueryLogConfigs.build(context)
|
175
|
-
when :list_resolver_rule_associations
|
176
|
-
Aws::Route53Resolver::Endpoints::ListResolverRuleAssociations.build(context)
|
177
|
-
when :list_resolver_rules
|
178
|
-
Aws::Route53Resolver::Endpoints::ListResolverRules.build(context)
|
179
|
-
when :list_tags_for_resource
|
180
|
-
Aws::Route53Resolver::Endpoints::ListTagsForResource.build(context)
|
181
|
-
when :put_firewall_rule_group_policy
|
182
|
-
Aws::Route53Resolver::Endpoints::PutFirewallRuleGroupPolicy.build(context)
|
183
|
-
when :put_resolver_query_log_config_policy
|
184
|
-
Aws::Route53Resolver::Endpoints::PutResolverQueryLogConfigPolicy.build(context)
|
185
|
-
when :put_resolver_rule_policy
|
186
|
-
Aws::Route53Resolver::Endpoints::PutResolverRulePolicy.build(context)
|
187
|
-
when :tag_resource
|
188
|
-
Aws::Route53Resolver::Endpoints::TagResource.build(context)
|
189
|
-
when :untag_resource
|
190
|
-
Aws::Route53Resolver::Endpoints::UntagResource.build(context)
|
191
|
-
when :update_firewall_config
|
192
|
-
Aws::Route53Resolver::Endpoints::UpdateFirewallConfig.build(context)
|
193
|
-
when :update_firewall_domains
|
194
|
-
Aws::Route53Resolver::Endpoints::UpdateFirewallDomains.build(context)
|
195
|
-
when :update_firewall_rule
|
196
|
-
Aws::Route53Resolver::Endpoints::UpdateFirewallRule.build(context)
|
197
|
-
when :update_firewall_rule_group_association
|
198
|
-
Aws::Route53Resolver::Endpoints::UpdateFirewallRuleGroupAssociation.build(context)
|
199
|
-
when :update_outpost_resolver
|
200
|
-
Aws::Route53Resolver::Endpoints::UpdateOutpostResolver.build(context)
|
201
|
-
when :update_resolver_config
|
202
|
-
Aws::Route53Resolver::Endpoints::UpdateResolverConfig.build(context)
|
203
|
-
when :update_resolver_dnssec_config
|
204
|
-
Aws::Route53Resolver::Endpoints::UpdateResolverDnssecConfig.build(context)
|
205
|
-
when :update_resolver_endpoint
|
206
|
-
Aws::Route53Resolver::Endpoints::UpdateResolverEndpoint.build(context)
|
207
|
-
when :update_resolver_rule
|
208
|
-
Aws::Route53Resolver::Endpoints::UpdateResolverRule.build(context)
|
209
|
-
end
|
210
|
-
end
|
211
70
|
end
|
212
71
|
|
213
72
|
def add_handlers(handlers, _config)
