aws-sdk-route53resolver 1.72.0 → 1.73.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: bd4e17fff46d9739ec59f74a16f9fa2150f1cfa9e17a57589cf730d5b83d4d24
4
- data.tar.gz: 074d36c340a94cd665d2698d466746f2d43f5c7b30b960ec638046387b4c7c0b
3
+ metadata.gz: 6b52fca6223281d438eb705b809e3df5858a0f90d8de563f60ce8d845d1b435c
4
+ data.tar.gz: d91066c8dfa0e8789b64499e15b9f23dc47f5c646138ceb4727b78ca88e84111
5
5
  SHA512:
6
- metadata.gz: 541029bc85dfd56e78b9de050cc185bd41536a8850b6fe786a6b92135438f728878e20003d692315739587a1c4c8d456add16337c4f4418d3fad0e8d7c2d891f
7
- data.tar.gz: f176ab577f2763b23cd9e20f60bacb80fecdf4e2b717a9e4eaf1cc986f0ba99f9cac1d6d5452fdf745cd34806eb3b8d61d931a6bf803074aac5572544eddfa85
6
+ metadata.gz: 69db2cd9346f1c06b7da716f1a272c11255013f09bb5d11e01c98c090c08a40f042c596688ba460e1f085eef640fbc330870823c0034605eb1ba0b4f8cf36565
7
+ data.tar.gz: a0fdf4df9ad3695094a00566f082d6d0ff73ebe00dffebcd5f24b7767526e2bbb0332b1aeee0d285cfb0af4111f25f379b572ff72637366ae157f06cc25f4a3f
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.73.0 (2024-11-15)
5
+ ------------------
6
+
7
+ * Feature - Route 53 Resolver DNS Firewall Advanced Rules allows you to monitor and block suspicious DNS traffic based on anomalies detected in the queries, such as DNS tunneling and Domain Generation Algorithms (DGAs).
8
+
4
9
  1.72.0 (2024-10-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.72.0
1
+ 1.73.0
@@ -805,8 +805,9 @@ module Aws::Route53Resolver
805
805
  # The unique identifier of the firewall rule group where you want to
806
806
  # create the rule.
807
807
  #
808
- # @option params [required, String] :firewall_domain_list_id
809
- # The ID of the domain list that you want to use in the rule.
808
+ # @option params [String] :firewall_domain_list_id
809
+ # The ID of the domain list that you want to use in the rule. Can't be
810
+ # used together with `DnsThreatProtecton`.
810
811
  #
811
812
  # @option params [required, Integer] :priority
812
813
  # The setting that determines the processing order of the rule in the
@@ -820,9 +821,11 @@ module Aws::Route53Resolver
820
821
  #
821
822
  # @option params [required, String] :action
822
823
  # The action that DNS Firewall should take on a DNS query when it
823
- # matches one of the domains in the rule's domain list:
824
+ # matches one of the domains in the rule's domain list, or a threat in
825
+ # a DNS Firewall Advanced rule:
824
826
  #
825
- # * `ALLOW` - Permit the request to go through.
827
+ # * `ALLOW` - Permit the request to go through. Not available for DNS
828
+ # Firewall Advanced rules.
826
829
  #
827
830
  # * `ALERT` - Permit the request and send metrics and logs to Cloud
828
831
  # Watch.
@@ -873,11 +876,11 @@ module Aws::Route53Resolver
873
876
  # How you want the the rule to evaluate DNS redirection in the DNS
874
877
  # redirection chain, such as CNAME or DNAME.
875
878
  #
876
- # `Inspect_Redirection_Domain `(Default) inspects all domains in the
879
+ # `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
877
880
  # redirection chain. The individual domains in the redirection chain
878
881
  # must be added to the domain list.
879
882
  #
880
- # `Trust_Redirection_Domain ` inspects only the first domain in the
883
+ # `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
881
884
  # redirection chain. You don't need to add the subsequent domains in
882
885
  # the domain in the redirection list to the domain list.
883
886
  #
@@ -921,6 +924,23 @@ module Aws::Route53Resolver
921
924
  #
922
925
  # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
923
926
  #
927
+ # @option params [String] :dns_threat_protection
928
+ # Use to create a DNS Firewall Advanced rule.
929
+ #
930
+ # @option params [String] :confidence_threshold
931
+ # The confidence threshold for DNS Firewall Advanced. You must provide
932
+ # this value when you create a DNS Firewall Advanced rule. The
933
+ # confidence level values mean:
934
+ #
935
+ # * `LOW`: Provides the highest detection rate for threats, but also
936
+ # increases false positives.
937
+ #
938
+ # * `MEDIUM`: Provides a balance between detecting threats and false
939
+ # positives.
940
+ #
941
+ # * `HIGH`: Detects only the most well corroborated threats with a low
942
+ # rate of false positives.
943
+ #
924
944
  # @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
925
945
  #
926
946
  # * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -930,7 +950,7 @@ module Aws::Route53Resolver
930
950
  # resp = client.create_firewall_rule({
931
951
  # creator_request_id: "CreatorRequestId", # required
932
952
  # firewall_rule_group_id: "ResourceId", # required
933
- # firewall_domain_list_id: "ResourceId", # required
953
+ # firewall_domain_list_id: "ResourceId",
934
954
  # priority: 1, # required
935
955
  # action: "ALLOW", # required, accepts ALLOW, BLOCK, ALERT
936
956
  # block_response: "NODATA", # accepts NODATA, NXDOMAIN, OVERRIDE
@@ -940,12 +960,15 @@ module Aws::Route53Resolver
940
960
  # name: "Name", # required
941
961
  # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
942
962
  # qtype: "Qtype",
963
+ # dns_threat_protection: "DGA", # accepts DGA, DNS_TUNNELING
964
+ # confidence_threshold: "LOW", # accepts LOW, MEDIUM, HIGH
943
965
  # })
944
966
  #
945
967
  # @example Response structure
946
968
  #
947
969
  # resp.firewall_rule.firewall_rule_group_id #=> String
948
970
  # resp.firewall_rule.firewall_domain_list_id #=> String
971
+ # resp.firewall_rule.firewall_threat_protection_id #=> String
949
972
  # resp.firewall_rule.name #=> String
950
973
  # resp.firewall_rule.priority #=> Integer
951
974
  # resp.firewall_rule.action #=> String, one of "ALLOW", "BLOCK", "ALERT"
@@ -958,6 +981,8 @@ module Aws::Route53Resolver
958
981
  # resp.firewall_rule.modification_time #=> String
959
982
  # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
960
983
  # resp.firewall_rule.qtype #=> String
984
+ # resp.firewall_rule.dns_threat_protection #=> String, one of "DGA", "DNS_TUNNELING"
985
+ # resp.firewall_rule.confidence_threshold #=> String, one of "LOW", "MEDIUM", "HIGH"
961
986
  #
962
987
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
963
988
  #
@@ -1518,9 +1543,12 @@ module Aws::Route53Resolver
1518
1543
  # The unique identifier of the firewall rule group that you want to
1519
1544
  # delete the rule from.
1520
1545
  #
1521
- # @option params [required, String] :firewall_domain_list_id
1546
+ # @option params [String] :firewall_domain_list_id
1522
1547
  # The ID of the domain list that's used in the rule.
1523
1548
  #
1549
+ # @option params [String] :firewall_threat_protection_id
1550
+ # The ID that is created for a DNS Firewall Advanced rule.
1551
+ #
1524
1552
  # @option params [String] :qtype
1525
1553
  # The DNS query type that the rule you are deleting evaluates. Allowed
1526
1554
  # values are;
@@ -1570,7 +1598,8 @@ module Aws::Route53Resolver
1570
1598
  #
1571
1599
  # resp = client.delete_firewall_rule({
1572
1600
  # firewall_rule_group_id: "ResourceId", # required
1573
- # firewall_domain_list_id: "ResourceId", # required
1601
+ # firewall_domain_list_id: "ResourceId",
1602
+ # firewall_threat_protection_id: "ResourceId",
1574
1603
  # qtype: "Qtype",
1575
1604
  # })
1576
1605
  #
@@ -1578,6 +1607,7 @@ module Aws::Route53Resolver
1578
1607
  #
1579
1608
  # resp.firewall_rule.firewall_rule_group_id #=> String
1580
1609
  # resp.firewall_rule.firewall_domain_list_id #=> String
1610
+ # resp.firewall_rule.firewall_threat_protection_id #=> String
1581
1611
  # resp.firewall_rule.name #=> String
1582
1612
  # resp.firewall_rule.priority #=> Integer
1583
1613
  # resp.firewall_rule.action #=> String, one of "ALLOW", "BLOCK", "ALERT"
@@ -1590,6 +1620,8 @@ module Aws::Route53Resolver
1590
1620
  # resp.firewall_rule.modification_time #=> String
1591
1621
  # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
1592
1622
  # resp.firewall_rule.qtype #=> String
1623
+ # resp.firewall_rule.dns_threat_protection #=> String, one of "DGA", "DNS_TUNNELING"
1624
+ # resp.firewall_rule.confidence_threshold #=> String, one of "LOW", "MEDIUM", "HIGH"
1593
1625
  #
1594
1626
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
1595
1627
  #
@@ -3009,9 +3041,11 @@ module Aws::Route53Resolver
3009
3041
  # Optional additional filter for the rules to retrieve.
3010
3042
  #
3011
3043
  # The action that DNS Firewall should take on a DNS query when it
3012
- # matches one of the domains in the rule's domain list:
3044
+ # matches one of the domains in the rule's domain list, or a threat in
3045
+ # a DNS Firewall Advanced rule:
3013
3046
  #
3014
- # * `ALLOW` - Permit the request to go through.
3047
+ # * `ALLOW` - Permit the request to go through. Not availabe for DNS
3048
+ # Firewall Advanced rules.
3015
3049
  #
3016
3050
  # * `ALERT` - Permit the request to go through but send an alert to the
3017
3051
  # logs.
@@ -3061,6 +3095,7 @@ module Aws::Route53Resolver
3061
3095
  # resp.firewall_rules #=> Array
3062
3096
  # resp.firewall_rules[0].firewall_rule_group_id #=> String
3063
3097
  # resp.firewall_rules[0].firewall_domain_list_id #=> String
3098
+ # resp.firewall_rules[0].firewall_threat_protection_id #=> String
3064
3099
  # resp.firewall_rules[0].name #=> String
3065
3100
  # resp.firewall_rules[0].priority #=> Integer
3066
3101
  # resp.firewall_rules[0].action #=> String, one of "ALLOW", "BLOCK", "ALERT"
@@ -3073,6 +3108,8 @@ module Aws::Route53Resolver
3073
3108
  # resp.firewall_rules[0].modification_time #=> String
3074
3109
  # resp.firewall_rules[0].firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
3075
3110
  # resp.firewall_rules[0].qtype #=> String
3111
+ # resp.firewall_rules[0].dns_threat_protection #=> String, one of "DGA", "DNS_TUNNELING"
3112
+ # resp.firewall_rules[0].confidence_threshold #=> String, one of "LOW", "MEDIUM", "HIGH"
3076
3113
  #
3077
3114
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
3078
3115
  #
@@ -4243,9 +4280,12 @@ module Aws::Route53Resolver
4243
4280
  # @option params [required, String] :firewall_rule_group_id
4244
4281
  # The unique identifier of the firewall rule group for the rule.
4245
4282
  #
4246
- # @option params [required, String] :firewall_domain_list_id
4283
+ # @option params [String] :firewall_domain_list_id
4247
4284
  # The ID of the domain list to use in the rule.
4248
4285
  #
4286
+ # @option params [String] :firewall_threat_protection_id
4287
+ # The DNS Firewall Advanced rule ID.
4288
+ #
4249
4289
  # @option params [Integer] :priority
4250
4290
  # The setting that determines the processing order of the rule in the
4251
4291
  # rule group. DNS Firewall processes the rules in a rule group by order
@@ -4258,9 +4298,11 @@ module Aws::Route53Resolver
4258
4298
  #
4259
4299
  # @option params [String] :action
4260
4300
  # The action that DNS Firewall should take on a DNS query when it
4261
- # matches one of the domains in the rule's domain list:
4301
+ # matches one of the domains in the rule's domain list, or a threat in
4302
+ # a DNS Firewall Advanced rule:
4262
4303
  #
4263
- # * `ALLOW` - Permit the request to go through.
4304
+ # * `ALLOW` - Permit the request to go through. Not available for DNS
4305
+ # Firewall Advanced rules.
4264
4306
  #
4265
4307
  # * `ALERT` - Permit the request to go through but send an alert to the
4266
4308
  # logs.
@@ -4303,11 +4345,11 @@ module Aws::Route53Resolver
4303
4345
  # How you want the the rule to evaluate DNS redirection in the DNS
4304
4346
  # redirection chain, such as CNAME or DNAME.
4305
4347
  #
4306
- # `Inspect_Redirection_Domain `(Default) inspects all domains in the
4348
+ # `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
4307
4349
  # redirection chain. The individual domains in the redirection chain
4308
4350
  # must be added to the domain list.
4309
4351
  #
4310
- # `Trust_Redirection_Domain ` inspects only the first domain in the
4352
+ # `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
4311
4353
  # redirection chain. You don't need to add the subsequent domains in
4312
4354
  # the domain in the redirection list to the domain list.
4313
4355
  #
@@ -4357,6 +4399,31 @@ module Aws::Route53Resolver
4357
4399
  #
4358
4400
  # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
4359
4401
  #
4402
+ # @option params [String] :dns_threat_protection
4403
+ # The type of the DNS Firewall Advanced rule. Valid values are:
4404
+ #
4405
+ # * `DGA`: Domain generation algorithms detection. DGAs are used by
4406
+ # attackers to generate a large number of domains to to launch malware
4407
+ # attacks.
4408
+ #
4409
+ # * `DNS_TUNNELING`: DNS tunneling detection. DNS tunneling is used by
4410
+ # attackers to exfiltrate data from the client by using the DNS tunnel
4411
+ # without making a network connection to the client.
4412
+ #
4413
+ # @option params [String] :confidence_threshold
4414
+ # The confidence threshold for DNS Firewall Advanced. You must provide
4415
+ # this value when you create a DNS Firewall Advanced rule. The
4416
+ # confidence level values mean:
4417
+ #
4418
+ # * `LOW`: Provides the highest detection rate for threats, but also
4419
+ # increases false positives.
4420
+ #
4421
+ # * `MEDIUM`: Provides a balance between detecting threats and false
4422
+ # positives.
4423
+ #
4424
+ # * `HIGH`: Detects only the most well corroborated threats with a low
4425
+ # rate of false positives.
4426
+ #
4360
4427
  # @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4361
4428
  #
4362
4429
  # * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -4365,7 +4432,8 @@ module Aws::Route53Resolver
4365
4432
  #
4366
4433
  # resp = client.update_firewall_rule({
4367
4434
  # firewall_rule_group_id: "ResourceId", # required
4368
- # firewall_domain_list_id: "ResourceId", # required
4435
+ # firewall_domain_list_id: "ResourceId",
4436
+ # firewall_threat_protection_id: "ResourceId",
4369
4437
  # priority: 1,
4370
4438
  # action: "ALLOW", # accepts ALLOW, BLOCK, ALERT
4371
4439
  # block_response: "NODATA", # accepts NODATA, NXDOMAIN, OVERRIDE
@@ -4375,12 +4443,15 @@ module Aws::Route53Resolver
4375
4443
  # name: "Name",
4376
4444
  # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
4377
4445
  # qtype: "Qtype",
4446
+ # dns_threat_protection: "DGA", # accepts DGA, DNS_TUNNELING
4447
+ # confidence_threshold: "LOW", # accepts LOW, MEDIUM, HIGH
4378
4448
  # })
4379
4449
  #
4380
4450
  # @example Response structure
4381
4451
  #
4382
4452
  # resp.firewall_rule.firewall_rule_group_id #=> String
4383
4453
  # resp.firewall_rule.firewall_domain_list_id #=> String
4454
+ # resp.firewall_rule.firewall_threat_protection_id #=> String
4384
4455
  # resp.firewall_rule.name #=> String
4385
4456
  # resp.firewall_rule.priority #=> Integer
4386
4457
  # resp.firewall_rule.action #=> String, one of "ALLOW", "BLOCK", "ALERT"
@@ -4393,6 +4464,8 @@ module Aws::Route53Resolver
4393
4464
  # resp.firewall_rule.modification_time #=> String
4394
4465
  # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
4395
4466
  # resp.firewall_rule.qtype #=> String
4467
+ # resp.firewall_rule.dns_threat_protection #=> String, one of "DGA", "DNS_TUNNELING"
4468
+ # resp.firewall_rule.confidence_threshold #=> String, one of "LOW", "MEDIUM", "HIGH"
4396
4469
  #
4397
4470
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
4398
4471
  #
@@ -4802,7 +4875,7 @@ module Aws::Route53Resolver
4802
4875
  tracer: tracer
4803
4876
  )
4804
4877
  context[:gem_name] = 'aws-sdk-route53resolver'
4805
- context[:gem_version] = '1.72.0'
4878
+ context[:gem_version] = '1.73.0'
4806
4879
  Seahorse::Client::Request.new(handlers, context)
4807
4880
  end
4808
4881
 
