@aws-sdk/client-route53resolver 3.693.0 → 3.696.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js CHANGED
@@ -30,6 +30,7 @@ __export(src_exports, {
30
30
  AutodefinedReverseFlag: () => AutodefinedReverseFlag,
31
31
  BlockOverrideDnsType: () => BlockOverrideDnsType,
32
32
  BlockResponse: () => BlockResponse,
33
+ ConfidenceThreshold: () => ConfidenceThreshold,
33
34
  ConflictException: () => ConflictException,
34
35
  CreateFirewallDomainListCommand: () => CreateFirewallDomainListCommand,
35
36
  CreateFirewallRuleCommand: () => CreateFirewallRuleCommand,
@@ -49,6 +50,7 @@ __export(src_exports, {
49
50
  DisassociateResolverEndpointIpAddressCommand: () => DisassociateResolverEndpointIpAddressCommand,
50
51
  DisassociateResolverQueryLogConfigCommand: () => DisassociateResolverQueryLogConfigCommand,
51
52
  DisassociateResolverRuleCommand: () => DisassociateResolverRuleCommand,
53
+ DnsThreatProtection: () => DnsThreatProtection,
52
54
  FirewallDomainImportOperation: () => FirewallDomainImportOperation,
53
55
  FirewallDomainListStatus: () => FirewallDomainListStatus,
54
56
  FirewallDomainRedirectionAction: () => FirewallDomainRedirectionAction,
@@ -596,6 +598,11 @@ var BlockResponse = {
596
598
  NXDOMAIN: "NXDOMAIN",
597
599
  OVERRIDE: "OVERRIDE"
598
600
  };
601
+ var ConfidenceThreshold = {
602
+ HIGH: "HIGH",
603
+ LOW: "LOW",
604
+ MEDIUM: "MEDIUM"
605
+ };
599
606
  var FirewallDomainListStatus = {
600
607
  COMPLETE: "COMPLETE",
601
608
  COMPLETE_IMPORT_FAILED: "COMPLETE_IMPORT_FAILED",
@@ -603,6 +610,10 @@ var FirewallDomainListStatus = {
603
610
  IMPORTING: "IMPORTING",
604
611
  UPDATING: "UPDATING"
605
612
  };
613
+ var DnsThreatProtection = {
614
+ DGA: "DGA",
615
+ DNS_TUNNELING: "DNS_TUNNELING"
616
+ };
606
617
  var FirewallDomainRedirectionAction = {
607
618
  INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN",
608
619
  TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN"
@@ -2350,7 +2361,9 @@ var se_CreateFirewallRuleRequest = /* @__PURE__ */ __name((input, context) => {
2350
2361
  BlockOverrideDomain: [],
2351
2362
  BlockOverrideTtl: [],
2352
2363
  BlockResponse: [],
2364
+ ConfidenceThreshold: [],
2353
2365
  CreatorRequestId: [true, (_) => _ ?? (0, import_uuid.v4)()],
2366
+ DnsThreatProtection: [],
2354
2367
  FirewallDomainListId: [],
2355
2368
  FirewallDomainRedirectionAction: [],
2356
2369
  FirewallRuleGroupId: [],
@@ -3605,7 +3618,9 @@ var paginateListTagsForResource = (0, import_core.createPaginator)(Route53Resolv
3605
3618
  AutodefinedReverseFlag,
3606
3619
  BlockOverrideDnsType,
3607
3620
  BlockResponse,
3621
+ ConfidenceThreshold,
3608
3622
  FirewallDomainListStatus,
3623
+ DnsThreatProtection,
3609
3624
  FirewallDomainRedirectionAction,
3610
3625
  ShareStatus,
3611
3626
  FirewallRuleGroupStatus,
@@ -216,6 +216,11 @@ export const BlockResponse = {
216
216
  NXDOMAIN: "NXDOMAIN",
217
217
  OVERRIDE: "OVERRIDE",
218
218
  };
219
+ export const ConfidenceThreshold = {
220
+ HIGH: "HIGH",
221
+ LOW: "LOW",
222
+ MEDIUM: "MEDIUM",
223
+ };
219
224
  export const FirewallDomainListStatus = {
220
225
  COMPLETE: "COMPLETE",
221
226
  COMPLETE_IMPORT_FAILED: "COMPLETE_IMPORT_FAILED",
@@ -223,6 +228,10 @@ export const FirewallDomainListStatus = {
223
228
  IMPORTING: "IMPORTING",
224
229
  UPDATING: "UPDATING",
225
230
  };
231
+ export const DnsThreatProtection = {
232
+ DGA: "DGA",
233
+ DNS_TUNNELING: "DNS_TUNNELING",
234
+ };
226
235
  export const FirewallDomainRedirectionAction = {
227
236
  INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN",
228
237
  TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN",
@@ -1548,7 +1548,9 @@ const se_CreateFirewallRuleRequest = (input, context) => {
1548
1548
  BlockOverrideDomain: [],
1549
1549
  BlockOverrideTtl: [],
1550
1550
  BlockResponse: [],
