aws-sdk-route53resolver 1.55.0 → 1.56.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-route53resolver/client.rb +70 -1
- data/lib/aws-sdk-route53resolver/client_api.rb +5 -0
- data/lib/aws-sdk-route53resolver/types.rb +93 -0
- data/lib/aws-sdk-route53resolver.rb +1 -1
- data/sig/client.rbs +2 -0
- data/sig/types.rbs +3 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bdbca49ac33d3597da2f4a42043b6383a4a541c2ed2f7468a295329876b80482
|
4
|
+
data.tar.gz: 7f184de70a81c245b27b8b19d069c2466d5be60f663a7b4ece3d3e9e33fefe42
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: be8eb0c31ff983ecd34b5027b21e1191ef5d9419703a8fce6469d7ef207052e5f4057a8be0a167a9b99b8ff8bec5c58f42b9eb32639edabfab980fbc8870ac8a
|
7
|
+
data.tar.gz: eab68ccf39b044d00b4c59a5c5df748e952a7ff091908eb610a9ea7c0a0388f84e7444a61be2b3ee59fd4565a91fb8faf22272998bb1cc30fcc6a268757a7710
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.56.0 (2024-04-30)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Release of FirewallDomainRedirectionAction parameter on the Route 53 DNS Firewall Rule. This allows customers to configure a DNS Firewall rule to inspect all the domains in the DNS redirection chain (default) , such as CNAME, ALIAS, DNAME, etc., or just the first domain and trust the rest.
