aws-sdk 2.810.0 → 2.814.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +35 -1
- package/README.md +2 -3
- package/apis/amp-2020-08-01.examples.json +5 -0
- package/apis/amp-2020-08-01.min.json +211 -0
- package/apis/amp-2020-08-01.paginators.json +10 -0
- package/apis/ce-2017-10-25.min.json +101 -97
- package/apis/config-2014-11-12.min.json +40 -6
- package/apis/dlm-2018-01-12.min.json +104 -16
- package/apis/ec2-2016-11-15.min.json +11 -0
- package/apis/greengrassv2-2020-11-30.examples.json +5 -0
- package/apis/greengrassv2-2020-11-30.min.json +1069 -0
- package/apis/greengrassv2-2020-11-30.paginators.json +40 -0
- package/apis/imagebuilder-2019-12-02.min.json +375 -88
- package/apis/imagebuilder-2019-12-02.paginators.json +24 -9
- package/apis/iot-2015-05-28.min.json +904 -278
- package/apis/iot-2015-05-28.paginators.json +24 -0
- package/apis/iotanalytics-2017-11-27.min.json +79 -27
- package/apis/iotdeviceadvisor-2020-09-18.examples.json +5 -0
- package/apis/iotdeviceadvisor-2020-09-18.min.json +596 -0
- package/apis/iotdeviceadvisor-2020-09-18.paginators.json +19 -0
- package/apis/iotfleethub-2020-11-03.examples.json +5 -0
- package/apis/iotfleethub-2020-11-03.min.json +292 -0
- package/apis/iotfleethub-2020-11-03.paginators.json +9 -0
- package/apis/iotwireless-2020-11-22.examples.json +5 -0
- package/apis/iotwireless-2020-11-22.min.json +1832 -0
- package/apis/iotwireless-2020-11-22.paginators.json +29 -0
- package/apis/kms-2014-11-01.examples.json +7 -4
- package/apis/kms-2014-11-01.min.json +7 -1
- package/apis/lambda-2015-03-31.examples.json +6 -6
- package/apis/lambda-2015-03-31.min.json +140 -100
- package/apis/location-2020-11-19.examples.json +5 -0
- package/apis/location-2020-11-19.min.json +1759 -0
- package/apis/location-2020-11-19.paginators.json +44 -0
- package/apis/metadata.json +21 -0
- package/apis/quicksight-2018-04-01.min.json +120 -119
- package/apis/rds-2014-10-31.min.json +192 -172
- package/apis/route53-2013-04-01.min.json +372 -96
- package/apis/route53resolver-2018-04-01.min.json +81 -6
- package/apis/route53resolver-2018-04-01.paginators.json +6 -0
- package/apis/servicecatalog-2015-12-10.min.json +187 -117
- package/apis/servicecatalog-2015-12-10.paginators.json +5 -0
- package/apis/ssm-2014-11-06.min.json +606 -293
- package/apis/ssm-2014-11-06.paginators.json +12 -0
- package/apis/wellarchitected-2020-03-31.examples.json +5 -0
- package/apis/wellarchitected-2020-03-31.min.json +1329 -0
- package/apis/wellarchitected-2020-03-31.paginators.json +49 -0
- package/clients/all.d.ts +7 -0
- package/clients/all.js +8 -1
- package/clients/amp.d.ts +220 -0
- package/clients/amp.js +18 -0
- package/clients/configservice.d.ts +49 -28
- package/clients/costexplorer.d.ts +3 -2
- package/clients/dlm.d.ts +99 -7
- package/clients/ec2.d.ts +14 -2
- package/clients/greengrassv2.d.ts +1270 -0
- package/clients/greengrassv2.js +18 -0
- package/clients/imagebuilder.d.ts +433 -5
- package/clients/iot.d.ts +770 -60
- package/clients/iotanalytics.d.ts +68 -2
- package/clients/iotdeviceadvisor.d.ts +710 -0
- package/clients/iotdeviceadvisor.js +18 -0
- package/clients/iotfleethub.d.ts +315 -0
- package/clients/iotfleethub.js +18 -0
- package/clients/iotwireless.d.ts +2124 -0
- package/clients/iotwireless.js +18 -0
- package/clients/kms.d.ts +117 -109
- package/clients/lambda.d.ts +63 -17
- package/clients/location.d.ts +1498 -0
- package/clients/location.js +18 -0
- package/clients/quicksight.d.ts +15 -10
- package/clients/rds.d.ts +41 -14
- package/clients/route53.d.ts +247 -1
- package/clients/route53resolver.d.ts +105 -8
- package/clients/servicecatalog.d.ts +122 -14
- package/clients/sqs.d.ts +23 -23
- package/clients/ssm.d.ts +534 -31
- package/clients/wellarchitected.d.ts +871 -0
- package/clients/wellarchitected.js +18 -0
- package/dist/aws-sdk-core-react-native.js +7 -2
- package/dist/aws-sdk-react-native.js +293 -24
- package/dist/aws-sdk.js +2709 -1190
- package/dist/aws-sdk.min.js +81 -81
- package/lib/config_service_placeholders.d.ts +14 -0
- package/lib/core.js +1 -1
- package/lib/util.js +5 -0
- package/package.json +1 -1
package/clients/route53.d.ts
CHANGED
|
@@ -12,6 +12,14 @@ declare class Route53 extends Service {
|
|
|
12
12
|
*/
|
|
13
13
|
constructor(options?: Route53.Types.ClientConfiguration)
|
|
14
14
|
config: Config & Route53.Types.ClientConfiguration;
|
|
15
|
+
/**
|
|
16
|
+
* Activates a key signing key (KSK) so that it can be used for signing by DNSSEC. This operation changes the KSK status to ACTIVE.
|
|
17
|
+
*/
|
|
18
|
+
activateKeySigningKey(params: Route53.Types.ActivateKeySigningKeyRequest, callback?: (err: AWSError, data: Route53.Types.ActivateKeySigningKeyResponse) => void): Request<Route53.Types.ActivateKeySigningKeyResponse, AWSError>;
|
|
19
|
+
/**
|
|
20
|
+
* Activates a key signing key (KSK) so that it can be used for signing by DNSSEC. This operation changes the KSK status to ACTIVE.
|
|
21
|
+
*/
|
|
22
|
+
activateKeySigningKey(callback?: (err: AWSError, data: Route53.Types.ActivateKeySigningKeyResponse) => void): Request<Route53.Types.ActivateKeySigningKeyResponse, AWSError>;
|
|
15
23
|
/**
|
|
16
24
|
* Associates an Amazon VPC with a private hosted zone. To perform the association, the VPC and the private hosted zone must already exist. You can't convert a public hosted zone into a private hosted zone. If you want to associate a VPC that was created by using one AWS account with a private hosted zone that was created by using a different account, the AWS account that created the private hosted zone must first submit a CreateVPCAssociationAuthorization request. Then the account that created the VPC must submit an AssociateVPCWithHostedZone request.
|
|
17
25
|
*/
|
|
@@ -52,6 +60,14 @@ declare class Route53 extends Service {
|
|
|
52
60
|
* Creates a new public or private hosted zone. You create records in a public hosted zone to define how you want to route traffic on the internet for a domain, such as example.com, and its subdomains (apex.example.com, acme.example.com). You create records in a private hosted zone to define how you want to route traffic for a domain and its subdomains within one or more Amazon Virtual Private Clouds (Amazon VPCs). You can't convert a public hosted zone to a private hosted zone or vice versa. Instead, you must create a new hosted zone with the same name and create new resource record sets. For more information about charges for hosted zones, see Amazon Route 53 Pricing. Note the following: You can't create a hosted zone for a top-level domain (TLD) such as .com. For public hosted zones, Route 53 automatically creates a default SOA record and four NS records for the zone. For more information about SOA and NS records, see NS and SOA Records that Route 53 Creates for a Hosted Zone in the Amazon Route 53 Developer Guide. If you want to use the same name servers for multiple public hosted zones, you can optionally associate a reusable delegation set with the hosted zone. See the DelegationSetId element. If your domain is registered with a registrar other than Route 53, you must update the name servers with your registrar to make Route 53 the DNS service for the domain. For more information, see Migrating DNS Service for an Existing Domain to Amazon Route 53 in the Amazon Route 53 Developer Guide. When you submit a CreateHostedZone request, the initial status of the hosted zone is PENDING. For public hosted zones, this means that the NS and SOA records are not yet available on all Route 53 DNS servers. When the NS and SOA records are available, the status of the zone changes to INSYNC.
