aws-sdk-route53resolver 1.55.0 → 1.56.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 64fe753f55b9a7ddc5973160322750c22693f6b548df2fa97b6dd5606dbd934e
4
- data.tar.gz: ba037006bc592cc87fe92f74d730ad9cf534c2406d0fc7b34d7e0415901cfa5c
3
+ metadata.gz: bdbca49ac33d3597da2f4a42043b6383a4a541c2ed2f7468a295329876b80482
4
+ data.tar.gz: 7f184de70a81c245b27b8b19d069c2466d5be60f663a7b4ece3d3e9e33fefe42
5
5
  SHA512:
6
- metadata.gz: 6e2253a1844ad9bdca630fda0955b70a2583fc319664463f8ebb6841fe9c169ffaa0758d6d1559ed2a64a3684e19a438271912f66f6027fa03b481c3fff3244b
7
- data.tar.gz: '019105861157819de394b69c7f46c0e1c503b48a1b9dda916f14fbf788abe7a2b34d0f6061e84bf84d6dcbd273ee713097b74a93a2f9c10b65c083059dd31a89'
6
+ metadata.gz: be8eb0c31ff983ecd34b5027b21e1191ef5d9419703a8fce6469d7ef207052e5f4057a8be0a167a9b99b8ff8bec5c58f42b9eb32639edabfab980fbc8870ac8a
7
+ data.tar.gz: eab68ccf39b044d00b4c59a5c5df748e952a7ff091908eb610a9ea7c0a0388f84e7444a61be2b3ee59fd4565a91fb8faf22272998bb1cc30fcc6a268757a7710
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.56.0 (2024-04-30)
5
+ ------------------
6
+
7
+ * Feature - Release of FirewallDomainRedirectionAction parameter on the Route 53 DNS Firewall Rule. This allows customers to configure a DNS Firewall rule to inspect all the domains in the DNS redirection chain (default) , such as CNAME, ALIAS, DNAME, etc., or just the first domain and trust the rest.
8
+
4
9
  1.55.0 (2024-04-25)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.55.0
1
+ 1.56.0
@@ -837,6 +837,18 @@ module Aws::Route53Resolver
837
837
  # @option params [required, String] :name
838
838
  # A name that lets you identify the rule in the rule group.
839
839
  #
840
+ # @option params [String] :firewall_domain_redirection_action
841
+ # How you want the the rule to evaluate DNS redirection in the DNS
842
+ # redirection chain, such as CNAME, DNAME, ot ALIAS.
843
+ #
844
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
845
+ # redirection chain. The individual domains in the redirection chain
846
+ # must be added to the allow domain list.
847
+ #
848
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
849
+ # redirection chain. You don't need to add the subsequent domains in
850
+ # the redirection list to the domain alloww list.
851
+ #
840
852
  # @option params [String] :qtype
841
853
  # The DNS query type you want the rule to evaluate. Allowed values are;
842
854
  #
@@ -868,6 +880,15 @@ module Aws::Route53Resolver
868
880
  #
869
881
  # * TXT: Verifies email senders and application-specific values.
870
882
  #
883
+ # * A query type you define by using the DNS type ID, for example 28 for
884
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
885
+ # be 1-65334, for example, TYPE28. For more information, see [List of
886
+ # DNS record types][1].
887
+ #
888
+ #
889
+ #
890
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
891
+ #
871
892
  # @return [Types::CreateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
872
893
  #
873
894
  # * {Types::CreateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -885,6 +906,7 @@ module Aws::Route53Resolver
885
906
  # block_override_dns_type: "CNAME", # accepts CNAME
886
907
  # block_override_ttl: 1,
887
908
  # name: "Name", # required
909
+ # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
888
910
  # qtype: "Qtype",
889
911
  # })
890
912
  #
@@ -902,6 +924,7 @@ module Aws::Route53Resolver
902
924
  # resp.firewall_rule.creator_request_id #=> String
903
925
  # resp.firewall_rule.creation_time #=> String
904
926
  # resp.firewall_rule.modification_time #=> String
927
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
905
928
  # resp.firewall_rule.qtype #=> String
906
929
  #
907
930
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRule AWS API Documentation
@@ -1072,6 +1095,18 @@ module Aws::Route53Resolver
1072
1095
  # outbound access, open the port that you're using for DNS queries on
1073
1096
  # your network.
1074
1097
  #
1098
+ # Some security group rules will cause your connection to be tracked.