@@ -32,6 +32,7 @@ module Aws::Route53Resolver
32
32
  BlockOverrideTtl = Shapes::IntegerShape.new(name: 'BlockOverrideTtl')
33
33
  BlockResponse = Shapes::StringShape.new(name: 'BlockResponse')
34
34
  Boolean = Shapes::BooleanShape.new(name: 'Boolean')
35
+ ConfidenceThreshold = Shapes::StringShape.new(name: 'ConfidenceThreshold')
35
36
  ConflictException = Shapes::StructureShape.new(name: 'ConflictException')
36
37
  Count = Shapes::IntegerShape.new(name: 'Count')
37
38
  CreateFirewallDomainListRequest = Shapes::StructureShape.new(name: 'CreateFirewallDomainListRequest')
@@ -72,6 +73,7 @@ module Aws::Route53Resolver
72
73
  DisassociateResolverQueryLogConfigResponse = Shapes::StructureShape.new(name: 'DisassociateResolverQueryLogConfigResponse')
73
74
  DisassociateResolverRuleRequest = Shapes::StructureShape.new(name: 'DisassociateResolverRuleRequest')
74
75
  DisassociateResolverRuleResponse = Shapes::StructureShape.new(name: 'DisassociateResolverRuleResponse')
76
+ DnsThreatProtection = Shapes::StringShape.new(name: 'DnsThreatProtection')
75
77
  DomainListFileUrl = Shapes::StringShape.new(name: 'DomainListFileUrl')
76
78
  DomainName = Shapes::StringShape.new(name: 'DomainName')
77
79
  ExceptionMessage = Shapes::StringShape.new(name: 'ExceptionMessage')
@@ -349,7 +351,7 @@ module Aws::Route53Resolver
349
351
 