|
|
53
61
|
*/
|
|
54
62
|
createHostedZone(callback?: (err: AWSError, data: Route53.Types.CreateHostedZoneResponse) => void): Request<Route53.Types.CreateHostedZoneResponse, AWSError>;
|
|
63
|
+
/**
|
|
64
|
+
* Creates a new key signing key (KSK) associated with a hosted zone. You can only have two KSKs per hosted zone.
|
|
65
|
+
*/
|
|
66
|
+
createKeySigningKey(params: Route53.Types.CreateKeySigningKeyRequest, callback?: (err: AWSError, data: Route53.Types.CreateKeySigningKeyResponse) => void): Request<Route53.Types.CreateKeySigningKeyResponse, AWSError>;
|
|
67
|
+
/**
|
|
68
|
+
* Creates a new key signing key (KSK) associated with a hosted zone. You can only have two KSKs per hosted zone.
|
|
69
|
+
*/
|
|
70
|
+
createKeySigningKey(callback?: (err: AWSError, data: Route53.Types.CreateKeySigningKeyResponse) => void): Request<Route53.Types.CreateKeySigningKeyResponse, AWSError>;
|
|
55
71
|
/**
|
|
56
72
|
* Creates a configuration for DNS query logging. After you create a query logging configuration, Amazon Route 53 begins to publish log data to an Amazon CloudWatch Logs log group. DNS query logs contain information about the queries that Route 53 receives for a specified public hosted zone, such as the following: Route 53 edge location that responded to the DNS query Domain or subdomain that was requested DNS record type, such as A or AAAA DNS response code, such as NoError or ServFail Log Group and Resource Policy Before you create a query logging configuration, perform the following operations. If you create a query logging configuration using the Route 53 console, Route 53 performs these operations automatically. Create a CloudWatch Logs log group, and make note of the ARN, which you specify when you create a query logging configuration. Note the following: You must create the log group in the us-east-1 region. You must use the same AWS account to create the log group and the hosted zone that you want to configure query logging for. When you create log groups for query logging, we recommend that you use a consistent prefix, for example: /aws/route53/hosted zone name In the next step, you'll create a resource policy, which controls access to one or more log groups and the associated AWS resources, such as Route 53 hosted zones. There's a limit on the number of resource policies that you can create, so we recommend that you use a consistent prefix so you can use the same resource policy for all the log groups that you create for query logging. Create a CloudWatch Logs resource policy, and give it the permissions that Route 53 needs to create log streams and to send query logs to log streams. For the value of Resource, specify the ARN for the log group that you created in the previous step. To use the same resource policy for all the CloudWatch Logs log groups that you created for query logging configurations, replace the hosted zone name with *, for example: arn:aws:logs:us-east-1:123412341234:log-group:/aws/route53/* You can't use the CloudWatch console to create or edit a resource policy. You must use the CloudWatch API, one of the AWS SDKs, or the AWS CLI. Log Streams and Edge Locations When Route 53 finishes creating the configuration for DNS query logging, it does the following: Creates a log stream for an edge location the first time that the edge location responds to DNS queries for the specified hosted zone. That log stream is used to log all queries that Route 53 responds to for that edge location. Begins to send query logs to the applicable log stream. The name of each log stream is in the following format: hosted zone ID/edge location code The edge location code is a three-letter code and an arbitrarily assigned number, for example, DFW3. The three-letter code typically corresponds with the International Air Transport Association airport code for an airport near the edge location. (These abbreviations might change in the future.) For a list of edge locations, see "The Route 53 Global Network" on the Route 53 Product Details page. Queries That Are Logged Query logs contain only the queries that DNS resolvers forward to Route 53. If a DNS resolver has already cached the response to a query (such as the IP address for a load balancer for example.com), the resolver will continue to return the cached response. It doesn't forward another query to Route 53 until the TTL for the corresponding resource record set expires. Depending on how many DNS queries are submitted for a resource record set, and depending on the TTL for that resource record set, query logs might contain information about only one query out of every several thousand queries that are submitted to DNS. For more information about how DNS works, see Routing Internet Traffic to Your Website or Web Application in the Amazon Route 53 Developer Guide. Log File Format For a list of the values in each query log and the format of each value, see Logging DNS Queries in the Amazon Route 53 Developer Guide. Pricing For information about charges for query logs, see Amazon CloudWatch Pricing. How to Stop Logging If you want Route 53 to stop sending query logs to CloudWatch Logs, delete the query logging configuration. For more information, see DeleteQueryLoggingConfig.
|
|
57
73
|
*/
|
|
@@ -100,6 +116,14 @@ declare class Route53 extends Service {
|
|
|
100
116
|
* Authorizes the AWS account that created a specified VPC to submit an AssociateVPCWithHostedZone request to associate the VPC with a specified hosted zone that was created by a different account. To submit a CreateVPCAssociationAuthorization request, you must use the account that created the hosted zone. After you authorize the association, use the account that created the VPC to submit an AssociateVPCWithHostedZone request. If you want to associate multiple VPCs that you created by using one account with a hosted zone that you created by using a different account, you must submit one authorization request for each VPC.
|
|
101
117
|
*/
|
|
102
118
|
createVPCAssociationAuthorization(callback?: (err: AWSError, data: Route53.Types.CreateVPCAssociationAuthorizationResponse) => void): Request<Route53.Types.CreateVPCAssociationAuthorizationResponse, AWSError>;
|
|
119
|
+
/**
|
|
120
|
+
* Deactivates a key signing key (KSK) so that it will not be used for signing by DNSSEC. This operation changes the KSK status to INACTIVE.
|
|
121
|
+
*/
|
|
122
|
+
deactivateKeySigningKey(params: Route53.Types.DeactivateKeySigningKeyRequest, callback?: (err: AWSError, data: Route53.Types.DeactivateKeySigningKeyResponse) => void): Request<Route53.Types.DeactivateKeySigningKeyResponse, AWSError>;
|
|
123
|
+
/**
|
|
124
|
+
* Deactivates a key signing key (KSK) so that it will not be used for signing by DNSSEC. This operation changes the KSK status to INACTIVE.
|
|
125
|
+
*/
|
|
126
|
+
deactivateKeySigningKey(callback?: (err: AWSError, data: Route53.Types.DeactivateKeySigningKeyResponse) => void): Request<Route53.Types.DeactivateKeySigningKeyResponse, AWSError>;
|
|
103
127
|
/**
|
|
104
128
|
* Deletes a health check. Amazon Route 53 does not prevent you from deleting a health check even if the health check is associated with one or more resource record sets. If you delete a health check and you don't update the associated resource record sets, the future status of the health check can't be predicted and may change. This will affect the routing of DNS queries for your DNS failover configuration. For more information, see Replacing and Deleting Health Checks in the Amazon Route 53 Developer Guide. If you're using AWS Cloud Map and you configured Cloud Map to create a Route 53 health check when you register an instance, you can't use the Route 53 DeleteHealthCheck command to delete the health check. The health check is deleted automatically when you deregister the instance; there can be a delay of several hours before the health check is deleted from Route 53.