1099
+ # For outbound resolver endpoint, it can potentially impact the maximum
1100
+ # queries per second from outbound endpoint to your target name server.
1101
+ # For inbound resolver endpoint, it can bring down the overall maximum
1102
+ # queries per second per IP address to as low as 1500. To avoid
1103
+ # connection tracking caused by security group, see [Untracked
1104
+ # connections][1].
1105
+ #
1106
+ #
1107
+ #
1108
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
1109
+ #
1075
1110
  # @option params [required, String] :direction
1076
1111
  # Specify the applicable value:
1077
1112
  #
@@ -1484,6 +1519,15 @@ module Aws::Route53Resolver
1484
1519
  #
1485
1520
  # * TXT: Verifies email senders and application-specific values.
1486
1521
  #
1522
+ # * A query type you define by using the DNS type ID, for example 28 for
1523
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
1524
+ # be 1-65334, for example, TYPE28. For more information, see [List of
1525
+ # DNS record types][1].
1526
+ #
1527
+ #
1528
+ #
1529
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
1530
+ #
1487
1531
  # @return [Types::DeleteFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1488
1532
  #
1489
1533
  # * {Types::DeleteFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -1510,6 +1554,7 @@ module Aws::Route53Resolver
1510
1554
  # resp.firewall_rule.creator_request_id #=> String
1511
1555
  # resp.firewall_rule.creation_time #=> String
1512
1556
  # resp.firewall_rule.modification_time #=> String
1557
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
1513
1558
  # resp.firewall_rule.qtype #=> String
1514
1559
  #
1515
1560
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRule AWS API Documentation
@@ -2990,6 +3035,7 @@ module Aws::Route53Resolver
2990
3035
  # resp.firewall_rules[0].creator_request_id #=> String
2991
3036
  # resp.firewall_rules[0].creation_time #=> String
2992
3037
  # resp.firewall_rules[0].modification_time #=> String
3038
+ # resp.firewall_rules[0].firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
2993
3039
  # resp.firewall_rules[0].qtype #=> String
2994
3040
  #
2995
3041
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/ListFirewallRules AWS API Documentation
@@ -4216,6 +4262,18 @@ module Aws::Route53Resolver
4216
4262
  # @option params [String] :name
4217
4263
  # The name of the rule.
4218
4264
  #
4265
+ # @option params [String] :firewall_domain_redirection_action
4266
+ # How you want the the rule to evaluate DNS redirection in the DNS
4267
+ # redirection chain, such as CNAME, DNAME, ot ALIAS.
4268
+ #
4269
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
4270
+ # redirection chain. The individual domains in the redirection chain
4271
+ # must be added to the allow domain list.
4272
+ #
4273
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
4274
+ # redirection chain. You don't need to add the subsequent domains in
4275
+ # the domain in the redirection list to the domain alloww list.
4276
+ #
4219
4277
  # @option params [String] :qtype
4220
4278
  # The DNS query type you want the rule to evaluate. Allowed values are;
4221
4279
  #
@@ -4247,6 +4305,15 @@ module Aws::Route53Resolver
4247
4305
  #
4248
4306
  # * TXT: Verifies email senders and application-specific values.
4249
4307
  #
4308
+ # * A query type you define by using the DNS type ID, for example 28 for
4309
+ # AAAA. The values must be defined as TYPENUMBER, where the NUMBER can
4310
+ # be 1-65334, for example, TYPE28. For more information, see [List of
4311
+ # DNS record types][1].