|
@@ -329,7 +329,8 @@ module Aws::Route53Resolver
|
|
329
329
|
# @return [String]
|
330
330
|
#
|
331
331
|
# @!attribute [rw] firewall_domain_list_id
|
332
|
-
# The ID of the domain list that you want to use in the rule.
|
332
|
+
# The ID of the domain list that you want to use in the rule. Can't
|
333
|
+
# be used together with `DnsThreatProtecton`.
|
333
334
|
# @return [String]
|
334
335
|
#
|
335
336
|
# @!attribute [rw] priority
|
@@ -345,9 +346,11 @@ module Aws::Route53Resolver
|
|
345
346
|
#
|
346
347
|
# @!attribute [rw] action
|
347
348
|
# The action that DNS Firewall should take on a DNS query when it
|
348
|
-
# matches one of the domains in the rule's domain list
|
349
|
+
# matches one of the domains in the rule's domain list, or a threat
|
350
|
+
# in a DNS Firewall Advanced rule:
|
349
351
|
#
|
350
|
-
# * `ALLOW` - Permit the request to go through.
|
352
|
+
# * `ALLOW` - Permit the request to go through. Not available for DNS
|
353
|
+
# Firewall Advanced rules.
|
351
354
|
#
|
352
355
|
# * `ALERT` - Permit the request and send metrics and logs to Cloud
|
353
356
|
# Watch.
|
@@ -408,11 +411,11 @@ module Aws::Route53Resolver
|
|
408
411
|
# How you want the the rule to evaluate DNS redirection in the DNS
|
409
412
|
# redirection chain, such as CNAME or DNAME.
|
410
413
|
#
|
411
|
-
# `
|
414
|
+
# `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
|
412
415
|
# redirection chain. The individual domains in the redirection chain
|
413
416
|
# must be added to the domain list.
|
414
417
|
#
|
415
|
-
# `
|
418
|
+
# `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
|
416
419
|
# redirection chain. You don't need to add the subsequent domains in
|
417
420
|
# the domain in the redirection list to the domain list.
|
418
421
|
# @return [String]
|
@@ -459,6 +462,25 @@ module Aws::Route53Resolver
|
|
459
462
|
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
460
463
|
# @return [String]
|
461
464
|
#
|
465
|
+
# @!attribute [rw] dns_threat_protection
|
466
|
+
# Use to create a DNS Firewall Advanced rule.
|
467
|
+
# @return [String]
|
468
|
+
#
|
469
|
+
# @!attribute [rw] confidence_threshold
|
470
|
+
# The confidence threshold for DNS Firewall Advanced. You must provide
|
471
|
+
# this value when you create a DNS Firewall Advanced rule. The
|
472
|
+
# confidence level values mean:
|
473
|
+
#
|
474
|
+
# * `LOW`: Provides the highest detection rate for threats, but also
|
475
|
+
# increases false positives.
|
476
|
+
#
|
477
|
+
# * `MEDIUM`: Provides a balance between detecting threats and false
|
478
|
+
# positives.
|
479
|
+
#
|
480
|
+
# * `HIGH`: Detects only the most well corroborated threats with a low
|
481
|
+
# rate of false positives.
|
482
|
+
# @return [String]
|
483
|
+
#
|
462
484
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
|
463
485
|
#
|
464
486
|
class CreateFirewallRuleRequest < Struct.new(
|
@@ -473,7 +495,9 @@ module Aws::Route53Resolver
|
|
473
495
|
:block_override_ttl,
|
474
496
|
:name,
|
475
497
|
:firewall_domain_redirection_action,
|
476
|
-
:qtype
|
498
|
+
:qtype,
|
499
|
+
:dns_threat_protection,
|
500
|
+
:confidence_threshold)
|
477
501
|
SENSITIVE = []
|
478
502
|
include Aws::Structure
|
479
503
|
end
|
@@ -894,6 +918,10 @@ module Aws::Route53Resolver
|
|
894
918
|
# The ID of the domain list that's used in the rule.
|
895
919
|
# @return [String]
|
896
920
|
#
|
921
|
+
# @!attribute [rw] firewall_threat_protection_id
|
922
|
+
# The ID that is created for a DNS Firewall Advanced rule.
|
923
|
+
# @return [String]
|
924
|
+
#
|
897
925
|
# @!attribute [rw] qtype
|
898
926
|
# The DNS query type that the rule you are deleting evaluates. Allowed
|
899
927
|
# values are;
|
@@ -941,6 +969,7 @@ module Aws::Route53Resolver
|
|
941
969
|
class DeleteFirewallRuleRequest < Struct.new(
|
942
970
|
:firewall_rule_group_id,
|
943
971
|
:firewall_domain_list_id,
|
972
|
+
:firewall_threat_protection_id,
|
944
973
|
:qtype)
|
945
974
|
SENSITIVE = []
