@aws-sdk/client-route53resolver 3.692.0 → 3.694.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +15 -0
- package/dist-es/models/models_0.js +9 -0
- package/dist-es/protocols/Aws_json1_1.js +2 -0
- package/dist-types/commands/CreateFirewallRuleCommand.d.ts +6 -1
- package/dist-types/commands/DeleteFirewallRuleCommand.d.ts +9 -1
- package/dist-types/commands/ListFirewallRulesCommand.d.ts +3 -0
- package/dist-types/commands/UpdateFirewallRuleCommand.d.ts +7 -1
- package/dist-types/models/models_0.d.ts +178 -59
- package/dist-types/ts3.4/models/models_0.d.ts +25 -3
- package/package.json +13 -13
package/dist-cjs/index.js
CHANGED
|
@@ -30,6 +30,7 @@ __export(src_exports, {
|
|
|
30
30
|
AutodefinedReverseFlag: () => AutodefinedReverseFlag,
|
|
31
31
|
BlockOverrideDnsType: () => BlockOverrideDnsType,
|
|
32
32
|
BlockResponse: () => BlockResponse,
|
|
33
|
+
ConfidenceThreshold: () => ConfidenceThreshold,
|
|
33
34
|
ConflictException: () => ConflictException,
|
|
34
35
|
CreateFirewallDomainListCommand: () => CreateFirewallDomainListCommand,
|
|
35
36
|
CreateFirewallRuleCommand: () => CreateFirewallRuleCommand,
|
|
@@ -49,6 +50,7 @@ __export(src_exports, {
|
|
|
49
50
|
DisassociateResolverEndpointIpAddressCommand: () => DisassociateResolverEndpointIpAddressCommand,
|
|
50
51
|
DisassociateResolverQueryLogConfigCommand: () => DisassociateResolverQueryLogConfigCommand,
|
|
51
52
|
DisassociateResolverRuleCommand: () => DisassociateResolverRuleCommand,
|
|
53
|
+
DnsThreatProtection: () => DnsThreatProtection,
|
|
52
54
|
FirewallDomainImportOperation: () => FirewallDomainImportOperation,
|
|
53
55
|
FirewallDomainListStatus: () => FirewallDomainListStatus,
|
|
54
56
|
FirewallDomainRedirectionAction: () => FirewallDomainRedirectionAction,
|
|
@@ -596,6 +598,11 @@ var BlockResponse = {
|
|
|
596
598
|
NXDOMAIN: "NXDOMAIN",
|
|
597
599
|
OVERRIDE: "OVERRIDE"
|
|
598
600
|
};
|
|
601
|
+
var ConfidenceThreshold = {
|
|
602
|
+
HIGH: "HIGH",
|
|
603
|
+
LOW: "LOW",
|
|
604
|
+
MEDIUM: "MEDIUM"
|
|
605
|
+
};
|
|
599
606
|
var FirewallDomainListStatus = {
|
|
600
607
|
COMPLETE: "COMPLETE",
|
|
601
608
|
COMPLETE_IMPORT_FAILED: "COMPLETE_IMPORT_FAILED",
|
|
@@ -603,6 +610,10 @@ var FirewallDomainListStatus = {
|
|
|
603
610
|
IMPORTING: "IMPORTING",
|
|
604
611
|
UPDATING: "UPDATING"
|
|
605
612
|
};
|
|
613
|
+
var DnsThreatProtection = {
|
|
614
|
+
DGA: "DGA",
|
|
615
|
+
DNS_TUNNELING: "DNS_TUNNELING"
|
|
616
|
+
};
|
|
606
617
|
var FirewallDomainRedirectionAction = {
|
|
607
618
|
INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN",
|
|
608
619
|
TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN"
|
|
@@ -2350,7 +2361,9 @@ var se_CreateFirewallRuleRequest = /* @__PURE__ */ __name((input, context) => {
|
|
|
2350
2361
|
BlockOverrideDomain: [],
|
|
2351
2362
|
BlockOverrideTtl: [],
|
|
2352
2363
|
BlockResponse: [],
|
|
2364
|
+
ConfidenceThreshold: [],
|
|
2353
2365
|
CreatorRequestId: [true, (_) => _ ?? (0, import_uuid.v4)()],
|
|
2366
|
+
DnsThreatProtection: [],
|
|
2354
2367
|
FirewallDomainListId: [],
|
|
2355
2368
|
FirewallDomainRedirectionAction: [],
|
|
2356
2369
|
FirewallRuleGroupId: [],
|
|
@@ -3605,7 +3618,9 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(Route53Resolv
|
|
|
3605
3618
|
AutodefinedReverseFlag,
|
|
3606
3619
|
BlockOverrideDnsType,
|
|
3607
3620
|
BlockResponse,
|
|
3621
|
+
ConfidenceThreshold,
|
|
3608
3622
|
FirewallDomainListStatus,
|
|
3623
|
+
DnsThreatProtection,
|
|
3609
3624
|
FirewallDomainRedirectionAction,
|
|
3610
3625
|
ShareStatus,
|
|
3611
3626
|
FirewallRuleGroupStatus,
|
|
@@ -216,6 +216,11 @@ export const BlockResponse = {
|
|
|
216
216
|
NXDOMAIN: "NXDOMAIN",
|
|
217
217
|
OVERRIDE: "OVERRIDE",
|
|
218
218
|
};
|
|
219
|
+
export const ConfidenceThreshold = {
|
|
220
|
+
HIGH: "HIGH",
|
|
221
|
+
LOW: "LOW",
|
|
222
|
+
MEDIUM: "MEDIUM",
|
|
223
|
+
};
|
|
219
224
|