4312
+ #
4313
+ #
4314
+ #
4315
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
4316
+ #
4250
4317
  # @return [Types::UpdateFirewallRuleResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4251
4318
  #
4252
4319
  # * {Types::UpdateFirewallRuleResponse#firewall_rule #firewall_rule} => Types::FirewallRule
@@ -4263,6 +4330,7 @@ module Aws::Route53Resolver
4263
4330
  # block_override_dns_type: "CNAME", # accepts CNAME
4264
4331
  # block_override_ttl: 1,
4265
4332
  # name: "Name",
4333
+ # firewall_domain_redirection_action: "INSPECT_REDIRECTION_DOMAIN", # accepts INSPECT_REDIRECTION_DOMAIN, TRUST_REDIRECTION_DOMAIN
4266
4334
  # qtype: "Qtype",
4267
4335
  # })
4268
4336
  #
@@ -4280,6 +4348,7 @@ module Aws::Route53Resolver
4280
4348
  # resp.firewall_rule.creator_request_id #=> String
4281
4349
  # resp.firewall_rule.creation_time #=> String
4282
4350
  # resp.firewall_rule.modification_time #=> String
4351
+ # resp.firewall_rule.firewall_domain_redirection_action #=> String, one of "INSPECT_REDIRECTION_DOMAIN", "TRUST_REDIRECTION_DOMAIN"
4283
4352
  # resp.firewall_rule.qtype #=> String
4284
4353
  #
4285
4354
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRule AWS API Documentation
@@ -4683,7 +4752,7 @@ module Aws::Route53Resolver
4683
4752
  params: params,
4684
4753
  config: config)
4685
4754
  context[:gem_name] = 'aws-sdk-route53resolver'
4686
- context[:gem_version] = '1.55.0'
4755
+ context[:gem_version] = '1.56.0'
4687
4756
  Seahorse::Client::Request.new(handlers, context)
4688
4757
  end
4689
4758
 
@@ -87,6 +87,7 @@ module Aws::Route53Resolver
87
87
  FirewallDomainListMetadataList = Shapes::ListShape.new(name: 'FirewallDomainListMetadataList')
88
88
  FirewallDomainListStatus = Shapes::StringShape.new(name: 'FirewallDomainListStatus')
89
89
  FirewallDomainName = Shapes::StringShape.new(name: 'FirewallDomainName')
90
+ FirewallDomainRedirectionAction = Shapes::StringShape.new(name: 'FirewallDomainRedirectionAction')
90
91
  FirewallDomainUpdateOperation = Shapes::StringShape.new(name: 'FirewallDomainUpdateOperation')
91
92
  FirewallDomains = Shapes::ListShape.new(name: 'FirewallDomains')
92
93
  FirewallFailOpenStatus = Shapes::StringShape.new(name: 'FirewallFailOpenStatus')
@@ -354,6 +355,7 @@ module Aws::Route53Resolver
354
355
  CreateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
355
356
  CreateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
356
357
  CreateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, required: true, location_name: "Name"))
358
+ CreateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
357
359
  CreateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype", metadata: {"box"=>true}))
358
360
  CreateFirewallRuleRequest.struct_class = Types::CreateFirewallRuleRequest
359
361
 
@@ -529,6 +531,7 @@ module Aws::Route53Resolver
529
531
  FirewallRule.add_member(:creator_request_id, Shapes::ShapeRef.new(shape: CreatorRequestId, location_name: "CreatorRequestId"))
530
532
  FirewallRule.add_member(:creation_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "CreationTime"))
531
533
  FirewallRule.add_member(:modification_time, Shapes::ShapeRef.new(shape: Rfc3339TimeString, location_name: "ModificationTime"))
534
+ FirewallRule.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction"))
532
535
  FirewallRule.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
533
536
  FirewallRule.struct_class = Types::FirewallRule
534
537
 
@@ -1103,6 +1106,7 @@ module Aws::Route53Resolver
1103
1106
  UpdateFirewallRuleRequest.add_member(:block_override_dns_type, Shapes::ShapeRef.new(shape: BlockOverrideDnsType, location_name: "BlockOverrideDnsType", metadata: {"box"=>true}))