|
946
975
|
include Aws::Structure
|
@@ -1561,13 +1590,17 @@ module Aws::Route53Resolver
|
|
1561
1590
|
# A single firewall rule in a rule group.
|
1562
1591
|
#
|
1563
1592
|
# @!attribute [rw] firewall_rule_group_id
|
1564
|
-
# The unique identifier of the
|
1593
|
+
# The unique identifier of the Firewall rule group of the rule.
|
1565
1594
|
# @return [String]
|
1566
1595
|
#
|
1567
1596
|
# @!attribute [rw] firewall_domain_list_id
|
1568
1597
|
# The ID of the domain list that's used in the rule.
|
1569
1598
|
# @return [String]
|
1570
1599
|
#
|
1600
|
+
# @!attribute [rw] firewall_threat_protection_id
|
1601
|
+
# ID of the DNS Firewall Advanced rule.
|
1602
|
+
# @return [String]
|
1603
|
+
#
|
1571
1604
|
# @!attribute [rw] name
|
1572
1605
|
# The name of the rule.
|
1573
1606
|
# @return [String]
|
@@ -1580,9 +1613,11 @@ module Aws::Route53Resolver
|
|
1580
1613
|
#
|
1581
1614
|
# @!attribute [rw] action
|
1582
1615
|
# The action that DNS Firewall should take on a DNS query when it
|
1583
|
-
# matches one of the domains in the rule's domain list
|
1616
|
+
# matches one of the domains in the rule's domain list, or a threat
|
1617
|
+
# in a DNS Firewall Advanced rule:
|
1584
1618
|
#
|
1585
|
-
# * `ALLOW` - Permit the request to go through.
|
1619
|
+
# * `ALLOW` - Permit the request to go through. Not available for DNS
|
1620
|
+
# Firewall Advanced rules.
|
1586
1621
|
#
|
1587
1622
|
# * `ALERT` - Permit the request to go through but send an alert to
|
1588
1623
|
# the logs.
|
@@ -1646,11 +1681,11 @@ module Aws::Route53Resolver
|
|
1646
1681
|
# How you want the the rule to evaluate DNS redirection in the DNS
|
1647
1682
|
# redirection chain, such as CNAME or DNAME.
|
1648
1683
|
#
|
1649
|
-
# `
|
1684
|
+
# `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
|
1650
1685
|
# redirection chain. The individual domains in the redirection chain
|
1651
1686
|
# must be added to the domain list.
|
1652
1687
|
#
|
1653
|
-
# `
|
1688
|
+
# `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
|
1654
1689
|
# redirection chain. You don't need to add the subsequent domains in
|
1655
1690
|
# the domain in the redirection list to the domain list.
|
1656
1691
|
# @return [String]
|
@@ -1697,11 +1732,39 @@ module Aws::Route53Resolver
|
|
1697
1732
|
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
1698
1733
|
# @return [String]
|
1699
1734
|
#
|
1735
|
+
# @!attribute [rw] dns_threat_protection
|
1736
|
+
# The type of the DNS Firewall Advanced rule. Valid values are:
|
1737
|
+
#
|
1738
|
+
# * `DGA`: Domain generation algorithms detection. DGAs are used by
|
1739
|
+
# attackers to generate a large number of domains to to launch
|
1740
|
+
# malware attacks.
|
1741
|
+
#
|
1742
|
+
# * `DNS_TUNNELING`: DNS tunneling detection. DNS tunneling is used by
|
1743
|
+
# attackers to exfiltrate data from the client by using the DNS
|
1744
|
+
# tunnel without making a network connection to the client.
|
1745
|
+
# @return [String]
|
1746
|
+
#
|
1747
|
+
# @!attribute [rw] confidence_threshold
|
1748
|
+
# The confidence threshold for DNS Firewall Advanced. You must provide
|
1749
|
+
# this value when you create a DNS Firewall Advanced rule. The
|
1750
|
+
# confidence level values mean:
|
1751
|
+
#
|
1752
|
+
# * `LOW`: Provides the highest detection rate for threats, but also
|
1753
|
+
# increases false positives.
|
1754
|
+
#
|
1755
|
+
# * `MEDIUM`: Provides a balance between detecting threats and false
|
1756
|
+
# positives.
|
1757
|
+
#
|
1758
|
+
# * `HIGH`: Detects only the most well corroborated threats with a low
|
1759
|
+
# rate of false positives.
|
1760
|
+
# @return [String]
|
1761
|
+
#
|
1700
1762
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
|
1701
1763
|
#
|
1702
1764
|
class FirewallRule < Struct.new(
|
1703
1765
|
:firewall_rule_group_id,
|
1704
1766
|
:firewall_domain_list_id,
|
1767
|
+
:firewall_threat_protection_id,
|
1705
1768
|
:name,
|
1706
1769
|
:priority,
|
1707
1770
|
:action,
|
@@ -1713,7 +1776,9 @@ module Aws::Route53Resolver
|
|
1713
1776
|
:creation_time,
|
1714
1777
|
:modification_time,
|
1715
1778
|
:firewall_domain_redirection_action,
|
1716
|
-
:qtype
|
1779
|
+
:qtype,
|
1780
|
+
:dns_threat_protection,
|
1781
|
+
:confidence_threshold)
|
1717
1782
|
SENSITIVE = []