export const FirewallDomainListStatus = {
|
|
220
225
|
COMPLETE: "COMPLETE",
|
|
221
226
|
COMPLETE_IMPORT_FAILED: "COMPLETE_IMPORT_FAILED",
|
|
@@ -223,6 +228,10 @@ export const FirewallDomainListStatus = {
|
|
|
223
228
|
IMPORTING: "IMPORTING",
|
|
224
229
|
UPDATING: "UPDATING",
|
|
225
230
|
};
|
|
231
|
+
export const DnsThreatProtection = {
|
|
232
|
+
DGA: "DGA",
|
|
233
|
+
DNS_TUNNELING: "DNS_TUNNELING",
|
|
234
|
+
};
|
|
226
235
|
export const FirewallDomainRedirectionAction = {
|
|
227
236
|
INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN",
|
|
228
237
|
TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN",
|
|
@@ -1548,7 +1548,9 @@ const se_CreateFirewallRuleRequest = (input, context) => {
|
|
|
1548
1548
|
BlockOverrideDomain: [],
|
|
1549
1549
|
BlockOverrideTtl: [],
|
|
1550
1550
|
BlockResponse: [],
|
|
1551
|
+
ConfidenceThreshold: [],
|
|
1551
1552
|
CreatorRequestId: [true, (_) => _ ?? generateIdempotencyToken()],
|
|
1553
|
+
DnsThreatProtection: [],
|
|
1552
1554
|
FirewallDomainListId: [],
|
|
1553
1555
|
FirewallDomainRedirectionAction: [],
|
|
1554
1556
|
FirewallRuleGroupId: [],
|
|
@@ -37,7 +37,7 @@ declare const CreateFirewallRuleCommand_base: {
|
|
|
37
37
|
* const input = { // CreateFirewallRuleRequest
|
|
38
38
|
* CreatorRequestId: "STRING_VALUE", // required
|
|
39
39
|
* FirewallRuleGroupId: "STRING_VALUE", // required
|
|
40
|
-
* FirewallDomainListId: "STRING_VALUE",
|
|
40
|
+
* FirewallDomainListId: "STRING_VALUE",
|
|
41
41
|
* Priority: Number("int"), // required
|
|
42
42
|
* Action: "ALLOW" || "BLOCK" || "ALERT", // required
|
|
43
43
|
* BlockResponse: "NODATA" || "NXDOMAIN" || "OVERRIDE",
|
|
@@ -47,6 +47,8 @@ declare const CreateFirewallRuleCommand_base: {
|
|
|
47
47
|
* Name: "STRING_VALUE", // required
|
|
48
48
|
* FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
49
49
|
* Qtype: "STRING_VALUE",
|
|
50
|
+
* DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
51
|
+
* ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
50
52
|
* };
|
|
51
53
|
* const command = new CreateFirewallRuleCommand(input);
|
|
52
54
|
* const response = await client.send(command);
|
|
@@ -54,6 +56,7 @@ declare const CreateFirewallRuleCommand_base: {
|
|
|
54
56
|
* // FirewallRule: { // FirewallRule
|
|
55
57
|
* // FirewallRuleGroupId: "STRING_VALUE",
|
|
56
58
|
* // FirewallDomainListId: "STRING_VALUE",
|
|
59
|
+
* // FirewallThreatProtectionId: "STRING_VALUE",
|
|
57
60
|
* // Name: "STRING_VALUE",
|
|
58
61
|
* // Priority: Number("int"),
|
|
59
62
|
* // Action: "ALLOW" || "BLOCK" || "ALERT",
|
|
@@ -66,6 +69,8 @@ declare const CreateFirewallRuleCommand_base: {
|
|
|
66
69
|
* // ModificationTime: "STRING_VALUE",
|
|
67
70
|
* // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
68
71
|
* // Qtype: "STRING_VALUE",
|
|
72
|
+
* // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
73
|
+
* // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
69
74
|
* // },
|
|
70
75
|
* // };
|
|
71
76
|
*
|
|
@@ -36,7 +36,8 @@ declare const DeleteFirewallRuleCommand_base: {
|
|
|
36
36
|
* const client = new Route53ResolverClient(config);
|
|
37
37
|
* const input = { // DeleteFirewallRuleRequest
|
|
38
38
|
* FirewallRuleGroupId: "STRING_VALUE", // required
|
|
39
|
-
* FirewallDomainListId: "STRING_VALUE",
|
|
39
|
+
* FirewallDomainListId: "STRING_VALUE",
|
|
40
|
+
* FirewallThreatProtectionId: "STRING_VALUE",
|
|
40
41
|
* Qtype: "STRING_VALUE",
|
|
41
42
|
* };
|
|
42
43
|
* const command = new DeleteFirewallRuleCommand(input);
|
|
@@ -45,6 +46,7 @@ declare const DeleteFirewallRuleCommand_base: {
|
|
|
45
46
|
* // FirewallRule: { // FirewallRule
|
|
46
47
|
* // FirewallRuleGroupId: "STRING_VALUE",
|
|
47
48
|
* // FirewallDomainListId: "STRING_VALUE",
|
|
49
|
+
* // FirewallThreatProtectionId: "STRING_VALUE",
|
|
48
50
|
* // Name: "STRING_VALUE",
|
|
49
51
|
* // Priority: Number("int"),