|
8
|
+
|
4
9
|
1.55.0 (2024-04-25)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.56.0
|
@@ -837,6 +837,18 @@ module Aws::Route53Resolver
|
|
837
837
|
# @option params [required, String] :name
|
838
838
|
# A name that lets you identify the rule in the rule group.
|
839
839
|
#
|
840
|
+
# @option params [String] :firewall_domain_redirection_action
|
841
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
842
|
+
# redirection chain, such as CNAME, DNAME, ot ALIAS.
|
843
|
+
#
|
844
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
845
|
+
# redirection chain. The individual domains in the redirection chain
|
846
|
+
# must be added to the allow domain list.
|
847
|
+
#
|
848
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
849
|
+
# redirection chain. You don't need to add the subsequent domains in
|
850
|
+
# the redirection list to the domain alloww list.
|
851
|
+
#
|
840
852
|
# @option params [String] :qtype
|
841
853
|
# The DNS query type you want the rule to evaluate. Allowed values are;
|
842
854
|
#
|
@@ -868,6 +880,15 @@ module Aws::Route53Resolver
|
|
868
880
|
#
|
869
881
|
# * TXT: Verifies email senders and application-specific values.
|
870
882
|
#
|
883
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
884
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
885
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
886
|
+
# DNS record types][1].
|
887
|
+
#
|
888
|
+
#
|
889
|
+
#
|
890
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
891
|
+
#
|
871
892
|
# @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
872
893
|
#
|
873
894
|
# * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -885,6 +906,7 @@ module Aws::Route53Resolver
|
|
885
906
|
# block_override_dns_type: "CNAME", # accepts CNAME
|
886
907
|
# block_override_ttl: 1,
|
887
908
|
# name: "Name", # required
|
909
|
+
# firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
|
888
910
|
# qtype: "Qtype",
|
889
911
|
# })
|
890
912
|
#
|
@@ -902,6 +924,7 @@ module Aws::Route53Resolver
|
|
902
924
|
# resp.firewall_rule.creator_request_id #=> String
|
903
925
|
# resp.firewall_rule.creation_time #=> String
|
904
926
|
# resp.firewall_rule.modification_time #=> String
|
927
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
905
928
|
# resp.firewall_rule.qtype #=> String
|
906
929
|
#
|
907
930
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
|
@@ -1072,6 +1095,18 @@ module Aws::Route53Resolver
|
|
1072
1095
|
# outbound access, open the port that you're using for DNS queries on
|
1073
1096
|
# your network.
|
1074
1097
|
#
|
1098
|
+
# Some security group rules will cause your connection to be tracked.
|
1099
|
+
# For outbound resolver endpoint, it can potentially impact the maximum
|
1100
|
+
# queries per second from outbound endpoint to your target name server.
|
1101
|
+
# For inbound resolver endpoint, it can bring down the overall maximum
|
1102
|
+
# queries per second per IP address to as low as 1500. To avoid
|
1103
|
+
# connection tracking caused by security group, see [Untracked
|
1104
|
+
# connections][1].
|
1105
|
+
#
|
1106
|
+
#
|
1107
|
+
#
|
1108
|
+
# [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
|
1109
|
+
#
|
1075
1110
|
# @option params [required, String] :direction
|
1076
1111
|
# Specify the applicable value:
|
1077
1112
|
#
|
@@ -1484,6 +1519,15 @@ module Aws::Route53Resolver
|
|
1484
1519
|
#
|
1485
1520
|
# * TXT: Verifies email senders and application-specific values.
|
1486
1521
|
#
|
1522
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
1523
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
1524
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
1525
|
+
# DNS record types][1].
|
1526
|
+
#
|
1527
|
+
#
|
1528
|
+
#
|
1529
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
1530
|
+
#
|
1487
1531
|
# @return [Types::DeleteFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1488
1532
|
#
|
1489
1533
|
# * {Types::DeleteFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -1510,6 +1554,7 @@ module Aws::Route53Resolver
|
|
1510
1554
|
# resp.firewall_rule.creator_request_id #=> String
|
1511
1555
|
# resp.firewall_rule.creation_time #=> String
|
1512
1556
|
# resp.firewall_rule.modification_time #=> String
|
1557
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
1513
1558
|
# resp.firewall_rule.qtype #=> String
|
1514
1559
|
#
|
1515
1560
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
|
@@ -2990,6 +3035,7 @@ module Aws::Route53Resolver
|
|
2990
3035
|
# resp.firewall_rules[0].creator_request_id #=> String
|
2991
3036
|
# resp.firewall_rules[0].creation_time #=> String
|
2992
3037
|
# resp.firewall_rules[0].modification_time #=> String
|
3038
|
+
# resp.firewall_rules[0].firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
2993
3039
|
# resp.firewall_rules[0].qtype #=> String
|
2994
3040
|
#
|
2995
3041
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
|
@@ -4216,6 +4262,18 @@ module Aws::Route53Resolver
|
|
4216
4262
|
# @option params [String] :name
|
4217
4263
|
# The name of the rule.
|
4218
4264
|
#
|
4265
|
+
# @option params [String] :firewall_domain_redirection_action
|
4266
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
4267
|
+
# redirection chain, such as CNAME, DNAME, ot ALIAS.
|
4268
|
+
#
|
4269
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
4270
|
+
# redirection chain. The individual domains in the redirection chain
|
4271
|
+
# must be added to the allow domain list.
|
4272
|
+
#
|
4273
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
4274
|
+
# redirection chain. You don't need to add the subsequent domains in
|
4275
|
+
# the domain in the redirection list to the domain alloww list.
|
4276
|
+
#
|
4219
4277
|
# @option params [String] :qtype
|
4220
4278
|
# The DNS query type you want the rule to evaluate. Allowed values are;
|
4221
4279
|
#
|
@@ -4247,6 +4305,15 @@ module Aws::Route53Resolver
|
|
4247
4305
|
#
|
4248
4306
|
# * TXT: Verifies email senders and application-specific values.
|
4249
4307
|
#
|
4308
|
+
# * A query type you define by using the DNS type ID, for example 28 for
|
4309
|
+
# AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
|
4310
|
+
# be 1-65334, for example, TYPE28. For more information, see [List of
|
4311
|
+
# DNS record types][1].
|
4312
|
+
#
|
4313
|
+
#
|
4314
|
+
#
|
4315
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
4316
|
+
#
|
4250
4317
|
# @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
4251
4318
|
#
|
4252
4319
|
# * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
|
@@ -4263,6 +4330,7 @@ module Aws::Route53Resolver
|
|
4263
4330
|
# block_override_dns_type: "CNAME", # accepts CNAME
|
4264
4331
|
# block_override_ttl: 1,
|
4265
4332
|
# name: "Name",
|
4333
|
+
# firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
|
4266
4334
|
# qtype: "Qtype",
|
4267
4335
|
# })
|
4268
4336
|
#
|
@@ -4280,6 +4348,7 @@ module Aws::Route53Resolver
|
|
4280
4348
|
# resp.firewall_rule.creator_request_id #=> String
|
4281
4349
|
# resp.firewall_rule.creation_time #=> String
|
4282
4350
|
# resp.firewall_rule.modification_time #=> String
|
4351
|
+
# resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
|
4283
4352
|
# resp.firewall_rule.qtype #=> String
|
4284
4353
|
#
|
4285
4354
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
|
@@ -4683,7 +4752,7 @@ module Aws::Route53Resolver
|
|
4683
4752
|
params: params,
|
4684
4753
|
config: config)
|
4685
4754
|
context[:gem_name] = 'aws-sdk-route53resolver'
|
4686
|
-
context[:gem_version] = '1.