|
1718
1783
|
include Aws::Structure
|
1719
1784
|
end
|
@@ -2920,9 +2985,11 @@ module Aws::Route53Resolver
|
|
2920
2985
|
# Optional additional filter for the rules to retrieve.
|
2921
2986
|
#
|
2922
2987
|
# The action that DNS Firewall should take on a DNS query when it
|
2923
|
-
# matches one of the domains in the rule's domain list
|
2988
|
+
# matches one of the domains in the rule's domain list, or a threat
|
2989
|
+
# in a DNS Firewall Advanced rule:
|
2924
2990
|
#
|
2925
|
-
# * `ALLOW` - Permit the request to go through.
|
2991
|
+
# * `ALLOW` - Permit the request to go through. Not availabe for DNS
|
2992
|
+
# Firewall Advanced rules.
|
2926
2993
|
#
|
2927
2994
|
# * `ALERT` - Permit the request to go through but send an alert to
|
2928
2995
|
# the logs.
|
@@ -4361,7 +4428,7 @@ module Aws::Route53Resolver
|
|
4361
4428
|
# * `CREATING`: Resolver is creating an association between an Amazon
|
4362
4429
|
# VPC and a query logging configuration.
|
4363
4430
|
#
|
4364
|
-
# * `
|
4431
|
+
# * `ACTIVE`: The association between an Amazon VPC and a query
|
4365
4432
|
# logging configuration was successfully created. Resolver is
|
4366
4433
|
# logging queries that originate in the specified VPC.
|
4367
4434
|
#
|
@@ -4801,32 +4868,8 @@ module Aws::Route53Resolver
|
|
4801
4868
|
# @return [String]
|
4802
4869
|
#
|
4803
4870
|
# @!attribute [rw] protocol
|
4804
|
-
# The protocols for the
|
4805
|
-
#
|
4806
|
-
#
|
4807
|
-
# For an inbound endpoint you can apply the protocols as follows:
|
4808
|
-
#
|
4809
|
-
# * Do53 and DoH in combination.
|
4810
|
-
#
|
4811
|
-
# * Do53 and DoH-FIPS in combination.
|
4812
|
-
#
|
4813
|
-
# * Do53 alone.
|
4814
|
-
#
|
4815
|
-
# * DoH alone.
|
4816
|
-
#
|
4817
|
-
# * DoH-FIPS alone.
|
4818
|
-
#
|
4819
|
-
# * None, which is treated as Do53.
|
4820
|
-
#
|
4821
|
-
# For an outbound endpoint you can apply the protocols as follows:
|
4822
|
-
#
|
4823
|
-
# * Do53 and DoH in combination.
|
4824
|
-
#
|
4825
|
-
# * Do53 alone.
|
4826
|
-
#
|
4827
|
-
# * DoH alone.
|
4828
|
-
#
|
4829
|
-
# * None, which is treated as Do53.
|
4871
|
+
# The protocols for the target address. The protocol you choose needs
|
4872
|
+
# to be supported by the outbound endpoint of the Resolver rule.
|
4830
4873
|
# @return [String]
|
4831
4874
|
#
|
4832
4875
|
# @!attribute [rw] server_name_indication
|
@@ -5090,6 +5133,10 @@ module Aws::Route53Resolver
|
|
5090
5133
|
# The ID of the domain list to use in the rule.
|
5091
5134
|
# @return [String]
|
5092
5135
|
#
|
5136
|
+
# @!attribute [rw] firewall_threat_protection_id
|
5137
|
+
# The DNS Firewall Advanced rule ID.
|
5138
|
+
# @return [String]
|
5139
|
+
#
|
5093
5140
|
# @!attribute [rw] priority
|
5094
5141
|
# The setting that determines the processing order of the rule in the
|
5095
5142
|
# rule group. DNS Firewall processes the rules in a rule group by
|
@@ -5103,9 +5150,11 @@ module Aws::Route53Resolver
|
|
5103
5150
|
#
|
5104
5151
|
# @!attribute [rw] action
|
5105
5152
|
# The action that DNS Firewall should take on a DNS query when it
|