|
|
50
52
|
* // Action: "ALLOW" || "BLOCK" || "ALERT",
|
|
@@ -57,6 +59,8 @@ declare const DeleteFirewallRuleCommand_base: {
|
|
|
57
59
|
* // ModificationTime: "STRING_VALUE",
|
|
58
60
|
* // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
59
61
|
* // Qtype: "STRING_VALUE",
|
|
62
|
+
* // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
63
|
+
* // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
60
64
|
* // },
|
|
61
65
|
* // };
|
|
62
66
|
*
|
|
@@ -82,6 +86,10 @@ declare const DeleteFirewallRuleCommand_base: {
|
|
|
82
86
|
* @throws {@link ThrottlingException} (client fault)
|
|
83
87
|
* <p>The request was throttled. Try again in a few minutes.</p>
|
|
84
88
|
*
|
|
89
|
+
* @throws {@link ValidationException} (client fault)
|
|
90
|
+
* <p>You have provided an invalid command. If you ran the <code>UpdateFirewallDomains</code> request. supported values are <code>ADD</code>,
|
|
91
|
+
* <code>REMOVE</code>, or <code>REPLACE</code> a domain.</p>
|
|
92
|
+
*
|
|
85
93
|
* @throws {@link Route53ResolverServiceException}
|
|
86
94
|
* <p>Base exception class for all service exceptions from Route53Resolver service.</p>
|
|
87
95
|
*
|
|
@@ -50,6 +50,7 @@ declare const ListFirewallRulesCommand_base: {
|
|
|
50
50
|
* // { // FirewallRule
|
|
51
51
|
* // FirewallRuleGroupId: "STRING_VALUE",
|
|
52
52
|
* // FirewallDomainListId: "STRING_VALUE",
|
|
53
|
+
* // FirewallThreatProtectionId: "STRING_VALUE",
|
|
53
54
|
* // Name: "STRING_VALUE",
|
|
54
55
|
* // Priority: Number("int"),
|
|
55
56
|
* // Action: "ALLOW" || "BLOCK" || "ALERT",
|
|
@@ -62,6 +63,8 @@ declare const ListFirewallRulesCommand_base: {
|
|
|
62
63
|
* // ModificationTime: "STRING_VALUE",
|
|
63
64
|
* // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
64
65
|
* // Qtype: "STRING_VALUE",
|
|
66
|
+
* // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
67
|
+
* // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
65
68
|
* // },
|
|
66
69
|
* // ],
|
|
67
70
|
* // };
|
|
@@ -36,7 +36,8 @@ declare const UpdateFirewallRuleCommand_base: {
|
|
|
36
36
|
* const client = new Route53ResolverClient(config);
|
|
37
37
|
* const input = { // UpdateFirewallRuleRequest
|
|
38
38
|
* FirewallRuleGroupId: "STRING_VALUE", // required
|
|
39
|
-
* FirewallDomainListId: "STRING_VALUE",
|
|
39
|
+
* FirewallDomainListId: "STRING_VALUE",
|
|
40
|
+
* FirewallThreatProtectionId: "STRING_VALUE",
|
|
40
41
|
* Priority: Number("int"),
|
|
41
42
|
* Action: "ALLOW" || "BLOCK" || "ALERT",
|
|
42
43
|
* BlockResponse: "NODATA" || "NXDOMAIN" || "OVERRIDE",
|
|
@@ -46,6 +47,8 @@ declare const UpdateFirewallRuleCommand_base: {
|
|
|
46
47
|
* Name: "STRING_VALUE",
|
|
47
48
|
* FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
48
49
|
* Qtype: "STRING_VALUE",
|
|
50
|
+
* DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
51
|
+
* ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
49
52
|
* };
|
|
50
53
|
* const command = new UpdateFirewallRuleCommand(input);
|
|
51
54
|
* const response = await client.send(command);
|
|
@@ -53,6 +56,7 @@ declare const UpdateFirewallRuleCommand_base: {
|
|
|
53
56
|
* // FirewallRule: { // FirewallRule
|
|
54
57
|
* // FirewallRuleGroupId: "STRING_VALUE",
|
|
55
58
|
* // FirewallDomainListId: "STRING_VALUE",
|
|
59
|
+
* // FirewallThreatProtectionId: "STRING_VALUE",
|
|
56
60
|
* // Name: "STRING_VALUE",
|
|
57
61
|
* // Priority: Number("int"),
|
|
58
62
|
* // Action: "ALLOW" || "BLOCK" || "ALERT",
|
|
@@ -65,6 +69,8 @@ declare const UpdateFirewallRuleCommand_base: {
|
|
|
65
69
|
* // ModificationTime: "STRING_VALUE",
|
|
66
70
|
* // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
|
|
67
71
|
* // Qtype: "STRING_VALUE",
|
|
72
|
+
* // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
|
|
73
|
+
* // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
|
|
68
74
|
* // },
|
|
69
75
|
* // };
|
|