1551
+ ConfidenceThreshold: [],
1551
1552
  CreatorRequestId: [true, (_) => _ ?? generateIdempotencyToken()],
1553
+ DnsThreatProtection: [],
1552
1554
  FirewallDomainListId: [],
1553
1555
  FirewallDomainRedirectionAction: [],
1554
1556
  FirewallRuleGroupId: [],
@@ -37,7 +37,7 @@ declare const CreateFirewallRuleCommand_base: {
37
37
  * const input = { // CreateFirewallRuleRequest
38
38
  * CreatorRequestId: "STRING_VALUE", // required
39
39
  * FirewallRuleGroupId: "STRING_VALUE", // required
40
- * FirewallDomainListId: "STRING_VALUE", // required
40
+ * FirewallDomainListId: "STRING_VALUE",
41
41
  * Priority: Number("int"), // required
42
42
  * Action: "ALLOW" || "BLOCK" || "ALERT", // required
43
43
  * BlockResponse: "NODATA" || "NXDOMAIN" || "OVERRIDE",
@@ -47,6 +47,8 @@ declare const CreateFirewallRuleCommand_base: {
47
47
  * Name: "STRING_VALUE", // required
48
48
  * FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
49
49
  * Qtype: "STRING_VALUE",
50
+ * DnsThreatProtection: "DGA" || "DNS_TUNNELING",
51
+ * ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
50
52
  * };
51
53
  * const command = new CreateFirewallRuleCommand(input);
52
54
  * const response = await client.send(command);
@@ -54,6 +56,7 @@ declare const CreateFirewallRuleCommand_base: {
54
56
  * // FirewallRule: { // FirewallRule
55
57
  * // FirewallRuleGroupId: "STRING_VALUE",
56
58
  * // FirewallDomainListId: "STRING_VALUE",
59
+ * // FirewallThreatProtectionId: "STRING_VALUE",
57
60
  * // Name: "STRING_VALUE",
58
61
  * // Priority: Number("int"),
59
62
  * // Action: "ALLOW" || "BLOCK" || "ALERT",
@@ -66,6 +69,8 @@ declare const CreateFirewallRuleCommand_base: {
66
69
  * // ModificationTime: "STRING_VALUE",
67
70
  * // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
68
71
  * // Qtype: "STRING_VALUE",
72
+ * // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
73
+ * // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
69
74
  * // },
70
75
  * // };
71
76
  *
@@ -36,7 +36,8 @@ declare const DeleteFirewallRuleCommand_base: {
36
36
  * const client = new Route53ResolverClient(config);
37
37
  * const input = { // DeleteFirewallRuleRequest
38
38
  * FirewallRuleGroupId: "STRING_VALUE", // required
39
- * FirewallDomainListId: "STRING_VALUE", // required
39
+ * FirewallDomainListId: "STRING_VALUE",
40
+ * FirewallThreatProtectionId: "STRING_VALUE",
40
41
  * Qtype: "STRING_VALUE",
41
42
  * };
42
43
  * const command = new DeleteFirewallRuleCommand(input);
@@ -45,6 +46,7 @@ declare const DeleteFirewallRuleCommand_base: {
45
46
  * // FirewallRule: { // FirewallRule
46
47
  * // FirewallRuleGroupId: "STRING_VALUE",
47
48
  * // FirewallDomainListId: "STRING_VALUE",
49
+ * // FirewallThreatProtectionId: "STRING_VALUE",
48
50
  * // Name: "STRING_VALUE",
49
51
  * // Priority: Number("int"),
50
52
  * // Action: "ALLOW" || "BLOCK" || "ALERT",
@@ -57,6 +59,8 @@ declare const DeleteFirewallRuleCommand_base: {
57
59
  * // ModificationTime: "STRING_VALUE",
58
60
  * // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
59
61
  * // Qtype: "STRING_VALUE",
62
+ * // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
63
+ * // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
60
64
  * // },
61
65
  * // };
62
66
  *
@@ -82,6 +86,10 @@ declare const DeleteFirewallRuleCommand_base: {
82
86
  * @throws {@link ThrottlingException} (client fault)
83
87
  * <p>The request was throttled. Try again in a few minutes.</p>
84
88
  *
89
+ * @throws {@link ValidationException} (client fault)
90
+ * <p>You have provided an invalid command. If you ran the <code>UpdateFirewallDomains</code> request. supported values are <code>ADD</code>,
91
+ * <code>REMOVE</code>, or <code>REPLACE</code> a domain.</p>
92
+ *
85
93
  * @throws {@link Route53ResolverServiceException}
