aws-sdk 2.875.0 → 2.879.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (90) hide show
  1. package/CHANGELOG.md +47 -1
  2. package/README.md +1 -1
  3. package/apis/batch-2016-08-10.min.json +74 -53
  4. package/apis/cloud9-2017-09-23.examples.json +1 -1
  5. package/apis/cloud9-2017-09-23.min.json +48 -14
  6. package/apis/cloudformation-2010-05-15.min.json +50 -48
  7. package/apis/cloudhsm-2014-05-30.min.json +18 -51
  8. package/apis/cognito-sync-2014-06-30.examples.json +5 -0
  9. package/apis/cognito-sync-2014-06-30.min.json +2 -3
  10. package/apis/cognito-sync-2014-06-30.paginators.json +4 -0
  11. package/apis/comprehend-2017-11-27.min.json +12 -6
  12. package/apis/config-2014-11-12.min.json +238 -128
  13. package/apis/databrew-2017-07-25.min.json +154 -60
  14. package/apis/datapipeline-2012-10-29.examples.json +5 -0
  15. package/apis/datapipeline-2012-10-29.min.json +1 -1
  16. package/apis/datapipeline-2012-10-29.paginators.json +10 -10
  17. package/apis/detective-2018-10-26.min.json +114 -18
  18. package/apis/directconnect-2012-10-25.min.json +151 -52
  19. package/apis/ec2-2016-11-15.min.json +831 -625
  20. package/apis/ec2-2016-11-15.paginators.json +6 -0
  21. package/apis/ec2-2016-11-15.waiters2.json +1 -1
  22. package/apis/ec2-instance-connect-2018-04-02.min.json +25 -0
  23. package/apis/fms-2018-01-01.min.json +41 -7
  24. package/apis/frauddetector-2019-11-15.min.json +158 -54
  25. package/apis/frauddetector-2019-11-15.paginators.json +5 -0
  26. package/apis/imagebuilder-2019-12-02.min.json +141 -111
  27. package/apis/iot-2015-05-28.min.json +20 -15
  28. package/apis/iotwireless-2020-11-22.min.json +43 -2
  29. package/apis/kendra-2019-02-03.min.json +38 -36
  30. package/apis/lightsail-2016-11-28.min.json +121 -114
  31. package/apis/machinelearning-2014-12-12.examples.json +5 -0
  32. package/apis/machinelearning-2014-12-12.min.json +3 -4
  33. package/apis/machinelearning-2014-12-12.paginators.json +5 -5
  34. package/apis/mediaconvert-2017-08-29.min.json +122 -83
  35. package/apis/mediapackage-2017-10-12.min.json +64 -48
  36. package/apis/monitoring-2010-08-01.min.json +208 -38
  37. package/apis/monitoring-2010-08-01.paginators.json +5 -0
  38. package/apis/pinpoint-2016-12-01.min.json +15 -2
  39. package/apis/pricing-2017-10-15.examples.json +1 -0
  40. package/apis/redshift-2012-12-01.min.json +398 -191
  41. package/apis/route53resolver-2018-04-01.min.json +791 -89
  42. package/apis/route53resolver-2018-04-01.paginators.json +36 -0
  43. package/apis/runtime.lex-2016-11-28.min.json +29 -3
  44. package/apis/sagemaker-2017-07-24.min.json +141 -112
  45. package/apis/wafv2-2019-07-29.min.json +196 -89
  46. package/apis/workmail-2017-10-01.min.json +247 -30
  47. package/clients/batch.d.ts +41 -3
  48. package/clients/cloud9.d.ts +22 -12
  49. package/clients/cloudformation.d.ts +4 -0
  50. package/clients/cloudwatch.d.ts +222 -3
  51. package/clients/cognitosync.d.ts +20 -20
  52. package/clients/cognitosync.js +1 -0
  53. package/clients/comprehend.d.ts +24 -0
  54. package/clients/configservice.d.ts +182 -10
  55. package/clients/databrew.d.ts +145 -25
  56. package/clients/detective.d.ts +74 -0
  57. package/clients/directconnect.d.ts +161 -2
  58. package/clients/ec2.d.ts +239 -14
  59. package/clients/ec2instanceconnect.d.ts +41 -8
  60. package/clients/fms.d.ts +63 -2
  61. package/clients/frauddetector.d.ts +174 -0
  62. package/clients/imagebuilder.d.ts +378 -340
  63. package/clients/iot.d.ts +5 -0
  64. package/clients/iotwireless.d.ts +75 -0
  65. package/clients/kendra.d.ts +27 -17
  66. package/clients/lexmodelbuildingservice.d.ts +1 -1
  67. package/clients/lexruntime.d.ts +17 -3
  68. package/clients/lightsail.d.ts +17 -2
  69. package/clients/machinelearning.d.ts +71 -71
  70. package/clients/mediaconvert.d.ts +70 -11
  71. package/clients/mediapackage.d.ts +13 -0
  72. package/clients/pinpoint.d.ts +23 -3
  73. package/clients/redshift.d.ts +275 -0
  74. package/clients/route53resolver.d.ts +1093 -57