350
352
  CreateFirewallRuleRequest.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, required: true, location_name: "CreatorRequestId", metadata: {"idempotencyToken"=>true}))
351
353
  CreateFirewallRuleRequest.add_member(:firewall_rule_group_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallRuleGroupId"))
352
- CreateFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallDomainListId"))
354
+ CreateFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallDomainListId", metadata: {"box"=>true}))
353
355
  CreateFirewallRuleRequest.add_member(:priority, Shapes::ShapeRef.new(shape: Priority, required: true, location_name: "Priority"))
354
356
  CreateFirewallRuleRequest.add_member(:action, Shapes::ShapeRef.new(shape: Action, required: true, location_name: "Action"))
355
357
  CreateFirewallRuleRequest.add_member(:block_response, Shapes::ShapeRef.new(shape: BlockResponse, location_name: "BlockResponse", metadata: {"box"=>true}))
@@ -359,6 +361,8 @@ module Aws::Route53Resolver
359
361
  CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
360
362
  CreateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
361
363
  CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
364
+ CreateFirewallRuleRequest.add_member(:dns_threat_protection, Shapes::ShapeRef.new(shape: DnsThreatProtection, location_name: "DnsThreatProtection", metadata: {"box"=>true}))
365
+ CreateFirewallRuleRequest.add_member(:confidence_threshold, Shapes::ShapeRef.new(shape: ConfidenceThreshold, location_name: "ConfidenceThreshold", metadata: {"box"=>true}))
362
366
  CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
363
367
 