|
|
105
129
|
*/
|
|
@@ -116,6 +140,14 @@ declare class Route53 extends Service {
|
|
|
116
140
|
* Deletes a hosted zone. If the hosted zone was created by another service, such as AWS Cloud Map, see Deleting Public Hosted Zones That Were Created by Another Service in the Amazon Route 53 Developer Guide for information about how to delete it. (The process is the same for public and private hosted zones that were created by another service.) If you want to keep your domain registration but you want to stop routing internet traffic to your website or web application, we recommend that you delete resource record sets in the hosted zone instead of deleting the hosted zone. If you delete a hosted zone, you can't undelete it. You must create a new hosted zone and update the name servers for your domain registration, which can require up to 48 hours to take effect. (If you delegated responsibility for a subdomain to a hosted zone and you delete the child hosted zone, you must update the name servers in the parent hosted zone.) In addition, if you delete a hosted zone, someone could hijack the domain and route traffic to their own resources using your domain name. If you want to avoid the monthly charge for the hosted zone, you can transfer DNS service for the domain to a free DNS service. When you transfer DNS service, you have to update the name servers for the domain registration. If the domain is registered with Route 53, see UpdateDomainNameservers for information about how to replace Route 53 name servers with name servers for the new DNS service. If the domain is registered with another registrar, use the method provided by the registrar to update name servers for the domain registration. For more information, perform an internet search on "free DNS service." You can delete a hosted zone only if it contains only the default SOA record and NS resource record sets. If the hosted zone contains other resource record sets, you must delete them before you can delete the hosted zone. If you try to delete a hosted zone that contains other resource record sets, the request fails, and Route 53 returns a HostedZoneNotEmpty error. For information about deleting records from your hosted zone, see ChangeResourceRecordSets. To verify that the hosted zone has been deleted, do one of the following: Use the GetHostedZone action to request information about the hosted zone. Use the ListHostedZones action to get a list of the hosted zones associated with the current AWS account.
|
|
117
141
|
*/
|
|
118
142
|
deleteHostedZone(callback?: (err: AWSError, data: Route53.Types.DeleteHostedZoneResponse) => void): Request<Route53.Types.DeleteHostedZoneResponse, AWSError>;
|
|
143
|
+
/**
|
|
144
|
+
* Deletes a key signing key (KSK). Before you can delete a KSK, you must deactivate it. The KSK must be deactived before you can delete it regardless of whether the hosted zone is enabled for DNSSEC signing.
|
|
145
|
+
*/
|
|
146
|
+
deleteKeySigningKey(params: Route53.Types.DeleteKeySigningKeyRequest, callback?: (err: AWSError, data: Route53.Types.DeleteKeySigningKeyResponse) => void): Request<Route53.Types.DeleteKeySigningKeyResponse, AWSError>;
|
|
147
|
+
/**
|
|
148
|
+
* Deletes a key signing key (KSK). Before you can delete a KSK, you must deactivate it. The KSK must be deactived before you can delete it regardless of whether the hosted zone is enabled for DNSSEC signing.
|
|
149
|
+
*/
|
|
150
|
+
deleteKeySigningKey(callback?: (err: AWSError, data: Route53.Types.DeleteKeySigningKeyResponse) => void): Request<Route53.Types.DeleteKeySigningKeyResponse, AWSError>;
|
|
119
151
|
/**
|
|
120
152
|
* Deletes a configuration for DNS query logging. If you delete a configuration, Amazon Route 53 stops sending query logs to CloudWatch Logs. Route 53 doesn't delete any logs that are already in CloudWatch Logs. For more information about DNS query logs, see CreateQueryLoggingConfig.
|
|
121
153
|
*/
|
|
@@ -156,6 +188,14 @@ declare class Route53 extends Service {
|
|
|
156
188
|
* Removes authorization to submit an AssociateVPCWithHostedZone request to associate a specified VPC with a hosted zone that was created by a different account. You must use the account that created the hosted zone to submit a DeleteVPCAssociationAuthorization request. Sending this request only prevents the AWS account that created the VPC from associating the VPC with the Amazon Route 53 hosted zone in the future. If the VPC is already associated with the hosted zone, DeleteVPCAssociationAuthorization won't disassociate the VPC from the hosted zone. If you want to delete an existing association, use DisassociateVPCFromHostedZone.
|
|
157
189
|
*/
|
|
158
190
|
deleteVPCAssociationAuthorization(callback?: (err: AWSError, data: Route53.Types.DeleteVPCAssociationAuthorizationResponse) => void): Request<Route53.Types.DeleteVPCAssociationAuthorizationResponse, AWSError>;
|
|
191
|
+
/**
|
|
192
|
+
* Disables DNSSEC signing in a specific hosted zone. This action does not deactivate any key signing keys (KSKs) that are active in the hosted zone.
|
|
193
|
+
*/
|
|
194
|
+
disableHostedZoneDNSSEC(params: Route53.Types.DisableHostedZoneDNSSECRequest, callback?: (err: AWSError, data: Route53.Types.DisableHostedZoneDNSSECResponse) => void): Request<Route53.Types.DisableHostedZoneDNSSECResponse, AWSError>;
|
|
195
|
+
/**
|
|
196
|
+
* Disables DNSSEC signing in a specific hosted zone. This action does not deactivate any key signing keys (KSKs) that are active in the hosted zone.
|
|
197
|
+
*/
|
|
198
|
+
disableHostedZoneDNSSEC(callback?: (err: AWSError, data: Route53.Types.DisableHostedZoneDNSSECResponse) => void): Request<Route53.Types.DisableHostedZoneDNSSECResponse, AWSError>;
|
|
159
199
|
/**
|
|
160
200
|
* Disassociates an Amazon Virtual Private Cloud (Amazon VPC) from an Amazon Route 53 private hosted zone. Note the following: You can't disassociate the last Amazon VPC from a private hosted zone. You can't convert a private hosted zone into a public hosted zone. You can submit a DisassociateVPCFromHostedZone request using either the account that created the hosted zone or the account that created the Amazon VPC. Some services, such as AWS Cloud Map and Amazon Elastic File System (Amazon EFS) automatically create hosted zones and associate VPCs with the hosted zones. A service can create a hosted zone using your account or using its own account. You can disassociate a VPC from a hosted zone only if the service created the hosted zone using your account. When you run DisassociateVPCFromHostedZone, if the hosted zone has a value for OwningAccount, you can use DisassociateVPCFromHostedZone. If the hosted zone has a value for OwningService, you can't use DisassociateVPCFromHostedZone.
|
|
161
201
|
*/
|
|
@@ -164,6 +204,14 @@ declare class Route53 extends Service {
|
|
|
164
204
|
* Disassociates an Amazon Virtual Private Cloud (Amazon VPC) from an Amazon Route 53 private hosted zone. Note the following: You can't disassociate the last Amazon VPC from a private hosted zone. You can't convert a private hosted zone into a public hosted zone. You can submit a DisassociateVPCFromHostedZone request using either the account that created the hosted zone or the account that created the Amazon VPC. Some services, such as AWS Cloud Map and Amazon Elastic File System (Amazon EFS) automatically create hosted zones and associate VPCs with the hosted zones. A service can create a hosted zone using your account or using its own account. You can disassociate a VPC from a hosted zone only if the service created the hosted zone using your account. When you run DisassociateVPCFromHostedZone, if the hosted zone has a value for OwningAccount, you can use DisassociateVPCFromHostedZone. If the hosted zone has a value for OwningService, you can't use DisassociateVPCFromHostedZone.