1104
1107
  UpdateFirewallRuleRequest.add_member(:block_override_ttl, Shapes::ShapeRef.new(shape: BlockOverrideTtl, location_name: "BlockOverrideTtl", metadata: {"box"=>true}))
1105
1108
  UpdateFirewallRuleRequest.add_member(:name, Shapes::ShapeRef.new(shape: Name, location_name: "Name", metadata: {"box"=>true}))
1109
+ UpdateFirewallRuleRequest.add_member(:firewall_domain_redirection_action, Shapes::ShapeRef.new(shape: FirewallDomainRedirectionAction, location_name: "FirewallDomainRedirectionAction", metadata: {"box"=>true}))
1106
1110
  UpdateFirewallRuleRequest.add_member(:qtype, Shapes::ShapeRef.new(shape: Qtype, location_name: "Qtype"))
1107
1111
  UpdateFirewallRuleRequest.struct_class = Types::UpdateFirewallRuleRequest
1108
1112
 
@@ -1169,6 +1173,7 @@ module Aws::Route53Resolver
1169
1173
  "endpointPrefix" => "route53resolver",
1170
1174
  "jsonVersion" => "1.1",
1171
1175
  "protocol" => "json",
1176
+ "protocols" => ["json"],
1172
1177
  "serviceAbbreviation" => "Route53Resolver",
1173
1178
  "serviceFullName" => "Amazon Route 53 Resolver",
1174
1179
  "serviceId" => "Route53Resolver",
@@ -13,6 +13,9 @@ module Aws::Route53Resolver
13
13
  # The current account doesn't have the IAM permissions required to
14
14
  # perform the specified Resolver operation.
15
15
  #
16
+ # This error can also be thrown when a customer has reached the 5120
17
+ # character limit for a resource policy for CloudWatch Logs.
18
+ #
16
19
  # @!attribute [rw] message
17
20
  # @return [String]
18
21
  #
@@ -401,6 +404,19 @@ module Aws::Route53Resolver
401
404
  # A name that lets you identify the rule in the rule group.
402
405
  # @return [String]
403
406
  #
407
+ # @!attribute [rw] firewall_domain_redirection_action
408
+ # How you want the the rule to evaluate DNS redirection in the DNS
409
+ # redirection chain, such as CNAME, DNAME, ot ALIAS.
410
+ #
411
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
412
+ # redirection chain. The individual domains in the redirection chain
413
+ # must be added to the allow domain list.
414
+ #
415
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
416
+ # redirection chain. You don't need to add the subsequent domains in
417
+ # the redirection list to the domain alloww list.
418
+ # @return [String]
419
+ #
404
420
  # @!attribute [rw] qtype
405
421
  # The DNS query type you want the rule to evaluate. Allowed values
406
422
  # are;
@@ -432,6 +448,15 @@ module Aws::Route53Resolver
432
448
  # * SRV: Application specific values that identify servers.
433
449
  #
434
450
  # * TXT: Verifies email senders and application-specific values.
451
+ #
452
+ # * A query type you define by using the DNS type ID, for example 28
453
+ # for AAAA. The values must be defined as TYPENUMBER, where the
454
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
455
+ # see [List of DNS record types][1].
456
+ #
457
+ #
458
+ #
459
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
435
460
  # @return [String]
436
461
  #
437
462
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/CreateFirewallRuleRequest AWS API Documentation
@@ -447,6 +472,7 @@ module Aws::Route53Resolver
447
472
  :block_override_dns_type,
448
473
  :block_override_ttl,
449
474
  :name,
475
+ :firewall_domain_redirection_action,
450
476
  :qtype)
451
477
  SENSITIVE = []
452
478
  include Aws::Structure
@@ -543,6 +569,18 @@ module Aws::Route53Resolver
543
569
  # outbound rules must allow TCP and UDP access. For inbound access,
544
570
  # open port 53. For outbound access, open the port that you're using
545
571
  # for DNS queries on your network.
572
+ #
573
+ # Some security group rules will cause your connection to be tracked.