364
368
  CreateFirewallRuleResponse.add_member(:firewall_rule, Shapes::ShapeRef.new(shape: FirewallRule, location_name: "FirewallRule"))
@@ -424,7 +428,8 @@ module Aws::Route53Resolver
424
428
  DeleteFirewallRuleGroupResponse.struct_class = Types::DeleteFirewallRuleGroupResponse
425
429
 
426
430
  DeleteFirewallRuleRequest.add_member(:firewall_rule_group_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallRuleGroupId"))
427
- DeleteFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallDomainListId"))
431
+ DeleteFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallDomainListId", metadata: {"box"=>true}))
432
+ DeleteFirewallRuleRequest.add_member(:firewall_threat_protection_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallThreatProtectionId", metadata: {"box"=>true}))
428
433
  DeleteFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
429
434
  DeleteFirewallRuleRequest.struct_class = Types::DeleteFirewallRuleRequest
430
435
 
@@ -523,6 +528,7 @@ module Aws::Route53Resolver
523
528
 
524
529
  FirewallRule.add_member(:firewall_rule_group_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallRuleGroupId"))
525
530
  FirewallRule.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallDomainListId"))
531
+ FirewallRule.add_member(:firewall_threat_protection_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallThreatProtectionId"))
526
532
  FirewallRule.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name"))
527
533
  FirewallRule.add_member(:priority, Shapes::ShapeRef.new(shape: Priority, location_name: "Priority"))
528
534
  FirewallRule.add_member(:action, Shapes::ShapeRef.new(shape: Action, location_name: "Action"))
@@ -535,6 +541,8 @@ module Aws::Route53Resolver
535
541
  FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
536
542
  FirewallRule.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction"))
537
543
  FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
544
+ FirewallRule.add_member(:dns_threat_protection, Shapes::ShapeRef.new(shape: DnsThreatProtection, location_name: "DnsThreatProtection"))
545
+ FirewallRule.add_member(:confidence_threshold, Shapes::ShapeRef.new(shape: ConfidenceThreshold, location_name: "ConfidenceThreshold"))
538
546
  FirewallRule.struct_class = Types::FirewallRule
539
547
 
540
548
  FirewallRuleGroup.add_member(:id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "Id"))
@@ -1101,7 +1109,8 @@ module Aws::Route53Resolver
1101
1109
  UpdateFirewallRuleGroupAssociationResponse.struct_class = Types::UpdateFirewallRuleGroupAssociationResponse
1102
1110
 