|
|
165
205
|
*/
|
|
166
206
|
disassociateVPCFromHostedZone(callback?: (err: AWSError, data: Route53.Types.DisassociateVPCFromHostedZoneResponse) => void): Request<Route53.Types.DisassociateVPCFromHostedZoneResponse, AWSError>;
|
|
207
|
+
/**
|
|
208
|
+
* Enables DNSSEC signing in a specific hosted zone.
|
|
209
|
+
*/
|
|
210
|
+
enableHostedZoneDNSSEC(params: Route53.Types.EnableHostedZoneDNSSECRequest, callback?: (err: AWSError, data: Route53.Types.EnableHostedZoneDNSSECResponse) => void): Request<Route53.Types.EnableHostedZoneDNSSECResponse, AWSError>;
|
|
211
|
+
/**
|
|
212
|
+
* Enables DNSSEC signing in a specific hosted zone.
|
|
213
|
+
*/
|
|
214
|
+
enableHostedZoneDNSSEC(callback?: (err: AWSError, data: Route53.Types.EnableHostedZoneDNSSECResponse) => void): Request<Route53.Types.EnableHostedZoneDNSSECResponse, AWSError>;
|
|
167
215
|
/**
|
|
168
216
|
* Gets the specified limit for the current account, for example, the maximum number of health checks that you can create using the account. For the default limit, see Limits in the Amazon Route 53 Developer Guide. To request a higher limit, open a case. You can also view account limits in AWS Trusted Advisor. Sign in to the AWS Management Console and open the Trusted Advisor console at https://console.aws.amazon.com/trustedadvisor/. Then choose Service limits in the navigation pane.
|
|
169
217
|
*/
|
|
@@ -188,6 +236,14 @@ declare class Route53 extends Service {
|
|
|
188
236
|
* GetCheckerIpRanges still works, but we recommend that you download ip-ranges.json, which includes IP address ranges for all AWS services. For more information, see IP Address Ranges of Amazon Route 53 Servers in the Amazon Route 53 Developer Guide.
|
|
189
237
|
*/
|
|
190
238
|
getCheckerIpRanges(callback?: (err: AWSError, data: Route53.Types.GetCheckerIpRangesResponse) => void): Request<Route53.Types.GetCheckerIpRangesResponse, AWSError>;
|
|
239
|
+
/**
|
|
240
|
+
* Returns information about DNSSEC for a specific hosted zone, including the key signing keys (KSKs) and zone signing keys (ZSKs) in the hosted zone.
|
|
241
|
+
*/
|
|
242
|
+
getDNSSEC(params: Route53.Types.GetDNSSECRequest, callback?: (err: AWSError, data: Route53.Types.GetDNSSECResponse) => void): Request<Route53.Types.GetDNSSECResponse, AWSError>;
|
|
243
|
+
/**
|
|
244
|
+
* Returns information about DNSSEC for a specific hosted zone, including the key signing keys (KSKs) and zone signing keys (ZSKs) in the hosted zone.
|
|
245
|
+
*/
|
|
246
|
+
getDNSSEC(callback?: (err: AWSError, data: Route53.Types.GetDNSSECResponse) => void): Request<Route53.Types.GetDNSSECResponse, AWSError>;
|
|
191
247
|
/**
|
|
192
248
|
* Gets information about whether a specified geographic location is supported for Amazon Route 53 geolocation resource record sets. Use the following syntax to determine whether a continent is supported for geolocation: GET /2013-04-01/geolocation?continentcode=two-letter abbreviation for a continent Use the following syntax to determine whether a country is supported for geolocation: GET /2013-04-01/geolocation?countrycode=two-character country code Use the following syntax to determine whether a subdivision of a country is supported for geolocation: GET /2013-04-01/geolocation?countrycode=two-character country code&subdivisioncode=subdivision code
|
|
193
249
|
*/
|
|
@@ -490,6 +546,19 @@ declare namespace Route53 {
|
|
|
490
546
|
Value: LimitValue;
|
|
491
547
|
}
|
|
492
548
|
export type AccountLimitType = "MAX_HEALTH_CHECKS_BY_OWNER"|"MAX_HOSTED_ZONES_BY_OWNER"|"MAX_TRAFFIC_POLICY_INSTANCES_BY_OWNER"|"MAX_REUSABLE_DELEGATION_SETS_BY_OWNER"|"MAX_TRAFFIC_POLICIES_BY_OWNER"|string;
|
|
549
|
+
export interface ActivateKeySigningKeyRequest {
|
|
550
|
+
/**
|
|
551
|
+
* A unique string used to identify a hosted zone.
|
|
552
|
+
*/
|
|
553
|
+
HostedZoneId: ResourceId;
|
|
554
|
+
/**
|
|
555
|
+
* An alphanumeric string used to identify a key signing key (KSK).
|
|
556
|
+
*/
|
|
557
|
+
Name: SigningKeyName;
|
|
558
|
+
}
|
|
559
|
+
export interface ActivateKeySigningKeyResponse {
|
|
560
|
+
ChangeInfo: ChangeInfo;
|
|
561
|
+
}
|
|
493
562
|
export interface AlarmIdentifier {
|
|
494
563
|
/**
|
|
495
564
|
* For the CloudWatch alarm that you want Route 53 health checkers to use to determine whether this health check is healthy, the region that the alarm was created in. For the current list of CloudWatch regions, see Amazon CloudWatch in the AWS Service Endpoints chapter of the Amazon Web Services General Reference.
|
|
@@ -717,6 +786,39 @@ declare namespace Route53 {
|
|
|
717
786
|
*/
|
|
718
787
|
Location: ResourceURI;
|
|
719
788
|
}
|
|
789
|
+
export interface CreateKeySigningKeyRequest {
|
|
790
|
+
/**
|
|
791
|
+
* A unique string that identifies the request.
|
|
792
|
+
*/
|
|
793
|
+
CallerReference: Nonce;
|
|
794
|
+
/**
|
|
795
|
+
* The unique string (ID) used to identify a hosted zone.
|
|
796
|
+
*/
|
|
797
|
+
HostedZoneId: ResourceId;
|
|
798
|
+
/**
|
|
799
|
+
* The Amazon resource name (ARN) for a customer managed key (CMK) in AWS Key Management Service (KMS). The KeyManagementServiceArn must be unique for each key signing key (KSK) in a single hosted zone. To see an example of KeyManagementServiceArn that grants the correct permissions for DNSSEC, scroll down to Example. You must configure the CMK as follows: Status Enabled Key spec ECC_NIST_P256 Key usage Sign and verify Key policy The key policy must give permission for the following actions: DescribeKey GetPublicKey Sign The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following: "Service": "api-service.dnssec.route53.aws.internal" For more information about working with CMK in KMS, see AWS Key Management Service concepts.
|
|
800
|
+
*/
|
|
801
|
+
KeyManagementServiceArn: SigningKeyString;
|
|
802
|
+
/**
|
|
803
|
+
* An alphanumeric string used to identify a key signing key (KSK). Name must be unique for each key signing key in the same hosted zone.
|
|
804
|
+
*/
|
|
805
|
+
Name: SigningKeyName;
|
|
806
|
+
/**
|
|
807
|
+
* A string specifying the initial status of the key signing key (KSK). You can set the value to ACTIVE or INACTIVE.
|
|
808
|
+
*/
|
|
809
|
+
Status: SigningKeyStatus;
|
|
810
|
+
}
|
|
811
|
+
export interface CreateKeySigningKeyResponse {
|
|
812
|
+
ChangeInfo: ChangeInfo;
|
|
813
|
+
/**
|
|
814
|
+
* The key signing key (KSK) that the request creates.
|
|
815
|
+
*/
|
|
816
|
+
KeySigningKey: KeySigningKey;
|
|
817
|
+
/**
|
|
818
|
+
* The unique URL representing the new key signing key (KSK).