86
94
  * <p>Base exception class for all service exceptions from Route53Resolver service.</p>
87
95
  *
@@ -50,6 +50,7 @@ declare const ListFirewallRulesCommand_base: {
50
50
  * // { // FirewallRule
51
51
  * // FirewallRuleGroupId: "STRING_VALUE",
52
52
  * // FirewallDomainListId: "STRING_VALUE",
53
+ * // FirewallThreatProtectionId: "STRING_VALUE",
53
54
  * // Name: "STRING_VALUE",
54
55
  * // Priority: Number("int"),
55
56
  * // Action: "ALLOW" || "BLOCK" || "ALERT",
@@ -62,6 +63,8 @@ declare const ListFirewallRulesCommand_base: {
62
63
  * // ModificationTime: "STRING_VALUE",
63
64
  * // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
64
65
  * // Qtype: "STRING_VALUE",
66
+ * // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
67
+ * // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
65
68
  * // },
66
69
  * // ],
67
70
  * // };
@@ -36,7 +36,8 @@ declare const UpdateFirewallRuleCommand_base: {
36
36
  * const client = new Route53ResolverClient(config);
37
37
  * const input = { // UpdateFirewallRuleRequest
38
38
  * FirewallRuleGroupId: "STRING_VALUE", // required
39
- * FirewallDomainListId: "STRING_VALUE", // required
39
+ * FirewallDomainListId: "STRING_VALUE",
40
+ * FirewallThreatProtectionId: "STRING_VALUE",
40
41
  * Priority: Number("int"),
41
42
  * Action: "ALLOW" || "BLOCK" || "ALERT",
42
43
  * BlockResponse: "NODATA" || "NXDOMAIN" || "OVERRIDE",
@@ -46,6 +47,8 @@ declare const UpdateFirewallRuleCommand_base: {
46
47
  * Name: "STRING_VALUE",
47
48
  * FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
48
49
  * Qtype: "STRING_VALUE",
50
+ * DnsThreatProtection: "DGA" || "DNS_TUNNELING",
51
+ * ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
49
52
  * };
50
53
  * const command = new UpdateFirewallRuleCommand(input);
51
54
  * const response = await client.send(command);
@@ -53,6 +56,7 @@ declare const UpdateFirewallRuleCommand_base: {
53
56
  * // FirewallRule: { // FirewallRule
54
57
  * // FirewallRuleGroupId: "STRING_VALUE",
55
58
  * // FirewallDomainListId: "STRING_VALUE",
59
+ * // FirewallThreatProtectionId: "STRING_VALUE",
56
60
  * // Name: "STRING_VALUE",
57
61
  * // Priority: Number("int"),
58
62
  * // Action: "ALLOW" || "BLOCK" || "ALERT",
@@ -65,6 +69,8 @@ declare const UpdateFirewallRuleCommand_base: {
65
69
  * // ModificationTime: "STRING_VALUE",
66
70
  * // FirewallDomainRedirectionAction: "INSPECT_REDIRECTION_DOMAIN" || "TRUST_REDIRECTION_DOMAIN",
67
71
  * // Qtype: "STRING_VALUE",
72
+ * // DnsThreatProtection: "DGA" || "DNS_TUNNELING",
73
+ * // ConfidenceThreshold: "LOW" || "MEDIUM" || "HIGH",
68
74
  * // },
69
75
  * // };
70
76
  *
@@ -737,7 +737,7 @@ export interface ResolverQueryLogConfigAssociation {
737
737
  * </li>
738
738
  * <li>
739
739
  * <p>
740
- * <code>CREATED</code>: The association between an Amazon VPC and a query logging configuration
740
+ * <code>ACTIVE</code>: The association between an Amazon VPC and a query logging configuration
741
741
  * was successfully created. Resolver is logging queries that originate in the specified VPC.</p>
742
742
  * </li>
743
743
  * <li>
@@ -934,6 +934,19 @@ export declare const BlockResponse: {
934
934
  * @public
935
935
  */
936
936
  export type BlockResponse = (typeof BlockResponse)[keyof typeof BlockResponse];
937
+ /**
938
+ * @public
939
+ * @enum
940
+ */
941
+ export declare const ConfidenceThreshold: {
942
+ readonly HIGH: "HIGH";
943
+ readonly LOW: "LOW";
944
+ readonly MEDIUM: "MEDIUM";
945
+ };
946
+ /**
947
+ * @public
948
+ */
949
+ export type ConfidenceThreshold = (typeof ConfidenceThreshold)[keyof typeof ConfidenceThreshold];
937
950
  /**
938
951
  * @public
939
952
  */
@@ -1040,6 +1053,18 @@ export interface CreateFirewallDomainListResponse {
1040
1053
  */
1041
1054
  FirewallDomainList?: FirewallDomainList | undefined;