1103
1111
  UpdateFirewallRuleRequest.add_member(:firewall_rule_group_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallRuleGroupId"))
1104
- UpdateFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, required: true, location_name: "FirewallDomainListId"))
1112
+ UpdateFirewallRuleRequest.add_member(:firewall_domain_list_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallDomainListId", metadata: {"box"=>true}))
1113
+ UpdateFirewallRuleRequest.add_member(:firewall_threat_protection_id, Shapes::ShapeRef.new(shape: ResourceId, location_name: "FirewallThreatProtectionId", metadata: {"box"=>true}))
1105
1114
  UpdateFirewallRuleRequest.add_member(:priority, Shapes::ShapeRef.new(shape: Priority, location_name: "Priority", metadata: {"box"=>true}))
1106
1115
  UpdateFirewallRuleRequest.add_member(:action, Shapes::ShapeRef.new(shape: Action, location_name: "Action", metadata: {"box"=>true}))
1107
1116
  UpdateFirewallRuleRequest.add_member(:block_response, Shapes::ShapeRef.new(shape: BlockResponse, location_name: "BlockResponse", metadata: {"box"=>true}))
@@ -1111,6 +1120,8 @@ module Aws::Route53Resolver
1111
1120
  UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
1112
1121
  UpdateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
1113
1122
  UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
1123
+ UpdateFirewallRuleRequest.add_member(:dns_threat_protection, Shapes::ShapeRef.new(shape: DnsThreatProtection, location_name: "DnsThreatProtection", metadata: {"box"=>true}))
1124
+ UpdateFirewallRuleRequest.add_member(:confidence_threshold, Shapes::ShapeRef.new(shape: ConfidenceThreshold, location_name: "ConfidenceThreshold", metadata: {"box"=>true}))
1114
1125
  UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
1115
1126
 
1116
1127
  UpdateFirewallRuleResponse.add_member(:firewall_rule, Shapes::ShapeRef.new(shape: FirewallRule, location_name: "FirewallRule"))
@@ -1373,6 +1384,7 @@ module Aws::Route53Resolver
1373
1384
  o.errors << Shapes::ShapeRef.new(shape: ResourceNotFoundException)
1374
1385
  o.errors << Shapes::ShapeRef.new(shape: AccessDeniedException)
1375
1386
  o.errors << Shapes::ShapeRef.new(shape: InternalServiceErrorException)
1387
+ o.errors << Shapes::ShapeRef.new(shape: ValidationException)
1376
1388
  o.errors << Shapes::ShapeRef.new(shape: ThrottlingException)
1377
1389
  end)
1378
1390
 