5106
|
-
# matches one of the domains in the rule's domain list
|
5153
|
+
# matches one of the domains in the rule's domain list, or a threat
|
5154
|
+
# in a DNS Firewall Advanced rule:
|
5107
5155
|
#
|
5108
|
-
# * `ALLOW` - Permit the request to go through.
|
5156
|
+
# * `ALLOW` - Permit the request to go through. Not available for DNS
|
5157
|
+
# Firewall Advanced rules.
|
5109
5158
|
#
|
5110
5159
|
# * `ALERT` - Permit the request to go through but send an alert to
|
5111
5160
|
# the logs.
|
@@ -5155,11 +5204,11 @@ module Aws::Route53Resolver
|
|
5155
5204
|
# How you want the the rule to evaluate DNS redirection in the DNS
|
5156
5205
|
# redirection chain, such as CNAME or DNAME.
|
5157
5206
|
#
|
5158
|
-
# `
|
5207
|
+
# `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
|
5159
5208
|
# redirection chain. The individual domains in the redirection chain
|
5160
5209
|
# must be added to the domain list.
|
5161
5210
|
#
|
5162
|
-
# `
|
5211
|
+
# `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
|
5163
5212
|
# redirection chain. You don't need to add the subsequent domains in
|
5164
5213
|
# the domain in the redirection list to the domain list.
|
5165
5214
|
# @return [String]
|
@@ -5212,11 +5261,39 @@ module Aws::Route53Resolver
|
|
5212
5261
|
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
5213
5262
|
# @return [String]
|
5214
5263
|
#
|
5264
|
+
# @!attribute [rw] dns_threat_protection
|
5265
|
+
# The type of the DNS Firewall Advanced rule. Valid values are:
|
5266
|
+
#
|
5267
|
+
# * `DGA`: Domain generation algorithms detection. DGAs are used by
|
5268
|
+
# attackers to generate a large number of domains to to launch
|
5269
|
+
# malware attacks.
|
5270
|
+
#
|
5271
|
+
# * `DNS_TUNNELING`: DNS tunneling detection. DNS tunneling is used by
|
5272
|
+
# attackers to exfiltrate data from the client by using the DNS
|
5273
|
+
# tunnel without making a network connection to the client.
|
5274
|
+
# @return [String]
|
5275
|
+
#
|
5276
|
+
# @!attribute [rw] confidence_threshold
|
5277
|
+
# The confidence threshold for DNS Firewall Advanced. You must provide
|
5278
|
+
# this value when you create a DNS Firewall Advanced rule. The
|
5279
|
+
# confidence level values mean:
|
5280
|
+
#
|
5281
|
+
# * `LOW`: Provides the highest detection rate for threats, but also
|
5282
|
+
# increases false positives.
|
5283
|
+
#
|
5284
|
+
# * `MEDIUM`: Provides a balance between detecting threats and false
|
5285
|
+
# positives.
|
5286
|
+
#
|
5287
|
+
# * `HIGH`: Detects only the most well corroborated threats with a low
|
5288
|
+
# rate of false positives.
|
5289
|
+
# @return [String]
|
5290
|
+
#
|
5215
5291
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
|
5216
5292
|
#
|
5217
5293
|
class UpdateFirewallRuleRequest < Struct.new(
|
5218
5294
|
:firewall_rule_group_id,
|
5219
5295
|
:firewall_domain_list_id,
|
5296
|
+
:firewall_threat_protection_id,
|
5220
5297
|
:priority,
|
5221
5298
|
:action,
|
5222
5299
|
:block_response,
|