574
+ # For outbound resolver endpoint, it can potentially impact the
575
+ # maximum queries per second from outbound endpoint to your target
576
+ # name server. For inbound resolver endpoint, it can bring down the
577
+ # overall maximum queries per second per IP address to as low as 1500.
578
+ # To avoid connection tracking caused by security group, see
579
+ # [Untracked connections][1].
580
+ #
581
+ #
582
+ #
583
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html#untracked-connectionsl
546
584
  # @return [Array<String>]
547
585
  #
548
586
  # @!attribute [rw] direction
@@ -887,6 +925,15 @@ module Aws::Route53Resolver
887
925
  # * SRV: Application specific values that identify servers.
888
926
  #
889
927
  # * TXT: Verifies email senders and application-specific values.
928
+ #
929
+ # * A query type you define by using the DNS type ID, for example 28
930
+ # for AAAA. The values must be defined as TYPENUMBER, where the
931
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
932
+ # see [List of DNS record types][1].
933
+ #
934
+ #
935
+ #
936
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
890
937
  # @return [String]
891
938
  #
892
939
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/DeleteFirewallRuleRequest AWS API Documentation
@@ -1595,6 +1642,19 @@ module Aws::Route53Resolver
1595
1642
  # format and Coordinated Universal Time (UTC).
1596
1643
  # @return [String]
1597
1644
  #
1645
+ # @!attribute [rw] firewall_domain_redirection_action
1646
+ # How you want the the rule to evaluate DNS redirection in the DNS
1647
+ # redirection chain, such as CNAME, DNAME, ot ALIAS.
1648
+ #
1649
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
1650
+ # redirection chain. The individual domains in the redirection chain
1651
+ # must be added to the allow domain list.
1652
+ #
1653
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
1654
+ # redirection chain. You don't need to add the subsequent domains in
1655
+ # the domain in the redirection list to the domain alloww list.
1656
+ # @return [String]
1657
+ #
1598
1658
  # @!attribute [rw] qtype
1599
1659
  # The DNS query type you want the rule to evaluate. Allowed values
1600
1660
  # are;
@@ -1626,6 +1686,15 @@ module Aws::Route53Resolver
1626
1686
  # * SRV: Application specific values that identify servers.
1627
1687
  #
1628
1688
  # * TXT: Verifies email senders and application-specific values.
1689
+ #
1690
+ # * A query type you define by using the DNS type ID, for example 28
1691
+ # for AAAA. The values must be defined as TYPENUMBER, where the
1692
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
1693
+ # see [List of DNS record types][1].
1694
+ #
1695
+ #
1696
+ #
1697
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
1629
1698
  # @return [String]
1630
1699
  #
1631
1700
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/FirewallRule AWS API Documentation
@@ -1643,6 +1712,7 @@ module Aws::Route53Resolver
1643
1712
  :creator_request_id,
1644
1713
  :creation_time,
1645
1714
  :modification_time,
1715
+ :firewall_domain_redirection_action,
1646
1716
  :qtype)
1647
1717
  SENSITIVE = []
1648
1718
  include Aws::Structure
@@ -5074,6 +5144,19 @@ module Aws::Route53Resolver
5074
5144
  # The name of the rule.
5075
5145
  # @return [String]
5076
5146
  #
5147
+ # @!attribute [rw] firewall_domain_redirection_action
5148
+ # How you want the the rule to evaluate DNS redirection in the DNS
5149
+ # redirection chain, such as CNAME, DNAME, ot ALIAS.
5150
+ #
5151
+ # `Inspect_Redirection_Domain `(Default) inspects all domains in the
5152
+ # redirection chain. The individual domains in the redirection chain
5153
+ # must be added to the allow domain list.
5154
+ #
5155
+ # `Trust_Redirection_Domain ` inspects only the first domain in the
5156
+ # redirection chain. You don't need to add the subsequent domains in
5157
+ # the domain in the redirection list to the domain alloww list.