1042
1055
  }
1056
+ /**
1057
+ * @public
1058
+ * @enum
1059
+ */
1060
+ export declare const DnsThreatProtection: {
1061
+ readonly DGA: "DGA";
1062
+ readonly DNS_TUNNELING: "DNS_TUNNELING";
1063
+ };
1064
+ /**
1065
+ * @public
1066
+ */
1067
+ export type DnsThreatProtection = (typeof DnsThreatProtection)[keyof typeof DnsThreatProtection];
1043
1068
  /**
1044
1069
  * @public
1045
1070
  * @enum
@@ -1069,10 +1094,10 @@ export interface CreateFirewallRuleRequest {
1069
1094
  */
1070
1095
  FirewallRuleGroupId: string | undefined;
1071
1096
  /**
1072
- * <p>The ID of the domain list that you want to use in the rule. </p>
1097
+ * <p>The ID of the domain list that you want to use in the rule. Can't be used together with <code>DnsThreatProtecton</code>.</p>
1073
1098
  * @public
1074
1099
  */
1075
- FirewallDomainListId: string | undefined;
1100
+ FirewallDomainListId?: string | undefined;
1076
1101
  /**
1077
1102
  * <p>The setting that determines the processing order of the rule in the rule group. DNS Firewall
1078
1103
  * processes the rules in a rule group by order of priority, starting from the lowest setting.</p>
@@ -1083,11 +1108,11 @@ export interface CreateFirewallRuleRequest {
1083
1108
  */
1084
1109
  Priority: number | undefined;
1085
1110
  /**
1086
- * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
1111
+ * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
1087
1112
  * <ul>
1088
1113
  * <li>
1089
1114
  * <p>
1090
- * <code>ALLOW</code> - Permit the request to go through.</p>
1115
+ * <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
1091
1116
  * </li>
1092
1117
  * <li>
1093
1118
  * <p>
@@ -1150,10 +1175,10 @@ export interface CreateFirewallRuleRequest {
1150
1175
  * How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
1151
1176
  * </p>
1152
1177
  * <p>
1153
- * <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1178
+ * <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1154
1179
  * added to the domain list.</p>
1155
1180
  * <p>
1156
- * <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1181
+ * <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1157
1182
  * the domain list.</p>
1158
1183
  * @public
1159
1184
  */
@@ -1214,6 +1239,35 @@ export interface CreateFirewallRuleRequest {
1214
1239
  * @public
1215
1240
  */
1216
1241
  Qtype?: string | undefined;
1242
+ /**
1243
+ * <p>
1244
+ * Use to create a DNS Firewall Advanced rule.
1245
+ * </p>
1246
+ * @public
1247
+ */
1248
+ DnsThreatProtection?: DnsThreatProtection | undefined;
1249
+ /**
1250
+ * <p>
1251
+ * The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
1252
+ * level values mean:
1253
+ * </p>
1254
+ * <ul>
1255
+ * <li>
1256
+ * <p>
1257
+ * <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
1258
+ * </li>
1259
+ * <li>
1260
+ * <p>
1261
+ * <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
1262
+ * </li>
1263
+ * <li>
1264
+ * <p>
1265
+ * <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
1266
+ * </li>
1267
+ * </ul>
1268
+ * @public
1269
+ */
1270
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
1217
1271
  }
1218
1272
  /**
1219
1273
  * <p>A single firewall rule in a rule group.</p>
@@ -1221,7 +1275,7 @@ export interface CreateFirewallRuleRequest {
1221
1275
  */
1222
1276
  export interface FirewallRule {
1223
1277
  /**
1224
- * <p>The unique identifier of the firewall rule group of the rule. </p>
1278
+ * <p>The unique identifier of the Firewall rule group of the rule. </p>
1225
1279
  * @public
1226
1280
  */
1227
1281
  FirewallRuleGroupId?: string | undefined;
@@ -1230,6 +1284,13 @@ export interface FirewallRule {
1230
1284
  * @public
1231
1285
  */
1232
1286
  FirewallDomainListId?: string | undefined;
1287
+ /**
1288
+ * <p>
1289
+ * ID of the DNS Firewall Advanced rule.