|
|
819
|
+
*/
|
|
820
|
+
Location: ResourceURI;
|
|
821
|
+
}
|
|
720
822
|
export interface CreateQueryLoggingConfigRequest {
|
|
721
823
|
/**
|
|
722
824
|
* The ID of the hosted zone that you want to log queries for. You can log queries only for public hosted zones.
|
|
@@ -859,6 +961,29 @@ declare namespace Route53 {
|
|
|
859
961
|
}
|
|
860
962
|
export type DNSName = string;
|
|
861
963
|
export type DNSRCode = string;
|
|
964
|
+
export interface DNSSECStatus {
|
|
965
|
+
/**
|
|
966
|
+
* Indicates your hosted zone signging status: SIGNING, NOT_SIGNING, or INTERNAL_FAILURE. If the status is INTERNAL_FAILURE, see StatusMessage for information about steps that you can take to correct the problem. A status INTERNAL_FAILURE means there was an error during a request. Before you can continue to work with DNSSEC signing, including working with key signing keys (KSKs), you must correct the problem by enabling or disabling DNSSEC signing for the hosted zone.
|
|
967
|
+
*/
|
|
968
|
+
ServeSignature?: ServeSignature;
|
|
969
|
+
/**
|
|
970
|
+
* The status message provided for the following DNSSEC signing status: INTERNAL_FAILURE. The status message includes information about what the problem might be and steps that you can take to correct the issue.
|
|
971
|
+
*/
|
|
972
|
+
StatusMessage?: SigningKeyStatusMessage;
|
|
973
|
+
}
|
|
974
|
+
export interface DeactivateKeySigningKeyRequest {
|
|
975
|
+
/**
|
|
976
|
+
* A unique string used to identify a hosted zone.
|
|
977
|
+
*/
|
|
978
|
+
HostedZoneId: ResourceId;
|
|
979
|
+
/**
|
|
980
|
+
* An alphanumeric string used to identify a key signing key (KSK).
|
|
981
|
+
*/
|
|
982
|
+
Name: SigningKeyName;
|
|
983
|
+
}
|
|
984
|
+
export interface DeactivateKeySigningKeyResponse {
|
|
985
|
+
ChangeInfo: ChangeInfo;
|
|
986
|
+
}
|
|
862
987
|
export interface DelegationSet {
|
|
863
988
|
/**
|
|
864
989
|
* The ID that Amazon Route 53 assigns to a reusable delegation set.
|
|
@@ -895,6 +1020,19 @@ declare namespace Route53 {
|
|
|
895
1020
|
*/
|
|
896
1021
|
ChangeInfo: ChangeInfo;
|
|
897
1022
|
}
|
|
1023
|
+
export interface DeleteKeySigningKeyRequest {
|
|
1024
|
+
/**
|
|
1025
|
+
* A unique string used to identify a hosted zone.
|
|
1026
|
+
*/
|
|
1027
|
+
HostedZoneId: ResourceId;
|
|
1028
|
+
/**
|
|
1029
|
+
* An alphanumeric string used to identify a key signing key (KSK).
|
|
1030
|
+
*/
|
|
1031
|
+
Name: SigningKeyName;
|
|
1032
|
+
}
|
|
1033
|
+
export interface DeleteKeySigningKeyResponse {
|
|
1034
|
+
ChangeInfo: ChangeInfo;
|
|
1035
|
+
}
|
|
898
1036
|
export interface DeleteQueryLoggingConfigRequest {
|
|
899
1037
|
/**
|
|
900
1038
|
* The ID of the configuration that you want to delete.
|
|
@@ -955,6 +1093,15 @@ declare namespace Route53 {
|
|
|
955
1093
|
}
|
|
956
1094
|
export type DimensionField = string;
|
|
957
1095
|
export type DimensionList = Dimension[];
|
|
1096
|
+
export interface DisableHostedZoneDNSSECRequest {
|
|
1097
|
+
/**
|
|
1098
|
+
* A unique string used to identify a hosted zone.
|
|
1099
|
+
*/
|
|
1100
|
+
HostedZoneId: ResourceId;
|
|
1101
|
+
}
|
|
1102
|
+
export interface DisableHostedZoneDNSSECResponse {
|
|
1103
|
+
ChangeInfo: ChangeInfo;
|
|
1104
|
+
}
|
|
958
1105
|
export type Disabled = boolean;
|
|
959
1106
|
export type DisassociateVPCComment = string;
|
|
960
1107
|
export interface DisassociateVPCFromHostedZoneRequest {
|
|
@@ -977,6 +1124,15 @@ declare namespace Route53 {
|
|
|
977
1124
|
*/
|
|
978
1125
|
ChangeInfo: ChangeInfo;
|
|
979
1126
|
}
|
|
1127
|
+
export interface EnableHostedZoneDNSSECRequest {
|
|
1128
|
+
/**
|
|
1129
|
+
* A unique string used to identify a hosted zone.
|
|
1130
|
+
*/
|
|
1131
|
+
HostedZoneId: ResourceId;
|
|
1132
|
+
}
|
|
1133
|
+
export interface EnableHostedZoneDNSSECResponse {
|
|
1134
|
+
ChangeInfo: ChangeInfo;
|
|
1135
|
+
}
|
|
980
1136
|
export type EnableSNI = boolean;
|
|
981
1137
|
export type EvaluationPeriods = number;
|
|
982
1138
|
export type FailureThreshold = number;
|
|
@@ -1064,6 +1220,22 @@ declare namespace Route53 {
|
|
|
1064
1220
|
*/
|
|
1065
1221
|
CheckerIpRanges: CheckerIpRanges;
|
|
1066
1222
|
}
|
|
1223
|
+
export interface GetDNSSECRequest {
|
|
1224
|
+
/**
|
|
1225
|
+
* A unique string used to identify a hosted zone.
|
|
1226
|
+
*/
|
|
1227
|
+
HostedZoneId: ResourceId;
|
|
1228
|
+
}
|
|
1229
|
+
export interface GetDNSSECResponse {
|
|
1230
|
+
/**
|
|
1231
|
+
* A string repesenting the status of DNSSEC.
|
|
1232
|
+
*/
|
|
1233
|
+
Status: DNSSECStatus;
|
|
1234
|
+
/**
|
|
1235
|
+
* The key signing keys (KSKs) in your account.
|
|
1236
|
+
*/
|
|
1237
|
+
KeySigningKeys: KeySigningKeys;
|
|
1238
|
+
}
|
|
1067
1239
|
export interface GetGeoLocationRequest {
|
|
1068
1240
|
/**
|
|
1069
1241
|
* For geolocation resource record sets, a two-letter abbreviation that identifies a continent. Amazon Route 53 supports the following continent codes: AF: Africa AN: Antarctica AS: Asia EU: Europe OC: Oceania NA: North America SA: South America
|
|
@@ -1457,6 +1629,73 @@ declare namespace Route53 {
|
|
|
1457
1629
|
export type InsufficientDataHealthStatus = "Healthy"|"Unhealthy"|"LastKnownStatus"|string;
|
|
1458
1630
|
export type Inverted = boolean;
|
|
1459
1631
|
export type IsPrivateZone = boolean;
|
|
1632
|
+
export interface KeySigningKey {
|
|
1633
|
+
/**
|
|
1634
|
+
* An alphanumeric string used to identify a key signing key (KSK). Name must be unique for each key signing key in the same hosted zone.
|
|
1635
|
+
*/
|
|
1636
|
+
Name?: SigningKeyName;
|
|
1637
|
+
/**
|
|
1638
|
+
* The Amazon resource name (ARN) used to identify the customer managed key (CMK) in AWS Key Management Service (KMS). The KmsArn must be unique for each key signing key (KSK) in a single hosted zone. You must configure the CMK as follows: Status Enabled Key spec ECC_NIST_P256 Key usage Sign and verify Key policy The key policy must give permission for the following actions: DescribeKey GetPublicKey Sign The key policy must also include the Amazon Route 53 service in the principal for your account. Specify the following: "Service": "api-service.dnssec.route53.aws.internal" For more information about working with the customer managed key (CMK) in KMS, see AWS Key Management Service concepts.