@@ -5225,7 +5302,9 @@ module Aws::Route53Resolver
|
|
5225
5302
|
:block_override_ttl,
|
5226
5303
|
:name,
|
5227
5304
|
:firewall_domain_redirection_action,
|
5228
|
-
:qtype
|
5305
|
+
:qtype,
|
5306
|
+
:dns_threat_protection,
|
5307
|
+
:confidence_threshold)
|
5229
5308
|
SENSITIVE = []
|
5230
5309
|
include Aws::Structure
|
5231
5310
|
end
|
data/sig/client.rbs
CHANGED
@@ -161,7 +161,7 @@ module Aws
|
|
161
161
|
def create_firewall_rule: (
|
162
162
|
creator_request_id: ::String,
|
163
163
|
firewall_rule_group_id: ::String,
|
164
|
-
firewall_domain_list_id: ::String,
|
164
|
+
?firewall_domain_list_id: ::String,
|
165
165
|
priority: ::Integer,
|
166
166
|
action: ("ALLOW" | "BLOCK" | "ALERT"),
|
167
167
|
?block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE"),
|
@@ -170,7 +170,9 @@ module Aws
|
|
170
170
|
?block_override_ttl: ::Integer,
|
171
171
|
name: ::String,
|
172
172
|
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
173
|
-
?qtype: ::String
|
173
|
+
?qtype: ::String,
|
174
|
+
?dns_threat_protection: ("DGA" | "DNS_TUNNELING"),
|
175
|
+
?confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
|
174
176
|
) -> _CreateFirewallRuleResponseSuccess
|
175
177
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
|
176
178
|
|
@@ -305,7 +307,8 @@ module Aws
|
|
305
307
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/Route53Resolver/Client.html#delete_firewall_rule-instance_method
|
306
308
|
def delete_firewall_rule: (
|
307
309
|
firewall_rule_group_id: ::String,
|
308
|
-
firewall_domain_list_id: ::String,
|
310
|
+
?firewall_domain_list_id: ::String,
|
311
|
+
?firewall_threat_protection_id: ::String,
|
309
312
|
?qtype: ::String
|
310
313
|
) -> _DeleteFirewallRuleResponseSuccess
|
311
314
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DeleteFirewallRuleResponseSuccess
|
@@ -915,7 +918,8 @@ module Aws
|
|
915
918
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/Route53Resolver/Client.html#update_firewall_rule-instance_method
|
916
919
|
def update_firewall_rule: (
|
917
920
|
firewall_rule_group_id: ::String,
|
918
|
-
firewall_domain_list_id: ::String,
|
921
|
+
?firewall_domain_list_id: ::String,
|
922
|
+
?firewall_threat_protection_id: ::String,
|
919
923
|
?priority: ::Integer,
|
920
924
|
?action: ("ALLOW" | "BLOCK" | "ALERT"),
|
921
925
|
?block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE"),
|
@@ -924,7 +928,9 @@ module Aws
|
|
924
928
|
?block_override_ttl: ::Integer,
|
925
929
|
?name: ::String,
|
926
930
|
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
927
|
-
?qtype: ::String
|
931
|
+
?qtype: ::String,
|
932
|
+
?dns_threat_protection: ("DGA" | "DNS_TUNNELING"),
|
933
|
+
?confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
|
928
934
|
) -> _UpdateFirewallRuleResponseSuccess
|
929
935
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
|
930
936
|
|
data/sig/types.rbs
CHANGED
@@ -105,6 +105,8 @@ module Aws::Route53Resolver
|
|
105
105
|
attr_accessor name: ::String
|
106
106
|
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
107