70
76
|
*
|
|
@@ -737,7 +737,7 @@ export interface ResolverQueryLogConfigAssociation {
|
|
|
737
737
|
* </li>
|
|
738
738
|
* <li>
|
|
739
739
|
* <p>
|
|
740
|
-
* <code>
|
|
740
|
+
* <code>ACTIVE</code>: The association between an Amazon VPC and a query logging configuration
|
|
741
741
|
* was successfully created. Resolver is logging queries that originate in the specified VPC.</p>
|
|
742
742
|
* </li>
|
|
743
743
|
* <li>
|
|
@@ -934,6 +934,19 @@ export declare const BlockResponse: {
|
|
|
934
934
|
* @public
|
|
935
935
|
*/
|
|
936
936
|
export type BlockResponse = (typeof BlockResponse)[keyof typeof BlockResponse];
|
|
937
|
+
/**
|
|
938
|
+
* @public
|
|
939
|
+
* @enum
|
|
940
|
+
*/
|
|
941
|
+
export declare const ConfidenceThreshold: {
|
|
942
|
+
readonly HIGH: "HIGH";
|
|
943
|
+
readonly LOW: "LOW";
|
|
944
|
+
readonly MEDIUM: "MEDIUM";
|
|
945
|
+
};
|
|
946
|
+
/**
|
|
947
|
+
* @public
|
|
948
|
+
*/
|
|
949
|
+
export type ConfidenceThreshold = (typeof ConfidenceThreshold)[keyof typeof ConfidenceThreshold];
|
|
937
950
|
/**
|
|
938
951
|
* @public
|
|
939
952
|
*/
|
|
@@ -1040,6 +1053,18 @@ export interface CreateFirewallDomainListResponse {
|
|
|
1040
1053
|
*/
|
|
1041
1054
|
FirewallDomainList?: FirewallDomainList | undefined;
|
|
1042
1055
|
}
|
|
1056
|
+
/**
|
|
1057
|
+
* @public
|
|
1058
|
+
* @enum
|
|
1059
|
+
*/
|
|
1060
|
+
export declare const DnsThreatProtection: {
|
|
1061
|
+
readonly DGA: "DGA";
|
|
1062
|
+
readonly DNS_TUNNELING: "DNS_TUNNELING";
|
|
1063
|
+
};
|
|
1064
|
+
/**
|
|
1065
|
+
* @public
|
|
1066
|
+
*/
|
|
1067
|
+
export type DnsThreatProtection = (typeof DnsThreatProtection)[keyof typeof DnsThreatProtection];
|
|
1043
1068
|
/**
|
|
1044
1069
|
* @public
|
|
1045
1070
|
* @enum
|
|
@@ -1069,10 +1094,10 @@ export interface CreateFirewallRuleRequest {
|
|
|
1069
1094
|
*/
|
|
1070
1095
|
FirewallRuleGroupId: string | undefined;
|
|
1071
1096
|
/**
|
|
1072
|
-
* <p>The ID of the domain list that you want to use in the rule. </p>
|
|
1097
|
+
* <p>The ID of the domain list that you want to use in the rule. Can't be used together with <code>DnsThreatProtecton</code>.</p>
|
|
1073
1098
|
* @public
|
|
1074
1099
|
*/
|
|
1075
|
-
FirewallDomainListId
|
|
1100
|
+
FirewallDomainListId?: string | undefined;
|
|
1076
1101
|
/**
|
|
1077
1102
|
* <p>The setting that determines the processing order of the rule in the rule group. DNS Firewall
|
|
1078
1103
|
* processes the rules in a rule group by order of priority, starting from the lowest setting.</p>
|
|
@@ -1083,11 +1108,11 @@ export interface CreateFirewallRuleRequest {
|
|
|
1083
1108
|
*/
|
|
1084
1109
|
Priority: number | undefined;
|
|
1085
1110
|
/**
|
|
1086
|
-
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
|
|
1111
|
+
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
|
|
1087
1112
|
* <ul>
|
|
1088
1113
|
* <li>
|
|
1089
1114
|
* <p>
|
|
1090
|
-
* <code>ALLOW</code> - Permit the request to go through.</p>
|
|
1115
|
+
* <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
|
|
1091
1116
|
* </li>
|
|
1092
1117
|
* <li>
|
|
1093
1118
|
* <p>
|
|
@@ -1150,10 +1175,10 @@ export interface CreateFirewallRuleRequest {
|
|
|
1150
1175
|
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
|
|
1151
1176
|
* </p>
|
|
1152
1177
|
* <p>
|
|
1153
|
-
* <code>
|
|
1178
|
+
* <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
|
|
1154
1179
|
* added to the domain list.</p>
|
|
1155
1180
|
* <p>
|
|
1156
|
-
* <code>
|
|
1181
|
+
* <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
|
|
1157
1182
|
* the domain list.</p>
|
|
1158
1183
|
* @public
|
|
1159
1184
|
*/
|
|
@@ -1214,6 +1239,35 @@ export interface CreateFirewallRuleRequest {
|
|
|
1214
1239
|
* @public
|
|
1215
1240
|
*/
|
|
1216
1241
|
Qtype?: string | undefined;
|
|
1242
|
+
/**
|
|
1243
|
+
* <p>
|
|
1244
|
+
* Use to create a DNS Firewall Advanced rule.