5158
+ # @return [String]
5159
+ #
5077
5160
  # @!attribute [rw] qtype
5078
5161
  # The DNS query type you want the rule to evaluate. Allowed values
5079
5162
  # are;
@@ -5105,6 +5188,15 @@ module Aws::Route53Resolver
5105
5188
  # * SRV: Application specific values that identify servers.
5106
5189
  #
5107
5190
  # * TXT: Verifies email senders and application-specific values.
5191
+ #
5192
+ # * A query type you define by using the DNS type ID, for example 28
5193
+ # for AAAA. The values must be defined as TYPENUMBER, where the
5194
+ # NUMBER can be 1-65334, for example, TYPE28. For more information,
5195
+ # see [List of DNS record types][1].
5196
+ #
5197
+ #
5198
+ #
5199
+ # [1]: https://en.wikipedia.org/wiki/List_of_DNS_record_types
5108
5200
  # @return [String]
5109
5201
  #
5110
5202
  # @see http://docs.aws.amazon.com/goto/WebAPI/route53resolver-2018-04-01/UpdateFirewallRuleRequest AWS API Documentation
@@ -5119,6 +5211,7 @@ module Aws::Route53Resolver
5119
5211
  :block_override_dns_type,
5120
5212
  :block_override_ttl,
5121
5213
  :name,
5214
+ :firewall_domain_redirection_action,
5122
5215
  :qtype)
5123
5216
  SENSITIVE = []
5124
5217
  include Aws::Structure
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-route53resolver/customizations'
52
52
  # @!group service
53
53
  module Aws::Route53Resolver
54
54
 
55
- GEM_VERSION = '1.55.0'
55
+ GEM_VERSION = '1.56.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -166,6 +166,7 @@ module Aws
166
166
  ?block_override_dns_type: ("CNAME"),
167
167
  ?block_override_ttl: ::Integer,
168
168
  name: ::String,
169
+ ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
169
170
  ?qtype: ::String
170
171
  ) -> _CreateFirewallRuleResponseSuccess
171
172
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateFirewallRuleResponseSuccess
@@ -918,6 +919,7 @@ module Aws
918
919
  ?block_override_dns_type: ("CNAME"),
919
920
  ?block_override_ttl: ::Integer,
920
921
  ?name: ::String,
922
+ ?firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN"),
921
923
  ?qtype: ::String
922
924
  ) -> _UpdateFirewallRuleResponseSuccess
923
925
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFirewallRuleResponseSuccess
data/sig/types.rbs CHANGED
@@ -103,6 +103,7 @@ module Aws::Route53Resolver
103
103
  attr_accessor block_override_dns_type: ("CNAME")
104
104
  attr_accessor block_override_ttl: ::Integer
105
105
  attr_accessor name: ::String
106
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
106
107
  attr_accessor qtype: ::String
107
108
  SENSITIVE: []
108
109
  end
@@ -340,6 +341,7 @@ module Aws::Route53Resolver
340
341
  attr_accessor creator_request_id: ::String
341
342
  attr_accessor creation_time: ::String
342
343
  attr_accessor modification_time: ::String
344
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
343
345
  attr_accessor qtype: ::String
344
346
  SENSITIVE: []
345
347
  end
@@ -1100,6 +1102,7 @@ module Aws::Route53Resolver
1100
1102
  attr_accessor block_override_dns_type: ("CNAME")
1101
1103
  attr_accessor block_override_ttl: ::Integer
1102
1104
  attr_accessor name: ::String
1105
+ attr_accessor firewall_domain_redirection_action: ("INSPECT_REDIRECTION_DOMAIN" | "TRUST_REDIRECTION_DOMAIN")
1103
1106
  attr_accessor qtype: ::String
1104
1107
  SENSITIVE: []
1105
1108
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-route53resolver
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.55.0
4
+ version: 1.56.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-25 00:00:00.000000000 Z
11
+ date: 2024-04-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core