107
|
attr_accessor qtype: ::String
|
108
|
+
attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
|
109
|
+
attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
|
108
110
|
SENSITIVE: []
|
109
111
|
end
|
110
112
|
|
@@ -199,6 +201,7 @@ module Aws::Route53Resolver
|
|
199
201
|
class DeleteFirewallRuleRequest
|
200
202
|
attr_accessor firewall_rule_group_id: ::String
|
201
203
|
attr_accessor firewall_domain_list_id: ::String
|
204
|
+
attr_accessor firewall_threat_protection_id: ::String
|
202
205
|
attr_accessor qtype: ::String
|
203
206
|
SENSITIVE: []
|
204
207
|
end
|
@@ -331,6 +334,7 @@ module Aws::Route53Resolver
|
|
331
334
|
class FirewallRule
|
332
335
|
attr_accessor firewall_rule_group_id: ::String
|
333
336
|
attr_accessor firewall_domain_list_id: ::String
|
337
|
+
attr_accessor firewall_threat_protection_id: ::String
|
334
338
|
attr_accessor name: ::String
|
335
339
|
attr_accessor priority: ::Integer
|
336
340
|
attr_accessor action: ("ALLOW" | "BLOCK" | "ALERT")
|
@@ -343,6 +347,8 @@ module Aws::Route53Resolver
|
|
343
347
|
attr_accessor modification_time: ::String
|
344
348
|
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
345
349
|
attr_accessor qtype: ::String
|
350
|
+
attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
|
351
|
+
attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
|
346
352
|
SENSITIVE: []
|
347
353
|
end
|
348
354
|
|
@@ -1096,6 +1102,7 @@ module Aws::Route53Resolver
|
|
1096
1102
|
class UpdateFirewallRuleRequest
|
1097
1103
|
attr_accessor firewall_rule_group_id: ::String
|
1098
1104
|
attr_accessor firewall_domain_list_id: ::String
|
1105
|
+
attr_accessor firewall_threat_protection_id: ::String
|
1099
1106
|
attr_accessor priority: ::Integer
|
1100
1107
|
attr_accessor action: ("ALLOW" | "BLOCK" | "ALERT")
|
1101
1108
|
attr_accessor block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE")
|
@@ -1105,6 +1112,8 @@ module Aws::Route53Resolver
|
|
1105
1112
|
attr_accessor name: ::String
|
1106
1113
|
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
1107
1114
|
attr_accessor qtype: ::String
|
1115
|
+
attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
|
1116
|
+
attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
|
1108
1117
|
SENSITIVE: []
|
1109
1118
|
end
|
1110
1119
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-route53resolver
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.73.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-11-15 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|
@@ -19,7 +19,7 @@ dependencies:
|
|
19
19
|
version: '3'
|
20
20
|
- - ">="
|
21
21
|
- !ruby/object:Gem::Version
|
22
|
-
version: 3.
|
22
|
+
version: 3.210.0
|
23
23
|
type: :runtime
|
24
24
|
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -29,7 +29,7 @@ dependencies:
|
|
29
29
|
version: '3'
|
30
30
|
- - ">="
|
31
31
|
- !ruby/object:Gem::Version
|
32
|
-
version: 3.
|
32
|
+
version: 3.210.0
|
33
33
|
- !ruby/object:Gem::Dependency
|
34
34
|
name: aws-sigv4
|
35
35
|
requirement: !ruby/object:Gem::Requirement
|