@@ -329,7 +329,8 @@ module Aws::Route53Resolver
329
329
  # @return [String]
330
330
  #
331
331
  # @!attribute [rw] firewall_domain_list_id
332
- # The ID of the domain list that you want to use in the rule.
332
+ # The ID of the domain list that you want to use in the rule. Can't
333
+ # be used together with `DnsThreatProtecton`.
333
334
  # @return [String]
334
335
  #
335
336
  # @!attribute [rw] priority
@@ -345,9 +346,11 @@ module Aws::Route53Resolver
345
346
  #
346
347
  # @!attribute [rw] action
347
348
  # The action that DNS Firewall should take on a DNS query when it
348
- # matches one of the domains in the rule's domain list:
349
+ # matches one of the domains in the rule's domain list, or a threat
350
+ # in a DNS Firewall Advanced rule:
349
351
  #
350
- # * `ALLOW` - Permit the request to go through.
352
+ # * `ALLOW` - Permit the request to go through. Not available for DNS
353
+ # Firewall Advanced rules.
351
354
  #
352
355
  # * `ALERT` - Permit the request and send metrics and logs to Cloud
353
356
  # Watch.
@@ -408,11 +411,11 @@ module Aws::Route53Resolver
408
411
  # How you want the the rule to evaluate DNS redirection in the DNS
409
412
  # redirection chain, such as CNAME or DNAME.
410
413
  #
411
- # `Inspect_Redirection_Domain `(Default) inspects all domains in the
414
+ # `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
412
415
  # redirection chain. The individual domains in the redirection chain
413
416
  # must be added to the domain list.
414
417
  #
415
- # `Trust_Redirection_Domain ` inspects only the first domain in the
418
+ # `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
416
419
  # redirection chain. You don't need to add the subsequent domains in
417
420
  # the domain in the redirection list to the domain list.
418
421
  # @return [String]
@@ -459,6 +462,25 @@ module Aws::Route53Resolver
459
462
  # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
460
463
  # @return [String]
461
464
  #
465
+ # @!attribute [rw] dns_threat_protection
466
+ # Use to create a DNS Firewall Advanced rule.
467
+ # @return [String]
468
+ #
469
+ # @!attribute [rw] confidence_threshold
470
+ # The confidence threshold for DNS Firewall Advanced. You must provide
471
+ # this value when you create a DNS Firewall Advanced rule. The
472
+ # confidence level values mean:
473
+ #
474
+ # * `LOW`: Provides the highest detection rate for threats, but also
475
+ # increases false positives.
476
+ #
477
+ # * `MEDIUM`: Provides a balance between detecting threats and false
478
+ # positives.
479
+ #
480
+ # * `HIGH`: Detects only the most well corroborated threats with a low
481
+ # rate of false positives.
482
+ # @return [String]
483
+ #
462
484
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
463
485
  #
464
486
  class CreateFirewallRuleRequest < Struct.new(
@@ -473,7 +495,9 @@ module Aws::Route53Resolver
473
495
  :block_override_ttl,
474
496
  :name,
475
497
  :firewall_domain_redirection_action,
476
- :qtype)
498
+ :qtype,
499
+ :dns_threat_protection,
500
+ :confidence_threshold)
477
501
  SENSITIVE = []
478
502
  include Aws::Structure
479
503
  end
@@ -894,6 +918,10 @@ module Aws::Route53Resolver
894
918
  # The ID of the domain list that's used in the rule.
895
919
  # @return [String]
896
920
  #
921
+ # @!attribute [rw] firewall_threat_protection_id
922
+ # The ID that is created for a DNS Firewall Advanced rule.
923
+ # @return [String]
924
+ #
897
925
  # @!attribute [rw] qtype
898
926
  # The DNS query type that the rule you are deleting evaluates. Allowed
899
927
  # values are;
@@ -941,6 +969,7 @@ module Aws::Route53Resolver
941
969
  class DeleteFirewallRuleRequest < Struct.new(
942
970
  :firewall_rule_group_id,
943
971
  :firewall_domain_list_id,
972
+ :firewall_threat_protection_id,
944
973
  :qtype)
945
974
  SENSITIVE = []
946
975
  include Aws::Structure
@@ -1561,13 +1590,17 @@ module Aws::Route53Resolver
1561
1590
  # A single firewall rule in a rule group.
1562
1591
  #
1563
1592
  # @!attribute [rw] firewall_rule_group_id
1564
- # The unique identifier of the firewall rule group of the rule.
1593
+ # The unique identifier of the Firewall rule group of the rule.
1565
1594
  # @return [String]
1566
1595
  #
1567
1596
  # @!attribute [rw] firewall_domain_list_id
1568
1597
  # The ID of the domain list that's used in the rule.
1569
1598
  # @return [String]
1570
1599
  #
1600
+ # @!attribute [rw] firewall_threat_protection_id
1601
+ # ID of the DNS Firewall Advanced rule.
1602
+ # @return [String]
1603
+ #
1571
1604
  # @!attribute [rw] name
1572
1605
  # The name of the rule.
1573
1606
  # @return [String]
@@ -1580,9 +1613,11 @@ module Aws::Route53Resolver
1580
1613
  #
1581
1614
  # @!attribute [rw] action
1582
1615
  # The action that DNS Firewall should take on a DNS query when it
1583
- # matches one of the domains in the rule's domain list:
1616
+ # matches one of the domains in the rule's domain list, or a threat
1617
+ # in a DNS Firewall Advanced rule:
1584
1618
  #
1585
- # * `ALLOW` - Permit the request to go through.
1619
+ # * `ALLOW` - Permit the request to go through. Not available for DNS
1620
+ # Firewall Advanced rules.
1586
1621
  #
1587
1622
  # * `ALERT` - Permit the request to go through but send an alert to
1588
1623
  # the logs.
@@ -1646,11 +1681,11 @@ module Aws::Route53Resolver
1646
1681
  # How you want the the rule to evaluate DNS redirection in the DNS
1647
1682
  # redirection chain, such as CNAME or DNAME.
1648
1683
  #
1649
- # `Inspect_Redirection_Domain `(Default) inspects all domains in the
1684
+ # `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
1650
1685
  # redirection chain. The individual domains in the redirection chain
1651
1686
  # must be added to the domain list.
1652
1687
  #
1653
- # `Trust_Redirection_Domain ` inspects only the first domain in the
1688
+ # `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
1654
1689
  # redirection chain. You don't need to add the subsequent domains in
1655
1690
  # the domain in the redirection list to the domain list.
1656
1691
  # @return [String]
@@ -1697,11 +1732,39 @@ module Aws::Route53Resolver
1697
1732
  # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
1698
1733
  # @return [String]
1699
1734
  #
1735
+ # @!attribute [rw] dns_threat_protection
1736
+ # The type of the DNS Firewall Advanced rule. Valid values are:
1737
+ #
1738
+ # * `DGA`: Domain generation algorithms detection. DGAs are used by
1739
+ # attackers to generate a large number of domains to to launch
1740
+ # malware attacks.
1741
+ #
1742
+ # * `DNS_TUNNELING`: DNS tunneling detection. DNS tunneling is used by
1743
+ # attackers to exfiltrate data from the client by using the DNS
1744
+ # tunnel without making a network connection to the client.
1745
+ # @return [String]
1746
+ #
1747
+ # @!attribute [rw] confidence_threshold
1748
+ # The confidence threshold for DNS Firewall Advanced. You must provide
1749
+ # this value when you create a DNS Firewall Advanced rule. The
1750
+ # confidence level values mean:
1751
+ #
1752
+ # * `LOW`: Provides the highest detection rate for threats, but also
1753
+ # increases false positives.
1754
+ #
1755
+ # * `MEDIUM`: Provides a balance between detecting threats and false
1756
+ # positives.
1757
+ #
1758
+ # * `HIGH`: Detects only the most well corroborated threats with a low
1759
+ # rate of false positives.
1760
+ # @return [String]
1761
+ #
1700
1762
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
1701
1763
  #
1702
1764
  class FirewallRule < Struct.new(
1703
1765
  :firewall_rule_group_id,
1704
1766
  :firewall_domain_list_id,
1767
+ :firewall_threat_protection_id,
1705
1768
  :name,
1706
1769
  :priority,
1707
1770
  :action,
@@ -1713,7 +1776,9 @@ module Aws::Route53Resolver
1713
1776
  :creation_time,
1714
1777
  :modification_time,
1715
1778
  :firewall_domain_redirection_action,
1716
- :qtype)
1779
+ :qtype,
1780
+ :dns_threat_protection,
1781
+ :confidence_threshold)
1717
1782
  SENSITIVE = []
1718
1783
  include Aws::Structure
1719
1784
  end
@@ -2920,9 +2985,11 @@ module Aws::Route53Resolver
2920
2985
  # Optional additional filter for the rules to retrieve.
2921
2986
  #
2922
2987
  # The action that DNS Firewall should take on a DNS query when it
2923
- # matches one of the domains in the rule's domain list:
2988
+ # matches one of the domains in the rule's domain list, or a threat
2989
+ # in a DNS Firewall Advanced rule:
2924
2990
  #
2925
- # * `ALLOW` - Permit the request to go through.
2991
+ # * `ALLOW` - Permit the request to go through. Not availabe for DNS
2992
+ # Firewall Advanced rules.
2926
2993
  #
2927
2994
  # * `ALERT` - Permit the request to go through but send an alert to
2928
2995
  # the logs.
@@ -4361,7 +4428,7 @@ module Aws::Route53Resolver
4361
4428
  # * `CREATING`: Resolver is creating an association between an Amazon
4362
4429
  # VPC and a query logging configuration.
4363
4430
  #
4364
- # * `CREATED`: The association between an Amazon VPC and a query
4431
+ # * `ACTIVE`: The association between an Amazon VPC and a query
4365
4432
  # logging configuration was successfully created. Resolver is
4366
4433
  # logging queries that originate in the specified VPC.
4367
4434
  #
@@ -4801,32 +4868,8 @@ module Aws::Route53Resolver
4801
4868
  # @return [String]
4802
4869
  #
4803
4870
  # @!attribute [rw] protocol
4804
- # The protocols for the Resolver endpoints. DoH-FIPS is applicable for
4805
- # inbound endpoints only.
4806
- #
4807
- # For an inbound endpoint you can apply the protocols as follows:
4808
- #
4809
- # * Do53 and DoH in combination.
4810
- #
4811
- # * Do53 and DoH-FIPS in combination.
4812
- #
4813
- # * Do53 alone.
4814
- #
4815
- # * DoH alone.
4816
- #
4817
- # * DoH-FIPS alone.
4818
- #
4819
- # * None, which is treated as Do53.
4820
- #
4821
- # For an outbound endpoint you can apply the protocols as follows:
4822
- #
4823
- # * Do53 and DoH in combination.
4824
- #
4825
- # * Do53 alone.
4826
- #
4827
- # * DoH alone.
4828
- #
4829
- # * None, which is treated as Do53.
4871
+ # The protocols for the target address. The protocol you choose needs
4872
+ # to be supported by the outbound endpoint of the Resolver rule.
4830
4873
  # @return [String]
4831
4874
  #
4832
4875
  # @!attribute [rw] server_name_indication
@@ -5090,6 +5133,10 @@ module Aws::Route53Resolver
5090
5133
  # The ID of the domain list to use in the rule.
5091
5134
  # @return [String]
5092
5135
  #
5136
+ # @!attribute [rw] firewall_threat_protection_id
5137
+ # The DNS Firewall Advanced rule ID.
5138
+ # @return [String]
5139
+ #
5093
5140
  # @!attribute [rw] priority
5094
5141
  # The setting that determines the processing order of the rule in the
5095
5142
  # rule group. DNS Firewall processes the rules in a rule group by
@@ -5103,9 +5150,11 @@ module Aws::Route53Resolver
5103
5150
  #
5104
5151
  # @!attribute [rw] action
5105
5152
  # The action that DNS Firewall should take on a DNS query when it
5106
- # matches one of the domains in the rule's domain list:
5153
+ # matches one of the domains in the rule's domain list, or a threat
5154
+ # in a DNS Firewall Advanced rule:
5107
5155
  #
5108
- # * `ALLOW` - Permit the request to go through.
5156
+ # * `ALLOW` - Permit the request to go through. Not available for DNS
5157
+ # Firewall Advanced rules.
5109
5158
  #
5110
5159
  # * `ALERT` - Permit the request to go through but send an alert to
5111
5160
  # the logs.
@@ -5155,11 +5204,11 @@ module Aws::Route53Resolver
5155
5204
  # How you want the the rule to evaluate DNS redirection in the DNS
5156
5205
  # redirection chain, such as CNAME or DNAME.
5157
5206
  #
5158
- # `Inspect_Redirection_Domain `(Default) inspects all domains in the
5207
+ # `INSPECT_REDIRECTION_DOMAIN`: (Default) inspects all domains in the
5159
5208
  # redirection chain. The individual domains in the redirection chain
5160
5209
  # must be added to the domain list.
5161
5210
  #
5162
- # `Trust_Redirection_Domain ` inspects only the first domain in the
5211
+ # `TRUST_REDIRECTION_DOMAIN`: Inspects only the first domain in the
5163
5212
  # redirection chain. You don't need to add the subsequent domains in
5164
5213
  # the domain in the redirection list to the domain list.
5165
5214
  # @return [String]
@@ -5212,11 +5261,39 @@ module Aws::Route53Resolver
5212
5261
  # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
5213
5262
  # @return [String]
5214
5263
  #
5264
+ # @!attribute [rw] dns_threat_protection
5265
+ # The type of the DNS Firewall Advanced rule. Valid values are:
5266
+ #
5267
+ # * `DGA`: Domain generation algorithms detection. DGAs are used by
5268
+ # attackers to generate a large number of domains to to launch
5269
+ # malware attacks.
5270
+ #
5271
+ # * `DNS_TUNNELING`: DNS tunneling detection. DNS tunneling is used by
5272
+ # attackers to exfiltrate data from the client by using the DNS
5273
+ # tunnel without making a network connection to the client.
5274
+ # @return [String]
5275
+ #
5276
+ # @!attribute [rw] confidence_threshold
5277
+ # The confidence threshold for DNS Firewall Advanced. You must provide
5278
+ # this value when you create a DNS Firewall Advanced rule. The
5279
+ # confidence level values mean:
5280
+ #
5281
+ # * `LOW`: Provides the highest detection rate for threats, but also
5282
+ # increases false positives.
5283
+ #
5284
+ # * `MEDIUM`: Provides a balance between detecting threats and false
5285
+ # positives.
5286
+ #
5287
+ # * `HIGH`: Detects only the most well corroborated threats with a low
5288
+ # rate of false positives.
5289
+ # @return [String]
5290
+ #
5215
5291
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
5216
5292
  #
5217
5293
  class UpdateFirewallRuleRequest < Struct.new(
5218
5294
  :firewall_rule_group_id,
5219
5295
  :firewall_domain_list_id,
5296
+ :firewall_threat_protection_id,
5220
5297
  :priority,
5221
5298
  :action,
5222
5299
  :block_response,
@@ -5225,7 +5302,9 @@ module Aws::Route53Resolver
5225
5302
  :block_override_ttl,
5226
5303
  :name,
5227
5304
  :firewall_domain_redirection_action,
5228
- :qtype)
5305
+ :qtype,
5306
+ :dns_threat_protection,
5307
+ :confidence_threshold)
5229
5308
  SENSITIVE = []
5230
5309
  include Aws::Structure
5231
5310
  end
@@ -54,7 +54,7 @@ module Aws::Route53Resolver
54
54
  autoload :EndpointProvider, 'aws-sdk-route53resolver/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-route53resolver/endpoints'
56
56
 