|
|
1245
|
+
* </p>
|
|
1246
|
+
* @public
|
|
1247
|
+
*/
|
|
1248
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
1249
|
+
/**
|
|
1250
|
+
* <p>
|
|
1251
|
+
* The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
|
|
1252
|
+
* level values mean:
|
|
1253
|
+
* </p>
|
|
1254
|
+
* <ul>
|
|
1255
|
+
* <li>
|
|
1256
|
+
* <p>
|
|
1257
|
+
* <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
|
|
1258
|
+
* </li>
|
|
1259
|
+
* <li>
|
|
1260
|
+
* <p>
|
|
1261
|
+
* <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
|
|
1262
|
+
* </li>
|
|
1263
|
+
* <li>
|
|
1264
|
+
* <p>
|
|
1265
|
+
* <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
|
|
1266
|
+
* </li>
|
|
1267
|
+
* </ul>
|
|
1268
|
+
* @public
|
|
1269
|
+
*/
|
|
1270
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
1217
1271
|
}
|
|
1218
1272
|
/**
|
|
1219
1273
|
* <p>A single firewall rule in a rule group.</p>
|
|
@@ -1221,7 +1275,7 @@ export interface CreateFirewallRuleRequest {
|
|
|
1221
1275
|
*/
|
|
1222
1276
|
export interface FirewallRule {
|
|
1223
1277
|
/**
|
|
1224
|
-
* <p>The unique identifier of the
|
|
1278
|
+
* <p>The unique identifier of the Firewall rule group of the rule. </p>
|
|
1225
1279
|
* @public
|
|
1226
1280
|
*/
|
|
1227
1281
|
FirewallRuleGroupId?: string | undefined;
|
|
@@ -1230,6 +1284,13 @@ export interface FirewallRule {
|
|
|
1230
1284
|
* @public
|
|
1231
1285
|
*/
|
|
1232
1286
|
FirewallDomainListId?: string | undefined;
|
|
1287
|
+
/**
|
|
1288
|
+
* <p>
|
|
1289
|
+
* ID of the DNS Firewall Advanced rule.
|
|
1290
|
+
* </p>
|
|
1291
|
+
* @public
|
|
1292
|
+
*/
|
|
1293
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
1233
1294
|
/**
|
|
1234
1295
|
* <p>The name of the rule. </p>
|
|
1235
1296
|
* @public
|
|
@@ -1241,11 +1302,11 @@ export interface FirewallRule {
|
|
|
1241
1302
|
*/
|
|
1242
1303
|
Priority?: number | undefined;
|
|
1243
1304
|
/**
|
|
1244
|
-
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
|
|
1305
|
+
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
|
|
1245
1306
|
* <ul>
|
|
1246
1307
|
* <li>
|
|
1247
1308
|
* <p>
|
|
1248
|
-
* <code>ALLOW</code> - Permit the request to go through.</p>
|
|
1309
|
+
* <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
|
|
1249
1310
|
* </li>
|
|
1250
1311
|
* <li>
|
|
1251
1312
|
* <p>
|
|
@@ -1314,10 +1375,10 @@ export interface FirewallRule {
|
|
|
1314
1375
|
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
|
|
1315
1376
|
* </p>
|
|
1316
1377
|
* <p>
|
|
1317
|
-
* <code>
|
|
1378
|
+
* <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
|
|
1318
1379
|
* added to the domain list.</p>
|
|
1319
1380
|
* <p>
|
|
1320
|
-
* <code>
|
|
1381
|
+
* <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
|
|
1321
1382
|
* the domain list.</p>
|
|
1322
1383
|
* @public
|
|
1323
1384
|
*/
|
|
@@ -1378,6 +1439,47 @@ export interface FirewallRule {
|
|
|
1378
1439
|
* @public
|
|
1379
1440
|
*/
|
|
1380
1441
|
Qtype?: string | undefined;
|
|
1442
|
+
/**
|
|
1443
|
+
* <p>
|
|
1444
|
+
* The type of the DNS Firewall Advanced rule. Valid values are:
|
|
1445
|
+
* </p>
|
|
1446
|
+
* <ul>
|
|
1447
|
+
* <li>
|
|
1448
|
+
* <p>
|
|
1449
|
+
* <code>DGA</code>: Domain generation algorithms detection. DGAs are used by attackers to generate a large number of domains
|
|
1450
|
+
* to to launch malware attacks.</p>
|
|
1451
|
+
* </li>
|
|
1452
|
+
* <li>
|
|
1453
|
+
* <p>
|
|
1454
|
+
* <code>DNS_TUNNELING</code>: DNS tunneling detection. DNS tunneling is used by attackers to exfiltrate data from the client by using the DNS tunnel without
|
|
1455
|
+
* making a network connection to the client.</p>
|
|
1456
|
+
* </li>
|
|
1457
|
+
* </ul>
|
|
1458
|
+
* @public
|
|
1459
|
+
*/
|
|
1460
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
1461
|
+
/**
|
|
1462
|
+
* <p>
|
|
1463
|
+
* The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