|
|
1639
|
+
*/
|
|
1640
|
+
KmsArn?: SigningKeyString;
|
|
1641
|
+
/**
|
|
1642
|
+
* An integer that specifies how the key is used. For key signing key (KSK), this value is always 257.
|
|
1643
|
+
*/
|
|
1644
|
+
Flag?: SigningKeyInteger;
|
|
1645
|
+
/**
|
|
1646
|
+
* A string used to represent the signing algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.1.
|
|
1647
|
+
*/
|
|
1648
|
+
SigningAlgorithmMnemonic?: SigningKeyString;
|
|
1649
|
+
/**
|
|
1650
|
+
* An integer used to represent the signing algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.1.
|
|
1651
|
+
*/
|
|
1652
|
+
SigningAlgorithmType?: SigningKeyInteger;
|
|
1653
|
+
/**
|
|
1654
|
+
* A string used to represent the delegation signer digest algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.3.
|
|
1655
|
+
*/
|
|
1656
|
+
DigestAlgorithmMnemonic?: SigningKeyString;
|
|
1657
|
+
/**
|
|
1658
|
+
* An integer used to represent the delegation signer digest algorithm. This value must follow the guidelines provided by RFC-8624 Section 3.3.
|
|
1659
|
+
*/
|
|
1660
|
+
DigestAlgorithmType?: SigningKeyInteger;
|
|
1661
|
+
/**
|
|
1662
|
+
* An integer used to identify the DNSSEC record for the domain name. The process used to calculate the value is described in RFC-4034 Appendix B.
|
|
1663
|
+
*/
|
|
1664
|
+
KeyTag?: SigningKeyTag;
|
|
1665
|
+
/**
|
|
1666
|
+
* A cryptographic digest of a DNSKEY resource record (RR). DNSKEY records are used to publish the public key that resolvers can use to verify DNSSEC signatures that are used to secure certain kinds of information provided by the DNS system.
|
|
1667
|
+
*/
|
|
1668
|
+
DigestValue?: SigningKeyString;
|
|
1669
|
+
/**
|
|
1670
|
+
* The public key, represented as a Base64 encoding, as required by RFC-4034 Page 5.
|
|
1671
|
+
*/
|
|
1672
|
+
PublicKey?: SigningKeyString;
|
|
1673
|
+
/**
|
|
1674
|
+
* A string that represents a delegation signer (DS) record.
|
|
1675
|
+
*/
|
|
1676
|
+
DSRecord?: SigningKeyString;
|
|
1677
|
+
/**
|
|
1678
|
+
* A string that represents a DNSKEY record.
|
|
1679
|
+
*/
|
|
1680
|
+
DNSKEYRecord?: SigningKeyString;
|
|
1681
|
+
/**
|
|
1682
|
+
* A string that represents the current key signing key (KSK) status. Status can have one of the following values: ACTIVE The KSK is being used for signing. INACTIVE The KSK is not being used for signing. ACTION_NEEDED There is an error in the KSK that requires you to take action to resolve. INTERNAL_FAILURE There was an error during a request. Before you can continue to work with DNSSEC signing, including actions that involve this KSK, you must correct the problem. For example, you may need to activate or deactivate the KSK.
|
|
1683
|
+
*/
|
|
1684
|
+
Status?: SigningKeyStatus;
|
|
1685
|
+
/**
|
|
1686
|
+
* The status message provided for the following key signing key (KSK) statuses: ACTION_NEEDED or INTERNAL_FAILURE. The status message includes information about what the problem might be and steps that you can take to correct the issue.
|
|
1687
|
+
*/
|
|
1688
|
+
StatusMessage?: SigningKeyStatusMessage;
|
|
1689
|
+
/**
|
|
1690
|
+
* The date when the key signing key (KSK) was created.
|
|
1691
|
+
*/
|
|
1692
|
+
CreatedDate?: TimeStamp;
|
|
1693
|
+
/**
|
|
1694
|
+
* The last time that the key signing key (KSK) was changed.
|
|
1695
|
+
*/
|
|
1696
|
+
LastModifiedDate?: TimeStamp;
|
|
1697
|
+
}
|
|
1698
|
+
export type KeySigningKeys = KeySigningKey[];
|
|
1460
1699
|
export type LimitValue = number;
|
|
1461
1700
|
export interface LinkedService {
|
|
1462
1701
|
/**
|
|
@@ -2046,7 +2285,7 @@ declare namespace Route53 {
|
|
|
2046
2285
|
export type QueryLoggingConfigId = string;
|
|
2047
2286
|
export type QueryLoggingConfigs = QueryLoggingConfig[];
|
|
2048
2287
|
export type RData = string;
|
|
2049
|
-
export type RRType = "SOA"|"A"|"TXT"|"NS"|"CNAME"|"MX"|"NAPTR"|"PTR"|"SRV"|"SPF"|"AAAA"|"CAA"|string;
|
|
2288
|
+
export type RRType = "SOA"|"A"|"TXT"|"NS"|"CNAME"|"MX"|"NAPTR"|"PTR"|"SRV"|"SPF"|"AAAA"|"CAA"|"DS"|string;
|
|
2050
2289
|
export type RecordData = RecordDataEntry[];
|
|
2051
2290
|
export type RecordDataEntry = string;
|
|
2052
2291
|
export type RequestInterval = number;
|
|
@@ -2150,7 +2389,14 @@ declare namespace Route53 {
|
|
|
2150
2389
|
}
|
|
2151
2390
|
export type ReusableDelegationSetLimitType = "MAX_ZONES_BY_REUSABLE_DELEGATION_SET"|string;
|
|
2152
2391
|
export type SearchString = string;
|
|
2392
|
+
export type ServeSignature = string;
|
|
2153
2393
|
export type ServicePrincipal = string;
|
|
2394
|
+
export type SigningKeyInteger = number;
|
|
2395
|
+
export type SigningKeyName = string;
|
|
2396
|
+
export type SigningKeyStatus = string;
|
|
2397
|
+
export type SigningKeyStatusMessage = string;
|
|
2398
|
+
export type SigningKeyString = string;
|
|
2399
|
+
export type SigningKeyTag = number;
|
|
2154
2400
|
export type Statistic = "Average"|"Sum"|"SampleCount"|"Maximum"|"Minimum"|string;
|
|
2155
2401
|
export type Status = string;
|
|
2156
2402
|
export interface StatusReport {
|
|
@@ -107,6 +107,14 @@ declare class Route53Resolver extends Service {
|
|
|
107
107
|
* Removes the association between a specified Resolver rule and a specified VPC. If you disassociate a Resolver rule from a VPC, Resolver stops forwarding DNS queries for the domain name that you specified in the Resolver rule.
|
|
108
108
|
*/
|
|
109
109
|
disassociateResolverRule(callback?: (err: AWSError, data: Route53Resolver.Types.DisassociateResolverRuleResponse) => void): Request<Route53Resolver.Types.DisassociateResolverRuleResponse, AWSError>;
|
|
110
|
+
/**
|
|
111
|
+
* Gets DNSSEC validation information for a specified resource.
|
|
112
|
+
*/
|
|
113
|
+
getResolverDnssecConfig(params: Route53Resolver.Types.GetResolverDnssecConfigRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverDnssecConfigResponse) => void): Request<Route53Resolver.Types.GetResolverDnssecConfigResponse, AWSError>;
|
|
114
|
+
/**
|
|
115
|
+
* Gets DNSSEC validation information for a specified resource.