|
4755
|
+
context[:gem_version] = '1.56.0'
|
4687
4756
|
Seahorse::Client::Request.new(handlers, context)
|
4688
4757
|
end
|
4689
4758
|
|
@@ -87,6 +87,7 @@ module Aws::Route53Resolver
|
|
87
87
|
FirewallDomainListMetadataList = Shapes::ListShape.new(name: 'FirewallDomainListMetadataList')
|
88
88
|
FirewallDomainListStatus = Shapes::StringShape.new(name: 'FirewallDomainListStatus')
|
89
89
|
FirewallDomainName = Shapes::StringShape.new(name: 'FirewallDomainName')
|
90
|
+
FirewallDomainRedirectionAction = Shapes::StringShape.new(name: 'FirewallDomainRedirectionAction')
|
90
91
|
FirewallDomainUpdateOperation = Shapes::StringShape.new(name: 'FirewallDomainUpdateOperation')
|
91
92
|
FirewallDomains = Shapes::ListShape.new(name: 'FirewallDomains')
|
92
93
|
FirewallFailOpenStatus = Shapes::StringShape.new(name: 'FirewallFailOpenStatus')
|
@@ -354,6 +355,7 @@ module Aws::Route53Resolver
|
|
354
355
|
CreateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
|
355
356
|
CreateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
|
356
357
|
CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
|
358
|
+
CreateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
|
357
359
|
CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
|
358
360
|
CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
|
359
361
|
|
@@ -529,6 +531,7 @@ module Aws::Route53Resolver
|
|
529
531
|
FirewallRule.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, location_name: "CreatorRequestId"))
|
530
532
|
FirewallRule.add_member(:creation_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "CreationTime"))
|
531
533
|
FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
|
534
|
+
FirewallRule.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction"))