|
|
1464
|
+
* level values mean:
|
|
1465
|
+
* </p>
|
|
1466
|
+
* <ul>
|
|
1467
|
+
* <li>
|
|
1468
|
+
* <p>
|
|
1469
|
+
* <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
|
|
1470
|
+
* </li>
|
|
1471
|
+
* <li>
|
|
1472
|
+
* <p>
|
|
1473
|
+
* <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
|
|
1474
|
+
* </li>
|
|
1475
|
+
* <li>
|
|
1476
|
+
* <p>
|
|
1477
|
+
* <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
|
|
1478
|
+
* </li>
|
|
1479
|
+
* </ul>
|
|
1480
|
+
* @public
|
|
1481
|
+
*/
|
|
1482
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
1381
1483
|
}
|
|
1382
1484
|
/**
|
|
1383
1485
|
* @public
|
|
@@ -2032,45 +2134,7 @@ export interface TargetAddress {
|
|
|
2032
2134
|
Ipv6?: string | undefined;
|
|
2033
2135
|
/**
|
|
2034
2136
|
* <p>
|
|
2035
|
-
* The protocols for the
|
|
2036
|
-
*
|
|
2037
|
-
* </p>
|
|
2038
|
-
* <p>For an inbound endpoint you can apply the protocols as follows:</p>
|
|
2039
|
-
* <ul>
|
|
2040
|
-
* <li>
|
|
2041
|
-
* <p> Do53 and DoH in combination.</p>
|
|
2042
|
-
* </li>
|
|
2043
|
-
* <li>
|
|
2044
|
-
* <p>Do53 and DoH-FIPS in combination.</p>
|
|
2045
|
-
* </li>
|
|
2046
|
-
* <li>
|
|
2047
|
-
* <p>Do53 alone.</p>
|
|
2048
|
-
* </li>
|
|
2049
|
-
* <li>
|
|
2050
|
-
* <p>DoH alone.</p>
|
|
2051
|
-
* </li>
|
|
2052
|
-
* <li>
|
|
2053
|
-
* <p>DoH-FIPS alone.</p>
|
|
2054
|
-
* </li>
|
|
2055
|
-
* <li>
|
|
2056
|
-
* <p>None, which is treated as Do53.</p>
|
|
2057
|
-
* </li>
|
|
2058
|
-
* </ul>
|
|
2059
|
-
* <p>For an outbound endpoint you can apply the protocols as follows:</p>
|
|
2060
|
-
* <ul>
|
|
2061
|
-
* <li>
|
|
2062
|
-
* <p> Do53 and DoH in combination.</p>
|
|
2063
|
-
* </li>
|
|
2064
|
-
* <li>
|
|
2065
|
-
* <p>Do53 alone.</p>
|
|
2066
|
-
* </li>
|
|
2067
|
-
* <li>
|
|
2068
|
-
* <p>DoH alone.</p>
|
|
2069
|
-
* </li>
|
|
2070
|
-
* <li>
|
|
2071
|
-
* <p>None, which is treated as Do53.</p>
|
|
2072
|
-
* </li>
|
|
2073
|
-
* </ul>
|
|
2137
|
+
* The protocols for the target address. The protocol you choose needs to be supported by the outbound endpoint of the Resolver rule.</p>
|
|
2074
2138
|
* @public
|
|
2075
2139
|
*/
|
|
2076
2140
|
Protocol?: Protocol | undefined;
|
|
@@ -2288,7 +2352,14 @@ export interface DeleteFirewallRuleRequest {
|
|
|
2288
2352
|
* <p>The ID of the domain list that's used in the rule. </p>
|
|
2289
2353
|
* @public
|
|
2290
2354
|
*/
|
|
2291
|
-
FirewallDomainListId
|
|
2355
|
+
FirewallDomainListId?: string | undefined;
|
|
2356
|
+
/**
|
|
2357
|
+
* <p>
|
|
2358
|
+
* The ID that is created for a DNS Firewall Advanced rule.
|
|
2359
|
+
* </p>
|
|
2360
|
+
* @public
|
|
2361
|
+
*/
|
|
2362
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
2292
2363
|
/**
|
|
2293
2364
|
* <p>
|
|
2294
2365
|
* The DNS query type that the rule you are deleting evaluates. Allowed values are;
|
|
@@ -3828,11 +3899,11 @@ export interface ListFirewallRulesRequest {
|
|
|
3828
3899
|
Priority?: number | undefined;
|
|
3829
3900
|
/**
|
|
3830
3901
|
* <p>Optional additional filter for the rules to retrieve.</p>
|
|
3831
|
-
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
|
|
3902
|
+
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
|
|
3832
3903
|
* <ul>
|
|
3833
3904
|
* <li>
|
|
3834
3905
|
* <p>
|
|
3835
|
-
* <code>ALLOW</code> - Permit the request to go through.</p>
|
|
3906
|
+
* <code>ALLOW</code> - Permit the request to go through. Not availabe for DNS Firewall Advanced rules.</p>
|
|
3836
3907
|
* </li>
|
|
3837
3908
|
* <li>
|
|
3838
3909
|
* <p>
|
|
@@ -4938,7 +5009,14 @@ export interface UpdateFirewallRuleRequest {
|
|
|
4938
5009
|
* <p>The ID of the domain list to use in the rule. </p>
|
|
4939
5010
|
* @public
|
|
4940
5011
|
*/
|
|
4941
|
-
FirewallDomainListId
|
|
5012
|
+
FirewallDomainListId?: string | undefined;
|
|
5013
|
+
/**
|
|
5014
|
+
* <p>
|
|
5015
|
+
* The DNS Firewall Advanced rule ID.