|
|
116
|
+
*/
|
|
117
|
+
getResolverDnssecConfig(callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverDnssecConfigResponse) => void): Request<Route53Resolver.Types.GetResolverDnssecConfigResponse, AWSError>;
|
|
110
118
|
/**
|
|
111
119
|
* Gets information about a specified Resolver endpoint, such as whether it's an inbound or an outbound Resolver endpoint, and the current status of the endpoint.
|
|
112
120
|
*/
|
|
@@ -156,13 +164,21 @@ declare class Route53Resolver extends Service {
|
|
|
156
164
|
*/
|
|
157
165
|
getResolverRuleAssociation(callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverRuleAssociationResponse) => void): Request<Route53Resolver.Types.GetResolverRuleAssociationResponse, AWSError>;
|
|
158
166
|
/**
|
|
159
|
-
* Gets information about
|
|
167
|
+
* Gets information about the Resolver rule policy for a specified rule. A Resolver rule policy includes the rule that you want to share with another account, the account that you want to share the rule with, and the Resolver operations that you want to allow the account to use.
|
|
160
168
|
*/
|
|
161
169
|
getResolverRulePolicy(params: Route53Resolver.Types.GetResolverRulePolicyRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverRulePolicyResponse) => void): Request<Route53Resolver.Types.GetResolverRulePolicyResponse, AWSError>;
|
|
162
170
|
/**
|
|
163
|
-
* Gets information about
|
|
171
|
+
* Gets information about the Resolver rule policy for a specified rule. A Resolver rule policy includes the rule that you want to share with another account, the account that you want to share the rule with, and the Resolver operations that you want to allow the account to use.
|
|
164
172
|
*/
|
|
165
173
|
getResolverRulePolicy(callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverRulePolicyResponse) => void): Request<Route53Resolver.Types.GetResolverRulePolicyResponse, AWSError>;
|
|
174
|
+
/**
|
|
175
|
+
* Lists the configurations for DNSSEC validation that are associated with the current AWS account.
|
|
176
|
+
*/
|
|
177
|
+
listResolverDnssecConfigs(params: Route53Resolver.Types.ListResolverDnssecConfigsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListResolverDnssecConfigsResponse) => void): Request<Route53Resolver.Types.ListResolverDnssecConfigsResponse, AWSError>;
|
|
178
|
+
/**
|
|
179
|
+
* Lists the configurations for DNSSEC validation that are associated with the current AWS account.
|
|
180
|
+
*/
|
|
181
|
+
listResolverDnssecConfigs(callback?: (err: AWSError, data: Route53Resolver.Types.ListResolverDnssecConfigsResponse) => void): Request<Route53Resolver.Types.ListResolverDnssecConfigsResponse, AWSError>;
|
|
166
182
|
/**
|
|
167
183
|
* Gets the IP addresses for a specified Resolver endpoint.
|
|
168
184
|
*/
|
|
@@ -228,11 +244,11 @@ declare class Route53Resolver extends Service {
|
|
|
228
244
|
*/
|
|
229
245
|
putResolverQueryLogConfigPolicy(callback?: (err: AWSError, data: Route53Resolver.Types.PutResolverQueryLogConfigPolicyResponse) => void): Request<Route53Resolver.Types.PutResolverQueryLogConfigPolicyResponse, AWSError>;
|
|
230
246
|
/**
|
|
231
|
-
* Specifies an AWS
|
|
247
|
+
* Specifies an AWS rule that you want to share with another account, the account that you want to share the rule with, and the operations that you want the account to be able to perform on the rule.
|
|
232
248
|
*/
|
|
233
249
|
putResolverRulePolicy(params: Route53Resolver.Types.PutResolverRulePolicyRequest, callback?: (err: AWSError, data: Route53Resolver.Types.PutResolverRulePolicyResponse) => void): Request<Route53Resolver.Types.PutResolverRulePolicyResponse, AWSError>;
|
|
234
250
|
/**
|
|
235
|
-
* Specifies an AWS
|
|
251
|
+
* Specifies an AWS rule that you want to share with another account, the account that you want to share the rule with, and the operations that you want the account to be able to perform on the rule.
|
|
236
252
|
*/
|
|
237
253
|
putResolverRulePolicy(callback?: (err: AWSError, data: Route53Resolver.Types.PutResolverRulePolicyResponse) => void): Request<Route53Resolver.Types.PutResolverRulePolicyResponse, AWSError>;
|
|
238
254
|
/**
|
|
@@ -251,6 +267,14 @@ declare class Route53Resolver extends Service {
|
|
|
251
267
|
* Removes one or more tags from a specified resource.
|
|
252
268
|
*/
|
|
253
269
|
untagResource(callback?: (err: AWSError, data: Route53Resolver.Types.UntagResourceResponse) => void): Request<Route53Resolver.Types.UntagResourceResponse, AWSError>;
|
|
270
|
+
/**
|
|
271
|
+
* Updates an existing DNSSEC validation configuration. If there is no existing DNSSEC validation configuration, one is created.
|
|
272
|
+
*/
|
|
273
|
+
updateResolverDnssecConfig(params: Route53Resolver.Types.UpdateResolverDnssecConfigRequest, callback?: (err: AWSError, data: Route53Resolver.Types.UpdateResolverDnssecConfigResponse) => void): Request<Route53Resolver.Types.UpdateResolverDnssecConfigResponse, AWSError>;
|
|
274
|
+
/**
|
|
275
|
+
* Updates an existing DNSSEC validation configuration. If there is no existing DNSSEC validation configuration, one is created.
|
|
276
|
+
*/
|
|
277
|
+
updateResolverDnssecConfig(callback?: (err: AWSError, data: Route53Resolver.Types.UpdateResolverDnssecConfigResponse) => void): Request<Route53Resolver.Types.UpdateResolverDnssecConfigResponse, AWSError>;
|
|
254
278
|
/**
|
|
255
279
|
* Updates the name of an inbound or an outbound Resolver endpoint.
|
|
256
280
|
*/
|
|
@@ -518,6 +542,18 @@ declare namespace Route53Resolver {
|
|
|
518
542
|
export type FilterValue = string;
|
|
519
543
|
export type FilterValues = FilterValue[];
|
|
520
544
|
export type Filters = Filter[];
|
|
545
|
+
export interface GetResolverDnssecConfigRequest {
|
|
546
|
+
/**
|
|
547
|
+
* The ID of the virtual private cloud (VPC) for the DNSSEC validation status.
|
|
548
|
+
*/
|
|
549
|
+
ResourceId: ResourceId;
|
|
550
|
+
}
|
|
551
|
+
export interface GetResolverDnssecConfigResponse {
|
|
552
|
+
/**
|
|
553
|
+
* The information about a configuration for DNSSEC validation.
|
|
554
|
+
*/
|
|
555
|
+
ResolverDNSSECConfig?: ResolverDnssecConfig;
|
|
556
|
+
}
|
|
521
557
|
export interface GetResolverEndpointRequest {
|
|
522
558
|
/**
|
|
523
559
|
* The ID of the Resolver endpoint that you want to get information about.
|
|
@@ -580,13 +616,13 @@ declare namespace Route53Resolver {
|
|
|
580
616
|
}
|
|
581
617
|
export interface GetResolverRulePolicyRequest {
|
|
582
618
|
/**
|
|
583
|
-
* The ID of the Resolver rule
|
|
619
|
+
* The ID of the Resolver rule that you want to get the Resolver rule policy for.
|
|
584
620
|
*/
|
|
585
621
|
Arn: Arn;
|
|
586
622
|
}
|
|
587
623
|
export interface GetResolverRulePolicyResponse {
|
|
588
624
|
/**
|
|
589
|
-
*
|
|
625
|
+
* The Resolver rule policy for the rule that you specified in a GetResolverRulePolicy request.