1290
+ * </p>
1291
+ * @public
1292
+ */
1293
+ FirewallThreatProtectionId?: string | undefined;
1233
1294
  /**
1234
1295
  * <p>The name of the rule. </p>
1235
1296
  * @public
@@ -1241,11 +1302,11 @@ export interface FirewallRule {
1241
1302
  */
1242
1303
  Priority?: number | undefined;
1243
1304
  /**
1244
- * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
1305
+ * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
1245
1306
  * <ul>
1246
1307
  * <li>
1247
1308
  * <p>
1248
- * <code>ALLOW</code> - Permit the request to go through.</p>
1309
+ * <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
1249
1310
  * </li>
1250
1311
  * <li>
1251
1312
  * <p>
@@ -1314,10 +1375,10 @@ export interface FirewallRule {
1314
1375
  * How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
1315
1376
  * </p>
1316
1377
  * <p>
1317
- * <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1378
+ * <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1318
1379
  * added to the domain list.</p>
1319
1380
  * <p>
1320
- * <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1381
+ * <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1321
1382
  * the domain list.</p>
1322
1383
  * @public
1323
1384
  */
@@ -1378,6 +1439,47 @@ export interface FirewallRule {
1378
1439
  * @public
1379
1440
  */
1380
1441
  Qtype?: string | undefined;
1442
+ /**
1443
+ * <p>
1444
+ * The type of the DNS Firewall Advanced rule. Valid values are:
1445
+ * </p>
1446
+ * <ul>
1447
+ * <li>
1448
+ * <p>
1449
+ * <code>DGA</code>: Domain generation algorithms detection. DGAs are used by attackers to generate a large number of domains
1450
+ * to to launch malware attacks.</p>
1451
+ * </li>
1452
+ * <li>
1453
+ * <p>
1454
+ * <code>DNS_TUNNELING</code>: DNS tunneling detection. DNS tunneling is used by attackers to exfiltrate data from the client by using the DNS tunnel without
1455
+ * making a network connection to the client.</p>
1456
+ * </li>
1457
+ * </ul>
1458
+ * @public
1459
+ */
1460
+ DnsThreatProtection?: DnsThreatProtection | undefined;
1461
+ /**
1462
+ * <p>
1463
+ * The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
1464
+ * level values mean:
1465
+ * </p>
1466
+ * <ul>
1467
+ * <li>
1468
+ * <p>
1469
+ * <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
1470
+ * </li>
1471
+ * <li>
1472
+ * <p>
1473
+ * <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
1474
+ * </li>
1475
+ * <li>
1476
+ * <p>
1477
+ * <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
1478
+ * </li>
1479
+ * </ul>
1480
+ * @public
1481
+ */
1482
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
1381
1483
  }
1382
1484
  /**
1383
1485
  * @public
@@ -2032,45 +2134,7 @@ export interface TargetAddress {
2032
2134
  Ipv6?: string | undefined;
2033
2135
  /**
2034
2136
  * <p>
2035
- * The protocols for the Resolver endpoints. DoH-FIPS is applicable for inbound endpoints only.
2036
- *
2037
- * </p>
2038
- * <p>For an inbound endpoint you can apply the protocols as follows:</p>
2039
- * <ul>
2040
- * <li>
2041
- * <p> Do53 and DoH in combination.</p>
2042
- * </li>
2043
- * <li>
2044
- * <p>Do53 and DoH-FIPS in combination.</p>
2045
- * </li>
2046
- * <li>
2047
- * <p>Do53 alone.</p>
2048
- * </li>
2049
- * <li>
2050
- * <p>DoH alone.</p>
2051
- * </li>
2052
- * <li>
2053
- * <p>DoH-FIPS alone.</p>
2054
- * </li>
2055
- * <li>
2056
- * <p>None, which is treated as Do53.</p>
2057
- * </li>
2058
- * </ul>
2059
- * <p>For an outbound endpoint you can apply the protocols as follows:</p>
2060
- * <ul>
2061
- * <li>
2062
- * <p> Do53 and DoH in combination.</p>
2063
- * </li>
2064
- * <li>
2065
- * <p>Do53 alone.</p>
2066
- * </li>
2067
- * <li>
2068
- * <p>DoH alone.</p>
2069
- * </li>
2070
- * <li>
2071
- * <p>None, which is treated as Do53.</p>
2072
- * </li>
2073
- * </ul>
2137
+ * The protocols for the target address. The protocol you choose needs to be supported by the outbound endpoint of the Resolver rule.</p>
2074
2138
  * @public
2075
2139
  */
2076
2140
  Protocol?: Protocol | undefined;
@@ -2288,7 +2352,14 @@ export interface DeleteFirewallRuleRequest {
2288
2352
  * <p>The ID of the domain list that's used in the rule. </p>
2289
2353
  * @public
2290
2354
  */
2291
- FirewallDomainListId: string | undefined;
2355
+ FirewallDomainListId?: string | undefined;
2356
+ /**
2357
+ * <p>
2358
+ * The ID that is created for a DNS Firewall Advanced rule.