|
|
5016
|
+
* </p>
|
|
5017
|
+
* @public
|
|
5018
|
+
*/
|
|
5019
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
4942
5020
|
/**
|
|
4943
5021
|
* <p>The setting that determines the processing order of the rule in the rule group. DNS Firewall
|
|
4944
5022
|
* processes the rules in a rule group by order of priority, starting from the lowest setting.</p>
|
|
@@ -4949,11 +5027,11 @@ export interface UpdateFirewallRuleRequest {
|
|
|
4949
5027
|
*/
|
|
4950
5028
|
Priority?: number | undefined;
|
|
4951
5029
|
/**
|
|
4952
|
-
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
|
|
5030
|
+
* <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
|
|
4953
5031
|
* <ul>
|
|
4954
5032
|
* <li>
|
|
4955
5033
|
* <p>
|
|
4956
|
-
* <code>ALLOW</code> - Permit the request to go through.</p>
|
|
5034
|
+
* <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
|
|
4957
5035
|
* </li>
|
|
4958
5036
|
* <li>
|
|
4959
5037
|
* <p>
|
|
@@ -5011,10 +5089,10 @@ export interface UpdateFirewallRuleRequest {
|
|
|
5011
5089
|
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
|
|
5012
5090
|
* </p>
|
|
5013
5091
|
* <p>
|
|
5014
|
-
* <code>
|
|
5092
|
+
* <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
|
|
5015
5093
|
* added to the domain list.</p>
|
|
5016
5094
|
* <p>
|
|
5017
|
-
* <code>
|
|
5095
|
+
* <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
|
|
5018
5096
|
* the domain list.</p>
|
|
5019
5097
|
* @public
|
|
5020
5098
|
*/
|
|
@@ -5079,6 +5157,47 @@ export interface UpdateFirewallRuleRequest {
|
|
|
5079
5157
|
* @public
|
|
5080
5158
|
*/
|
|
5081
5159
|
Qtype?: string | undefined;
|
|
5160
|
+
/**
|
|
5161
|
+
* <p>
|
|
5162
|
+
* The type of the DNS Firewall Advanced rule. Valid values are:
|
|
5163
|
+
* </p>
|
|
5164
|
+
* <ul>
|
|
5165
|
+
* <li>
|
|
5166
|
+
* <p>
|
|
5167
|
+
* <code>DGA</code>: Domain generation algorithms detection. DGAs are used by attackers to generate a large number of domains
|
|
5168
|
+
* to to launch malware attacks.</p>
|
|
5169
|
+
* </li>
|
|
5170
|
+
* <li>
|
|
5171
|
+
* <p>
|
|
5172
|
+
* <code>DNS_TUNNELING</code>: DNS tunneling detection. DNS tunneling is used by attackers to exfiltrate data from the client by using the DNS tunnel without
|
|
5173
|
+
* making a network connection to the client.</p>
|
|
5174
|
+
* </li>
|
|
5175
|
+
* </ul>
|
|
5176
|
+
* @public
|
|
5177
|
+
*/
|
|
5178
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
5179
|
+
/**
|
|
5180
|
+
* <p>
|
|
5181
|
+
* The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
|
|
5182
|
+
* level values mean:
|
|
5183
|
+
* </p>
|
|
5184
|
+
* <ul>
|
|
5185
|
+
* <li>
|
|
5186
|
+
* <p>
|
|
5187
|
+
* <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
|
|
5188
|
+
* </li>
|
|
5189
|
+
* <li>
|
|
5190
|
+
* <p>
|
|
5191
|
+
* <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
|
|
5192
|
+
* </li>
|
|
5193
|
+
* <li>
|
|
5194
|
+
* <p>
|
|
5195
|
+
* <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
|
|
5196
|
+
* </li>
|
|
5197
|
+
* </ul>
|
|
5198
|
+
* @public
|
|
5199
|
+
*/
|
|
5200
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
5082
5201
|
}
|
|
5083
5202
|
/**
|
|
5084
5203
|
* @public
|
|
@@ -279,6 +279,13 @@ export declare const BlockResponse: {
|
|
|
279
279
|
readonly OVERRIDE: "OVERRIDE";
|
|
280
280
|
};
|
|
281
281
|
export type BlockResponse = (typeof BlockResponse)[keyof typeof BlockResponse];
|
|
282
|
+
export declare const ConfidenceThreshold: {
|
|
283
|
+
readonly HIGH: "HIGH";
|
|
284
|
+
readonly LOW: "LOW";
|
|
285
|
+
readonly MEDIUM: "MEDIUM";
|
|
286
|
+
};
|
|
287
|
+
export type ConfidenceThreshold =
|
|
288
|
+
(typeof ConfidenceThreshold)[keyof typeof ConfidenceThreshold];
|
|
282
289
|
export interface CreateFirewallDomainListRequest {
|
|
283
290
|
CreatorRequestId?: string | undefined;
|
|
284
291
|
Name: string | undefined;
|
|
@@ -308,6 +315,12 @@ export interface FirewallDomainList {
|
|
|
308
315
|
export interface CreateFirewallDomainListResponse {
|
|
309
316
|
FirewallDomainList?: FirewallDomainList | undefined;
|
|
310
317
|
}
|
|
318
|
+
export declare const DnsThreatProtection: {
|
|
319
|
+
readonly DGA: "DGA";
|
|
320
|
+
readonly DNS_TUNNELING: "DNS_TUNNELING";
|
|
321
|
+
};
|
|
322
|
+
export type DnsThreatProtection =
|
|
323
|
+
(typeof DnsThreatProtection)[keyof typeof DnsThreatProtection];
|
|
311
324
|
export declare const FirewallDomainRedirectionAction: {
|
|
312
325
|
readonly INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN";
|
|
313
326
|
readonly TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN";
|
|
@@ -317,7 +330,7 @@ export type FirewallDomainRedirectionAction =
|
|
|
317
330
|
export interface CreateFirewallRuleRequest {