|
532
535
|
FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
|
533
536
|
FirewallRule.struct_class = Types::FirewallRule
|
534
537
|
|
@@ -1103,6 +1106,7 @@ module Aws::Route53Resolver
|
|
1103
1106
|
UpdateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
|
1104
1107
|
UpdateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
|
1105
1108
|
UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
|
1109
|
+
UpdateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
|
1106
1110
|
UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
|
1107
1111
|
UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
|
1108
1112
|
|
@@ -1169,6 +1173,7 @@ module Aws::Route53Resolver
|
|
1169
1173
|
"endpointPrefix" => "route53resolver",
|
1170
1174
|
"jsonVersion" => "1.1",
|
1171
1175
|
"protocol" => "json",
|
1176
|
+
"protocols" => ["json"],
|
1172
1177
|
"serviceAbbreviation" => "Route53Resolver",
|
1173
1178
|
"serviceFullName" => "Amazon Route 53 Resolver",
|
1174
1179
|
"serviceId" => "Route53Resolver",
|
@@ -13,6 +13,9 @@ module Aws::Route53Resolver
|
|
13
13
|
# The current account doesn't have the IAM permissions required to
|
14
14
|
# perform the specified Resolver operation.
|
15
15
|
#
|
16
|
+
# This error can also be thrown when a customer has reached the 5120
|
17
|
+
# character limit for a resource policy for CloudWatch Logs.
|
18
|
+
#
|
16
19
|
# @!attribute [rw] message
|
17
20
|
# @return [String]
|
18
21
|
#
|
@@ -401,6 +404,19 @@ module Aws::Route53Resolver
|
|
401
404
|
# A name that lets you identify the rule in the rule group.
|
402
405
|
# @return [String]
|
403
406
|
#
|
407
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
408
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
409
|
+
# redirection chain, such as CNAME, DNAME, ot ALIAS.
|
410
|
+
#
|
411
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
412
|
+
# redirection chain. The individual domains in the redirection chain
|
413
|
+
# must be added to the allow domain list.
|
414
|
+
#
|
415
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
416
|
+
# redirection chain. You don't need to add the subsequent domains in
|
417
|
+
# the redirection list to the domain alloww list.
|
418
|
+
# @return [String]
|
419
|
+
#
|
404
420
|
# @!attribute [rw] qtype
|
405
421
|
# The DNS query type you want the rule to evaluate. Allowed values
|
406
422
|
# are;
|
@@ -432,6 +448,15 @@ module Aws::Route53Resolver
|
|
432
448
|
# * SRV: Application specific values that identify servers.
|
433
449
|
#
|
434
450
|
# * TXT: Verifies email senders and application-specific values.
|
451
|
+
#
|
452
|
+
# * A query type you define by using the DNS type ID, for example 28
|
453
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
454
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
455
|
+
# see [List of DNS record types][1].
|
456
|
+
#
|
457
|
+
#
|
458
|
+
#
|
459
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
435
460
|
# @return [String]
|
436
461
|
#
|
437
462
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
|
@@ -447,6 +472,7 @@ module Aws::Route53Resolver
|
|
447
472
|
:block_override_dns_type,
|
448
473
|
:block_override_ttl,
|
449
474
|
:name,
|
475
|
+
:firewall_domain_redirection_action,
|
450
476
|
:qtype)
|
451
477
|
SENSITIVE = []
|
452
478
|
include Aws::Structure
|
@@ -543,6 +569,18 @@ module Aws::Route53Resolver
|
|
543
569
|
# outbound rules must allow TCP and UDP access. For inbound access,
|
544
570
|
# open port 53. For outbound access, open the port that you're using
|
545
571
|
# for DNS queries on your network.
|
572
|
+
#
|
573
|
+
# Some security group rules will cause your connection to be tracked.
|
574
|
+
# For outbound resolver endpoint, it can potentially impact the
|
575
|
+
# maximum queries per second from outbound endpoint to your target
|
576
|
+
# name server. For inbound resolver endpoint, it can bring down the
|
577
|
+
# overall maximum queries per second per IP address to as low as 1500.
|
578
|
+
# To avoid connection tracking caused by security group, see
|
579
|
+
# [Untracked connections][1].
|
580
|
+
#
|
581
|
+
#
|
582
|
+
#
|
583
|
+
# [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
|
546
584
|
# @return [Array<String>]
|
547
585
|
#
|
548
586
|
# @!attribute [rw] direction
|
@@ -887,6 +925,15 @@ module Aws::Route53Resolver
|
|
887
925
|
# * SRV: Application specific values that identify servers.
|
888
926
|
#
|
889
927
|
# * TXT: Verifies email senders and application-specific values.
|
928
|
+
#
|
929
|
+
# * A query type you define by using the DNS type ID, for example 28
|
930
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
931
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
932
|
+
# see [List of DNS record types][1].
|
933
|
+
#
|
934
|
+
#
|
935
|
+
#
|
936
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
890
937
|
# @return [String]
|
891
938
|
#
|
892
939
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRuleRequest AWS API Documentation
|
@@ -1595,6 +1642,19 @@ module Aws::Route53Resolver
|
|
1595
1642
|
# format and Coordinated Universal Time (UTC).
|
1596
1643
|
# @return [String]
|
1597
1644
|
#
|
1645
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
1646
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
1647
|
+
# redirection chain, such as CNAME, DNAME, ot ALIAS.
|
1648
|
+
#
|
1649
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
1650
|
+
# redirection chain. The individual domains in the redirection chain
|
1651
|
+
# must be added to the allow domain list.
|
1652
|
+
#
|
1653
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
1654
|
+
# redirection chain. You don't need to add the subsequent domains in
|
1655
|
+
# the domain in the redirection list to the domain alloww list.
|
1656
|
+
# @return [String]
|
1657
|
+
#
|
1598
1658
|
# @!attribute [rw] qtype
|
1599
1659
|
# The DNS query type you want the rule to evaluate. Allowed values
|
1600
1660
|
# are;
|
@@ -1626,6 +1686,15 @@ module Aws::Route53Resolver
|
|
1626
1686
|
# * SRV: Application specific values that identify servers.
|
1627
1687
|
#
|
1628
1688
|
# * TXT: Verifies email senders and application-specific values.
|
1689
|
+
#
|
1690
|
+
# * A query type you define by using the DNS type ID, for example 28
|
1691
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
1692
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
1693
|
+
# see [List of DNS record types][1].
|
1694
|
+
#
|
1695
|
+
#
|
1696
|
+
#
|
1697
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
1629
1698
|
# @return [String]
|
1630
1699
|
#
|
1631
1700
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
|
@@ -1643,6 +1712,7 @@ module Aws::Route53Resolver
|
|
1643
1712
|
:creator_request_id,
|
1644
1713
|
:creation_time,
|
1645
1714
|
:modification_time,
|
1715
|
+
:firewall_domain_redirection_action,
|
1646
1716
|
:qtype)
|
1647
1717
|
SENSITIVE = []