2359
+ * </p>
2360
+ * @public
2361
+ */
2362
+ FirewallThreatProtectionId?: string | undefined;
2292
2363
  /**
2293
2364
  * <p>
2294
2365
  * The DNS query type that the rule you are deleting evaluates. Allowed values are;
@@ -3828,11 +3899,11 @@ export interface ListFirewallRulesRequest {
3828
3899
  Priority?: number | undefined;
3829
3900
  /**
3830
3901
  * <p>Optional additional filter for the rules to retrieve.</p>
3831
- * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
3902
+ * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
3832
3903
  * <ul>
3833
3904
  * <li>
3834
3905
  * <p>
3835
- * <code>ALLOW</code> - Permit the request to go through.</p>
3906
+ * <code>ALLOW</code> - Permit the request to go through. Not availabe for DNS Firewall Advanced rules.</p>
3836
3907
  * </li>
3837
3908
  * <li>
3838
3909
  * <p>
@@ -4938,7 +5009,14 @@ export interface UpdateFirewallRuleRequest {
4938
5009
  * <p>The ID of the domain list to use in the rule. </p>
4939
5010
  * @public
4940
5011
  */
4941
- FirewallDomainListId: string | undefined;
5012
+ FirewallDomainListId?: string | undefined;
5013
+ /**
5014
+ * <p>
5015
+ * The DNS Firewall Advanced rule ID.
5016
+ * </p>
5017
+ * @public
5018
+ */
5019
+ FirewallThreatProtectionId?: string | undefined;
4942
5020
  /**
4943
5021
  * <p>The setting that determines the processing order of the rule in the rule group. DNS Firewall
4944
5022
  * processes the rules in a rule group by order of priority, starting from the lowest setting.</p>
@@ -4949,11 +5027,11 @@ export interface UpdateFirewallRuleRequest {
4949
5027
  */
4950
5028
  Priority?: number | undefined;
4951
5029
  /**
4952
- * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:</p>
5030
+ * <p>The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list, or a threat in a DNS Firewall Advanced rule:</p>
4953
5031
  * <ul>
4954
5032
  * <li>
4955
5033
  * <p>
4956
- * <code>ALLOW</code> - Permit the request to go through.</p>
5034
+ * <code>ALLOW</code> - Permit the request to go through. Not available for DNS Firewall Advanced rules.</p>
4957
5035
  * </li>
4958
5036
  * <li>
4959
5037
  * <p>
@@ -5011,10 +5089,10 @@ export interface UpdateFirewallRuleRequest {
5011
5089
  * How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
5012
5090
  * </p>
5013
5091
  * <p>
5014
- * <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
5092
+ * <code>INSPECT_REDIRECTION_DOMAIN</code>: (Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
5015
5093
  * added to the domain list.</p>
5016
5094
  * <p>
5017
- * <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
5095
+ * <code>TRUST_REDIRECTION_DOMAIN</code>: Inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
5018
5096
  * the domain list.</p>
5019
5097
  * @public
5020
5098
  */
@@ -5079,6 +5157,47 @@ export interface UpdateFirewallRuleRequest {
5079
5157
  * @public
5080
5158
  */
5081
5159
  Qtype?: string | undefined;
5160
+ /**
5161
+ * <p>
5162
+ * The type of the DNS Firewall Advanced rule. Valid values are:
5163
+ * </p>
5164
+ * <ul>
5165
+ * <li>
5166
+ * <p>
5167
+ * <code>DGA</code>: Domain generation algorithms detection. DGAs are used by attackers to generate a large number of domains
5168
+ * to to launch malware attacks.</p>
5169
+ * </li>
5170
+ * <li>
5171
+ * <p>
5172
+ * <code>DNS_TUNNELING</code>: DNS tunneling detection. DNS tunneling is used by attackers to exfiltrate data from the client by using the DNS tunnel without
5173
+ * making a network connection to the client.</p>
5174
+ * </li>
5175
+ * </ul>
5176
+ * @public
5177
+ */
5178
+ DnsThreatProtection?: DnsThreatProtection | undefined;
5179
+ /**
5180
+ * <p>
5181
+ * The confidence threshold for DNS Firewall Advanced. You must provide this value when you create a DNS Firewall Advanced rule. The confidence
5182
+ * level values mean:
5183
+ * </p>
5184
+ * <ul>
5185
+ * <li>
5186
+ * <p>
5187
+ * <code>LOW</code>: Provides the highest detection rate for threats, but also increases false positives.</p>
5188
+ * </li>
5189
+ * <li>
5190
+ * <p>
5191