57
- GEM_VERSION = '1.72.0'
57
+ GEM_VERSION = '1.73.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -161,7 +161,7 @@ module Aws
161
161
  def create_firewall_rule: (
162
162
  creator_request_id: ::String,
163
163
  firewall_rule_group_id: ::String,
164
- firewall_domain_list_id: ::String,
164
+ ?firewall_domain_list_id: ::String,
165
165
  priority: ::Integer,
166
166
  action: ("ALLOW" | "BLOCK" | "ALERT"),
167
167
  ?block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE"),
@@ -170,7 +170,9 @@ module Aws
170
170
  ?block_override_ttl: ::Integer,
171
171
  name: ::String,
172
172
  ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
173
- ?qtype: ::String
173
+ ?qtype: ::String,
174
+ ?dns_threat_protection: ("DGA" | "DNS_TUNNELING"),
175
+ ?confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
174
176
  ) -> _CreateFirewallRuleResponseSuccess
175
177
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
176
178
 
@@ -305,7 +307,8 @@ module Aws
305
307
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/Route53Resolver/Client.html#delete_firewall_rule-instance_method
306
308
  def delete_firewall_rule: (
307
309
  firewall_rule_group_id: ::String,
308
- firewall_domain_list_id: ::String,
310
+ ?firewall_domain_list_id: ::String,
311
+ ?firewall_threat_protection_id: ::String,
309
312
  ?qtype: ::String
310
313
  ) -> _DeleteFirewallRuleResponseSuccess
311
314
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DeleteFirewallRuleResponseSuccess
@@ -915,7 +918,8 @@ module Aws
915
918
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/Route53Resolver/Client.html#update_firewall_rule-instance_method
916
919
  def update_firewall_rule: (
917
920
  firewall_rule_group_id: ::String,
918
- firewall_domain_list_id: ::String,
921
+ ?firewall_domain_list_id: ::String,
922
+ ?firewall_threat_protection_id: ::String,
919
923
  ?priority: ::Integer,
920
924
  ?action: ("ALLOW" | "BLOCK" | "ALERT"),
921
925
  ?block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE"),
@@ -924,7 +928,9 @@ module Aws
924
928
  ?block_override_ttl: ::Integer,
925
929
  ?name: ::String,
926
930
  ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
927
- ?qtype: ::String
931
+ ?qtype: ::String,
932
+ ?dns_threat_protection: ("DGA" | "DNS_TUNNELING"),
933
+ ?confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
928
934
  ) -> _UpdateFirewallRuleResponseSuccess
929
935
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
930
936
 
data/sig/types.rbs CHANGED
@@ -105,6 +105,8 @@ module Aws::Route53Resolver
105
105
  attr_accessor name: ::String
106
106
  attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
107
107
  attr_accessor qtype: ::String
108
+ attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
109
+ attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
108
110
  SENSITIVE: []
109
111
  end
110
112
 
@@ -199,6 +201,7 @@ module Aws::Route53Resolver
199
201
  class DeleteFirewallRuleRequest
200
202
  attr_accessor firewall_rule_group_id: ::String
201
203
  attr_accessor firewall_domain_list_id: ::String
204
+ attr_accessor firewall_threat_protection_id: ::String
202
205
  attr_accessor qtype: ::String
203
206
  SENSITIVE: []
204
207
  end
@@ -331,6 +334,7 @@ module Aws::Route53Resolver
331
334
  class FirewallRule
332
335
  attr_accessor firewall_rule_group_id: ::String
333
336
  attr_accessor firewall_domain_list_id: ::String
337
+ attr_accessor firewall_threat_protection_id: ::String
334
338
  attr_accessor name: ::String
335
339
  attr_accessor priority: ::Integer
336
340
  attr_accessor action: ("ALLOW" | "BLOCK" | "ALERT")
@@ -343,6 +347,8 @@ module Aws::Route53Resolver
343
347
  attr_accessor modification_time: ::String
344
348
  attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
345
349
  attr_accessor qtype: ::String
350
+ attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
351
+ attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
346
352
  SENSITIVE: []
347
353
  end
348
354
 
@@ -1096,6 +1102,7 @@ module Aws::Route53Resolver
1096
1102
  class UpdateFirewallRuleRequest
1097
1103
  attr_accessor firewall_rule_group_id: ::String
1098
1104
  attr_accessor firewall_domain_list_id: ::String
1105
+ attr_accessor firewall_threat_protection_id: ::String
1099
1106
  attr_accessor priority: ::Integer
1100
1107
  attr_accessor action: ("ALLOW" | "BLOCK" | "ALERT")
1101
1108
  attr_accessor block_response: ("NODATA" | "NXDOMAIN" | "OVERRIDE")
@@ -1105,6 +1112,8 @@ module Aws::Route53Resolver
1105
1112
  attr_accessor name: ::String
1106
1113
  attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
1107
1114
  attr_accessor qtype: ::String
1115
+ attr_accessor dns_threat_protection: ("DGA" | "DNS_TUNNELING")
1116
+ attr_accessor confidence_threshold: ("LOW" | "MEDIUM" | "HIGH")
1108
1117
  SENSITIVE: []
1109
1118
  end
1110
1119
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-route53resolver
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.72.0
4
+ version: 1.73.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-10-18 00:00:00.000000000 Z
11
+ date: 2024-11-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core