|
1648
1718
|
include Aws::Structure
|
@@ -5074,6 +5144,19 @@ module Aws::Route53Resolver
|
|
5074
5144
|
# The name of the rule.
|
5075
5145
|
# @return [String]
|
5076
5146
|
#
|
5147
|
+
# @!attribute [rw] firewall_domain_redirection_action
|
5148
|
+
# How you want the the rule to evaluate DNS redirection in the DNS
|
5149
|
+
# redirection chain, such as CNAME, DNAME, ot ALIAS.
|
5150
|
+
#
|
5151
|
+
# `Inspect_Redirection_Domain `(Default) inspects all domains in the
|
5152
|
+
# redirection chain. The individual domains in the redirection chain
|
5153
|
+
# must be added to the allow domain list.
|
5154
|
+
#
|
5155
|
+
# `Trust_Redirection_Domain ` inspects only the first domain in the
|
5156
|
+
# redirection chain. You don't need to add the subsequent domains in
|
5157
|
+
# the domain in the redirection list to the domain alloww list.
|
5158
|
+
# @return [String]
|
5159
|
+
#
|
5077
5160
|
# @!attribute [rw] qtype
|
5078
5161
|
# The DNS query type you want the rule to evaluate. Allowed values
|
5079
5162
|
# are;
|
@@ -5105,6 +5188,15 @@ module Aws::Route53Resolver
|
|
5105
5188
|
# * SRV: Application specific values that identify servers.
|
5106
5189
|
#
|
5107
5190
|
# * TXT: Verifies email senders and application-specific values.
|
5191
|
+
#
|
5192
|
+
# * A query type you define by using the DNS type ID, for example 28
|
5193
|
+
# for AAAA. The values must be defined as TYPENUMBER, where the
|
5194
|
+
# NUMBER can be 1-65334, for example, TYPE28. For more information,
|
5195
|
+
# see [List of DNS record types][1].
|
5196
|
+
#
|
5197
|
+
#
|
5198
|
+
#
|
5199
|
+
# [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
|
5108
5200
|
# @return [String]
|
5109
5201
|
#
|
5110
5202
|
# @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
|
@@ -5119,6 +5211,7 @@ module Aws::Route53Resolver
|
|
5119
5211
|
:block_override_dns_type,
|
5120
5212
|
:block_override_ttl,
|
5121
5213
|
:name,
|
5214
|
+
:firewall_domain_redirection_action,
|
5122
5215
|
:qtype)
|
5123
5216
|
SENSITIVE = []
|
5124
5217
|
include Aws::Structure
|
data/sig/client.rbs
CHANGED
@@ -166,6 +166,7 @@ module Aws
|
|
166
166
|
?block_override_dns_type: ("CNAME"),
|
167
167
|
?block_override_ttl: ::Integer,
|
168
168
|
name: ::String,
|
169
|
+
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
169
170
|
?qtype: ::String
|
170
171
|
) -> _CreateFirewallRuleResponseSuccess
|
171
172
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
|
@@ -918,6 +919,7 @@ module Aws
|
|
918
919
|
?block_override_dns_type: ("CNAME"),
|
919
920
|
?block_override_ttl: ::Integer,
|
920
921
|
?name: ::String,
|
922
|
+
?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
|
921
923
|
?qtype: ::String
|
922
924
|
) -> _UpdateFirewallRuleResponseSuccess
|
923
925
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -103,6 +103,7 @@ module Aws::Route53Resolver
|
|
103
103
|
attr_accessor block_override_dns_type: ("CNAME")
|
104
104
|
attr_accessor block_override_ttl: ::Integer
|
105
105
|
attr_accessor name: ::String
|
106
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
106
107
|
attr_accessor qtype: ::String
|
107
108
|
SENSITIVE: []
|
108
109
|
end
|
@@ -340,6 +341,7 @@ module Aws::Route53Resolver
|
|
340
341
|
attr_accessor creator_request_id: ::String
|
341
342
|
attr_accessor creation_time: ::String
|
342
343
|
attr_accessor modification_time: ::String
|
344
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
343
345
|
attr_accessor qtype: ::String
|
344
346
|
SENSITIVE: []
|
345
347
|
end
|
@@ -1100,6 +1102,7 @@ module Aws::Route53Resolver
|
|
1100
1102
|
attr_accessor block_override_dns_type: ("CNAME")
|
1101
1103
|
attr_accessor block_override_ttl: ::Integer
|
1102
1104
|
attr_accessor name: ::String
|
1105
|
+
attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
|
1103
1106
|
attr_accessor qtype: ::String
|
1104
1107
|
SENSITIVE: []
|
1105
1108
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-route53resolver
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.56.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-04-
|
11
|
+
date: 2024-04-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|