+ * <code>MEDIUM</code>: Provides a balance between detecting threats and false positives.</p>
5192
+ * </li>
5193
+ * <li>
5194
+ * <p>
5195
+ * <code>HIGH</code>: Detects only the most well corroborated threats with a low rate of false positives. </p>
5196
+ * </li>
5197
+ * </ul>
5198
+ * @public
5199
+ */
5200
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
5082
5201
  }
5083
5202
  /**
5084
5203
  * @public
@@ -279,6 +279,13 @@ export declare const BlockResponse: {
279
279
  readonly OVERRIDE: "OVERRIDE";
280
280
  };
281
281
  export type BlockResponse = (typeof BlockResponse)[keyof typeof BlockResponse];
282
+ export declare const ConfidenceThreshold: {
283
+ readonly HIGH: "HIGH";
284
+ readonly LOW: "LOW";
285
+ readonly MEDIUM: "MEDIUM";
286
+ };
287
+ export type ConfidenceThreshold =
288
+ (typeof ConfidenceThreshold)[keyof typeof ConfidenceThreshold];
282
289
  export interface CreateFirewallDomainListRequest {
283
290
  CreatorRequestId?: string | undefined;
284
291
  Name: string | undefined;
@@ -308,6 +315,12 @@ export interface FirewallDomainList {
308
315
  export interface CreateFirewallDomainListResponse {
309
316
  FirewallDomainList?: FirewallDomainList | undefined;
310
317
  }
318
+ export declare const DnsThreatProtection: {
319
+ readonly DGA: "DGA";
320
+ readonly DNS_TUNNELING: "DNS_TUNNELING";
321
+ };
322
+ export type DnsThreatProtection =
323
+ (typeof DnsThreatProtection)[keyof typeof DnsThreatProtection];
311
324
  export declare const FirewallDomainRedirectionAction: {
312
325
  readonly INSPECT_REDIRECTION_DOMAIN: "INSPECT_REDIRECTION_DOMAIN";
313
326
  readonly TRUST_REDIRECTION_DOMAIN: "TRUST_REDIRECTION_DOMAIN";
@@ -317,7 +330,7 @@ export type FirewallDomainRedirectionAction =
317
330
  export interface CreateFirewallRuleRequest {
318
331
  CreatorRequestId?: string | undefined;
319
332
  FirewallRuleGroupId: string | undefined;
320
- FirewallDomainListId: string | undefined;
333
+ FirewallDomainListId?: string | undefined;
321
334
  Priority: number | undefined;
322
335
  Action: Action | undefined;
323
336
  BlockResponse?: BlockResponse | undefined;
@@ -327,10 +340,13 @@ export interface CreateFirewallRuleRequest {
327
340
  Name: string | undefined;
328
341
  FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
329
342
  Qtype?: string | undefined;
343
+ DnsThreatProtection?: DnsThreatProtection | undefined;
344
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
330
345
  }
331
346
  export interface FirewallRule {
332
347
  FirewallRuleGroupId?: string | undefined;
333
348
  FirewallDomainListId?: string | undefined;
349
+ FirewallThreatProtectionId?: string | undefined;
334
350
  Name?: string | undefined;
335
351
  Priority?: number | undefined;
336
352
  Action?: Action | undefined;
@@ -343,6 +359,8 @@ export interface FirewallRule {
343
359
  ModificationTime?: string | undefined;
344
360
  FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
345
361
  Qtype?: string | undefined;
362
+ DnsThreatProtection?: DnsThreatProtection | undefined;
363
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
346
364
  }
347
365
  export interface CreateFirewallRuleResponse {
348
366
  FirewallRule?: FirewallRule | undefined;
@@ -531,7 +549,8 @@ export interface DeleteFirewallDomainListResponse {
531
549
  }
532
550
  export interface DeleteFirewallRuleRequest {
533
551
  FirewallRuleGroupId: string | undefined;
534
- FirewallDomainListId: string | undefined;
552
+ FirewallDomainListId?: string | undefined;
553
+ FirewallThreatProtectionId?: string | undefined;
535
554
  Qtype?: string | undefined;
536
555
  }
537
556
  export interface DeleteFirewallRuleResponse {
@@ -1062,7 +1081,8 @@ export interface UpdateFirewallDomainsResponse {
1062
1081
  }
1063
1082
  export interface UpdateFirewallRuleRequest {
1064
1083
  FirewallRuleGroupId: string | undefined;
1065
- FirewallDomainListId: string | undefined;
1084
+ FirewallDomainListId?: string | undefined;
1085
+ FirewallThreatProtectionId?: string | undefined;
1066
1086
  Priority?: number | undefined;
1067
1087
  Action?: Action | undefined;
1068
1088