|
|
590
626
|
*/
|
|
591
627
|
ResolverRulePolicy?: ResolverRulePolicy;
|
|
592
628
|
}
|
|
@@ -661,6 +697,30 @@ declare namespace Route53Resolver {
|
|
|
661
697
|
}
|
|
662
698
|
export type IpAddressesRequest = IpAddressRequest[];
|
|
663
699
|
export type IpAddressesResponse = IpAddressResponse[];
|
|
700
|
+
export interface ListResolverDnssecConfigsRequest {
|
|
701
|
+
/**
|
|
702
|
+
* Optional: An integer that specifies the maximum number of DNSSEC configuration results that you want Amazon Route 53 to return. If you don't specify a value for MaxResults, Route 53 returns up to 100 configuration per page.
|
|
703
|
+
*/
|
|
704
|
+
MaxResults?: MaxResults;
|
|
705
|
+
/**
|
|
706
|
+
* (Optional) If the current AWS account has more than MaxResults DNSSEC configurations, use NextToken to get the second and subsequent pages of results. For the first ListResolverDnssecConfigs request, omit this value. For the second and subsequent requests, get the value of NextToken from the previous response and specify that value for NextToken in the request.
|
|
707
|
+
*/
|
|
708
|
+
NextToken?: NextToken;
|
|
709
|
+
/**
|
|
710
|
+
* An optional specification to return a subset of objects.
|
|
711
|
+
*/
|
|
712
|
+
Filters?: Filters;
|
|
713
|
+
}
|
|
714
|
+
export interface ListResolverDnssecConfigsResponse {
|
|
715
|
+
/**
|
|
716
|
+
* If a response includes the last of the DNSSEC configurations that are associated with the current AWS account, NextToken doesn't appear in the response. If a response doesn't include the last of the configurations, you can get more configurations by submitting another ListResolverDnssecConfigs request. Get the value of NextToken that Amazon Route 53 returned in the previous response and include it in NextToken in the next request.
|
|
717
|
+
*/
|
|
718
|
+
NextToken?: NextToken;
|
|
719
|
+
/**
|
|
720
|
+
* An array that contains one ResolverDnssecConfig element for each configuration for DNSSEC validation that is associated with the current AWS account.
|
|
721
|
+
*/
|
|
722
|
+
ResolverDnssecConfigs?: ResolverDnssecConfigList;
|
|
723
|
+
}
|
|
664
724
|
export interface ListResolverEndpointIpAddressesRequest {
|
|
665
725
|
/**
|
|
666
726
|
* The ID of the Resolver endpoint that you want to get IP addresses for.
|
|
@@ -899,11 +959,11 @@ declare namespace Route53Resolver {
|
|
|
899
959
|
}
|
|
900
960
|
export interface PutResolverRulePolicyRequest {
|
|
901
961
|
/**
|
|
902
|
-
* The Amazon Resource Name (ARN) of the
|
|
962
|
+
* The Amazon Resource Name (ARN) of the rule that you want to share with another account.
|
|
903
963
|
*/
|
|
904
964
|
Arn: Arn;
|
|
905
965
|
/**
|
|
906
|
-
* An AWS Identity and Access Management policy statement that lists the rules that you want to share with another AWS account and the operations that you want the account to be able to perform. You can specify the following operations in the
|
|
966
|
+
* An AWS Identity and Access Management policy statement that lists the rules that you want to share with another AWS account and the operations that you want the account to be able to perform. You can specify the following operations in the Action section of the statement: route53resolver:GetResolverRule route53resolver:AssociateResolverRule route53resolver:DisassociateResolverRule route53resolver:ListResolverRules route53resolver:ListResolverRuleAssociations In the Resource section of the statement, specify the ARN for the rule that you want to share with another account. Specify the same ARN that you specified in Arn.
|
|
907
967
|
*/
|
|
908
968
|
ResolverRulePolicy: ResolverRulePolicy;
|
|
909
969
|
}
|
|
@@ -913,6 +973,26 @@ declare namespace Route53Resolver {
|
|
|
913
973
|
*/
|
|
914
974
|
ReturnValue?: Boolean;
|
|
915
975
|
}
|
|
976
|
+
export type ResolverDNSSECValidationStatus = "ENABLING"|"ENABLED"|"DISABLING"|"DISABLED"|string;
|
|
977
|
+
export interface ResolverDnssecConfig {
|
|
978
|
+
/**
|
|
979
|
+
* The ID for a configuration for DNSSEC validation.
|
|
980
|
+
*/
|
|
981
|
+
Id?: ResourceId;
|
|
982
|
+
/**
|
|
983
|
+
* The owner account ID of the virtual private cloud (VPC) for a configuration for DNSSEC validation.
|
|
984
|
+
*/
|
|
985
|
+
OwnerId?: AccountId;
|
|
986
|
+
/**
|
|
987
|
+
* The ID of the virtual private cloud (VPC) that you're configuring the DNSSEC validation status for.
|
|
988
|
+
*/
|
|
989
|
+
ResourceId?: ResourceId;
|
|
990
|
+
/**
|
|
991
|
+
* The validation status for a DNSSEC configuration. The status can be one of the following: ENABLING: DNSSEC validation is being enabled but is not complete. ENABLED: DNSSEC validation is enabled. DISABLING: DNSSEC validation is being disabled but is not complete. DISABLED DNSSEC validation is disabled.
|
|
992
|
+
*/
|
|
993
|
+
ValidationStatus?: ResolverDNSSECValidationStatus;
|
|
994
|
+
}
|
|
995
|
+
export type ResolverDnssecConfigList = ResolverDnssecConfig[];
|
|
916
996
|
export interface ResolverEndpoint {
|
|
917
997
|
/**
|
|
918
998
|
* The ID of the Resolver endpoint.
|
|
@@ -1207,6 +1287,22 @@ declare namespace Route53Resolver {
|
|
|
1207
1287
|
}
|
|
1208
1288
|
export interface UntagResourceResponse {
|
|
1209
1289
|
}
|
|
1290
|
+
export interface UpdateResolverDnssecConfigRequest {
|
|
1291
|
+
/**
|
|
1292
|
+
* The ID of the virtual private cloud (VPC) that you're updating the DNSSEC validation status for.
|
|
1293
|
+
*/
|
|
1294
|
+
ResourceId: ResourceId;
|
|
1295
|
+
/**
|
|
1296
|
+
* The new value that you are specifying for DNSSEC validation for the VPC. The value can be ENABLE or DISABLE. Be aware that it can take time for a validation status change to be completed.
|
|
1297
|
+
*/
|
|
1298
|
+
Validation: Validation;
|
|
1299
|
+
}
|
|
1300
|
+
export interface UpdateResolverDnssecConfigResponse {
|
|
1301
|
+
/**
|
|
1302
|
+
* A complex type that contains settings for the specified DNSSEC configuration.
|
|
1303
|
+
*/
|
|
1304
|
+
ResolverDNSSECConfig?: ResolverDnssecConfig;
|
|
1305
|
+
}
|
|
1210
1306
|
export interface UpdateResolverEndpointRequest {
|
|
1211
1307
|
/**
|
|
1212
1308
|
* The ID of the Resolver endpoint that you want to update.
|
|
@@ -1239,6 +1335,7 @@ declare namespace Route53Resolver {
|
|
|
1239
1335
|
*/
|
|
1240
1336
|
ResolverRule?: ResolverRule;
|
|
1241
1337
|
}
|
|
1338
|
+
export type Validation = "ENABLE"|"DISABLE"|string;
|
|
1242
1339
|
/**
|
|
1243
1340
|
* A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
|
|
1244
1341
|
*/
|