|
|
318
331
|
CreatorRequestId?: string | undefined;
|
|
319
332
|
FirewallRuleGroupId: string | undefined;
|
|
320
|
-
FirewallDomainListId
|
|
333
|
+
FirewallDomainListId?: string | undefined;
|
|
321
334
|
Priority: number | undefined;
|
|
322
335
|
Action: Action | undefined;
|
|
323
336
|
BlockResponse?: BlockResponse | undefined;
|
|
@@ -327,10 +340,13 @@ export interface CreateFirewallRuleRequest {
|
|
|
327
340
|
Name: string | undefined;
|
|
328
341
|
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
|
|
329
342
|
Qtype?: string | undefined;
|
|
343
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
344
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
330
345
|
}
|
|
331
346
|
export interface FirewallRule {
|
|
332
347
|
FirewallRuleGroupId?: string | undefined;
|
|
333
348
|
FirewallDomainListId?: string | undefined;
|
|
349
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
334
350
|
Name?: string | undefined;
|
|
335
351
|
Priority?: number | undefined;
|
|
336
352
|
Action?: Action | undefined;
|
|
@@ -343,6 +359,8 @@ export interface FirewallRule {
|
|
|
343
359
|
ModificationTime?: string | undefined;
|
|
344
360
|
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
|
|
345
361
|
Qtype?: string | undefined;
|
|
362
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
363
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
346
364
|
}
|
|
347
365
|
export interface CreateFirewallRuleResponse {
|
|
348
366
|
FirewallRule?: FirewallRule | undefined;
|
|
@@ -531,7 +549,8 @@ export interface DeleteFirewallDomainListResponse {
|
|
|
531
549
|
}
|
|
532
550
|
export interface DeleteFirewallRuleRequest {
|
|
533
551
|
FirewallRuleGroupId: string | undefined;
|
|
534
|
-
FirewallDomainListId
|
|
552
|
+
FirewallDomainListId?: string | undefined;
|
|
553
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
535
554
|
Qtype?: string | undefined;
|
|
536
555
|
}
|
|
537
556
|
export interface DeleteFirewallRuleResponse {
|
|
@@ -1062,7 +1081,8 @@ export interface UpdateFirewallDomainsResponse {
|
|
|
1062
1081
|
}
|
|
1063
1082
|
export interface UpdateFirewallRuleRequest {
|
|
1064
1083
|
FirewallRuleGroupId: string | undefined;
|
|
1065
|
-
FirewallDomainListId
|
|
1084
|
+
FirewallDomainListId?: string | undefined;
|
|
1085
|
+
FirewallThreatProtectionId?: string | undefined;
|
|
1066
1086
|
Priority?: number | undefined;
|
|
1067
1087
|
Action?: Action | undefined;
|
|
1068
1088
|
BlockResponse?: BlockResponse | undefined;
|
|
@@ -1072,6 +1092,8 @@ export interface UpdateFirewallRuleRequest {
|
|
|
1072
1092
|
Name?: string | undefined;
|
|
1073
1093
|
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
|
|
1074
1094
|
Qtype?: string | undefined;
|
|
1095
|
+
DnsThreatProtection?: DnsThreatProtection | undefined;
|
|
1096
|
+
ConfidenceThreshold?: ConfidenceThreshold | undefined;
|
|
1075
1097
|
}
|
|
1076
1098
|
export interface UpdateFirewallRuleResponse {
|
|
1077
1099
|
FirewallRule?: FirewallRule | undefined;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-route53resolver",
|
|
3
3
|
"description": "AWS SDK for JavaScript Route53resolver Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.694.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-route53resolver",
|
|
@@ -20,19 +20,19 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/client-sso-oidc": "3.
|
|
24
|
-
"@aws-sdk/client-sts": "3.
|
|
25
|
-
"@aws-sdk/core": "3.
|
|
26
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
27
|
-
"@aws-sdk/middleware-host-header": "3.
|
|
28
|
-
"@aws-sdk/middleware-logger": "3.
|
|
29
|
-
"@aws-sdk/middleware-recursion-detection": "3.
|
|
30
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
31
|
-
"@aws-sdk/region-config-resolver": "3.
|
|
23
|
+
"@aws-sdk/client-sso-oidc": "3.693.0",
|
|
24
|
+
"@aws-sdk/client-sts": "3.693.0",
|
|
25
|
+
"@aws-sdk/core": "3.693.0",
|
|
26
|
+
"@aws-sdk/credential-provider-node": "3.693.0",
|
|
27
|
+
"@aws-sdk/middleware-host-header": "3.693.0",
|
|
28
|
+
"@aws-sdk/middleware-logger": "3.693.0",
|
|
29
|
+
"@aws-sdk/middleware-recursion-detection": "3.693.0",
|
|
30
|
+
"@aws-sdk/middleware-user-agent": "3.693.0",
|
|
31
|
+
"@aws-sdk/region-config-resolver": "3.693.0",
|
|
32
32
|
"@aws-sdk/types": "3.692.0",
|
|
33
|
-
"@aws-sdk/util-endpoints": "3.
|
|
34
|
-
"@aws-sdk/util-user-agent-browser": "3.
|
|
35
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
33
|
+
"@aws-sdk/util-endpoints": "3.693.0",
|
|
34
|
+
"@aws-sdk/util-user-agent-browser": "3.693.0",
|
|
35
|
+
"@aws-sdk/util-user-agent-node": "3.693.0",
|
|
36
36
|
"@smithy/config-resolver": "^3.0.11",
|
|
37
37
|
"@smithy/core": "^2.5.2",
|
|
38
38
|
"@smithy/fetch-http-handler": "^4.1.0",
|