  BlockResponse?: BlockResponse | undefined;
@@ -1072,6 +1092,8 @@ export interface UpdateFirewallRuleRequest {
1072
1092
  Name?: string | undefined;
1073
1093
  FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction | undefined;
1074
1094
  Qtype?: string | undefined;
1095
+ DnsThreatProtection?: DnsThreatProtection | undefined;
1096
+ ConfidenceThreshold?: ConfidenceThreshold | undefined;
1075
1097
  }
1076
1098
  export interface UpdateFirewallRuleResponse {
1077
1099
  FirewallRule?: FirewallRule | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-route53resolver",
3
3
  "description": "AWS SDK for JavaScript Route53resolver Client for Node.js, Browser and React Native",
4
- "version": "3.693.0",
4
+ "version": "3.696.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-route53resolver",
@@ -20,43 +20,43 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/client-sso-oidc": "3.693.0",
24
- "@aws-sdk/client-sts": "3.693.0",
25
- "@aws-sdk/core": "3.693.0",
26
- "@aws-sdk/credential-provider-node": "3.693.0",
27
- "@aws-sdk/middleware-host-header": "3.693.0",
28
- "@aws-sdk/middleware-logger": "3.693.0",
29
- "@aws-sdk/middleware-recursion-detection": "3.693.0",
30
- "@aws-sdk/middleware-user-agent": "3.693.0",
31
- "@aws-sdk/region-config-resolver": "3.693.0",
32
- "@aws-sdk/types": "3.692.0",
33
- "@aws-sdk/util-endpoints": "3.693.0",
34
- "@aws-sdk/util-user-agent-browser": "3.693.0",
35
- "@aws-sdk/util-user-agent-node": "3.693.0",
36
- "@smithy/config-resolver": "^3.0.11",
37
- "@smithy/core": "^2.5.2",
38
- "@smithy/fetch-http-handler": "^4.1.0",
39
- "@smithy/hash-node": "^3.0.9",
40
- "@smithy/invalid-dependency": "^3.0.9",
41
- "@smithy/middleware-content-length": "^3.0.11",
42
- "@smithy/middleware-endpoint": "^3.2.2",
43
- "@smithy/middleware-retry": "^3.0.26",
44
- "@smithy/middleware-serde": "^3.0.9",
45
- "@smithy/middleware-stack": "^3.0.9",
46
- "@smithy/node-config-provider": "^3.1.10",
47
- "@smithy/node-http-handler": "^3.3.0",
48
- "@smithy/protocol-http": "^4.1.6",
49
- "@smithy/smithy-client": "^3.4.3",
50
- "@smithy/types": "^3.7.0",
51
- "@smithy/url-parser": "^3.0.9",
23
+ "@aws-sdk/client-sso-oidc": "3.696.0",
24
+ "@aws-sdk/client-sts": "3.696.0",
25
+ "@aws-sdk/core": "3.696.0",
26
+ "@aws-sdk/credential-provider-node": "3.696.0",
27
+ "@aws-sdk/middleware-host-header": "3.696.0",
28
+ "@aws-sdk/middleware-logger": "3.696.0",
29
+ "@aws-sdk/middleware-recursion-detection": "3.696.0",
30
+ "@aws-sdk/middleware-user-agent": "3.696.0",
31
+ "@aws-sdk/region-config-resolver": "3.696.0",
32
+ "@aws-sdk/types": "3.696.0",
33
+ "@aws-sdk/util-endpoints": "3.696.0",
34
+ "@aws-sdk/util-user-agent-browser": "3.696.0",
35
+ "@aws-sdk/util-user-agent-node": "3.696.0",
36
+ "@smithy/config-resolver": "^3.0.12",
37
+ "@smithy/core": "^2.5.3",
38
+ "@smithy/fetch-http-handler": "^4.1.1",
39
+ "@smithy/hash-node": "^3.0.10",
40
+ "@smithy/invalid-dependency": "^3.0.10",
41
+ "@smithy/middleware-content-length": "^3.0.12",
42
+ "@smithy/middleware-endpoint": "^3.2.3",
43
+ "@smithy/middleware-retry": "^3.0.27",
44
+ "@smithy/middleware-serde": "^3.0.10",
45
+ "@smithy/middleware-stack": "^3.0.10",
46
+ "@smithy/node-config-provider": "^3.1.11",
47
+ "@smithy/node-http-handler": "^3.3.1",
48
+ "@smithy/protocol-http": "^4.1.7",
49
+ "@smithy/smithy-client": "^3.4.4",
50
+ "@smithy/types": "^3.7.1",
51
+ "@smithy/url-parser": "^3.0.10",
52
52
  "@smithy/util-base64": "^3.0.0",
53
53
  "@smithy/util-body-length-browser": "^3.0.0",
54
54
  "@smithy/util-body-length-node": "^3.0.0",
55
- "@smithy/util-defaults-mode-browser": "^3.0.26",
56
- "@smithy/util-defaults-mode-node": "^3.0.26",
57
- "@smithy/util-endpoints": "^2.1.5",
58
- "@smithy/util-middleware": "^3.0.9",
59
- "@smithy/util-retry": "^3.0.9",
55
+ "@smithy/util-defaults-mode-browser": "^3.0.27",
56
+ "@smithy/util-defaults-mode-node": "^3.0.27",
57
+ "@smithy/util-endpoints": "^2.1.6",
58
+ "@smithy/util-middleware": "^3.0.10",
59
+ "@smithy/util-retry": "^3.0.10",
60
60
  "@smithy/util-utf8": "^3.0.0",
61
61
  "@types/uuid": "^9.0.1",
62
62
  "tslib": "^2.6.2",