  75. package/clients/sagemaker.d.ts +76 -44
  76. package/clients/transcribeservice.d.ts +1 -1
  77. package/clients/wafv2.d.ts +126 -3
  78. package/clients/workmail.d.ts +294 -0
  79. package/dist/aws-sdk-core-react-native.js +2 -2
  80. package/dist/aws-sdk-react-native.js +1868 -1835
  81. package/dist/aws-sdk.js +2415 -1583
  82. package/dist/aws-sdk.min.js +80 -80
  83. package/lib/core.js +1 -1
  84. package/lib/event_listeners.js +1 -1
  85. package/lib/http/node.js +1 -1
  86. package/lib/services/s3.js +31 -8
  87. package/lib/services/s3control.js +18 -15
  88. package/lib/services/s3util.js +10 -10
  89. package/package.json +1 -1
  90. package/scripts/region-checker/allowlist.js +12 -12
@@ -11,6 +11,14 @@ declare class Route53Resolver extends Service {
11
11
  */
12
12
  constructor(options?: Route53Resolver.Types.ClientConfiguration)
13
13
  config: Config & Route53Resolver.Types.ClientConfiguration;
14
+ /**
15
+ * Associates a FirewallRuleGroup with a VPC, to provide DNS filtering for the VPC.
16
+ */
17
+ associateFirewallRuleGroup(params: Route53Resolver.Types.AssociateFirewallRuleGroupRequest, callback?: (err: AWSError, data: Route53Resolver.Types.AssociateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.AssociateFirewallRuleGroupResponse, AWSError>;
18
+ /**
19
+ * Associates a FirewallRuleGroup with a VPC, to provide DNS filtering for the VPC.
20
+ */
21
+ associateFirewallRuleGroup(callback?: (err: AWSError, data: Route53Resolver.Types.AssociateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.AssociateFirewallRuleGroupResponse, AWSError>;
14
22
  /**
15
23
  * Adds IP addresses to an inbound or an outbound Resolver endpoint. If you want to add more than one IP address, submit one AssociateResolverEndpointIpAddress request for each IP address. To remove an IP address from an endpoint, see DisassociateResolverEndpointIpAddress.
16
24
  */
@@ -35,6 +43,30 @@ declare class Route53Resolver extends Service {
35
43
  * Associates a Resolver rule with a VPC. When you associate a rule with a VPC, Resolver forwards all DNS queries for the domain name that is specified in the rule and that originate in the VPC. The queries are forwarded to the IP addresses for the DNS resolvers that are specified in the rule. For more information about rules, see CreateResolverRule.
36
44
  */
37
45
  associateResolverRule(callback?: (err: AWSError, data: Route53Resolver.Types.AssociateResolverRuleResponse) => void): Request<Route53Resolver.Types.AssociateResolverRuleResponse, AWSError>;
46
+ /**
47
+ * Creates an empty firewall domain list for use in DNS Firewall rules. You can populate the domains for the new list with a file, using ImportFirewallDomains, or with domain strings, using UpdateFirewallDomains.
48
+ */
49
+ createFirewallDomainList(params: Route53Resolver.Types.CreateFirewallDomainListRequest, callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallDomainListResponse) => void): Request<Route53Resolver.Types.CreateFirewallDomainListResponse, AWSError>;
50
+ /**
51
+ * Creates an empty firewall domain list for use in DNS Firewall rules. You can populate the domains for the new list with a file, using ImportFirewallDomains, or with domain strings, using UpdateFirewallDomains.
52
+ */
53
+ createFirewallDomainList(callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallDomainListResponse) => void): Request<Route53Resolver.Types.CreateFirewallDomainListResponse, AWSError>;
54
+ /**
55
+ * Creates a single DNS Firewall rule in the specified rule group, using the specified domain list.
56
+ */
57
+ createFirewallRule(params: Route53Resolver.Types.CreateFirewallRuleRequest, callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallRuleResponse) => void): Request<Route53Resolver.Types.CreateFirewallRuleResponse, AWSError>;
58
+ /**
59
+ * Creates a single DNS Firewall rule in the specified rule group, using the specified domain list.
60
+ */
61
+ createFirewallRule(callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallRuleResponse) => void): Request<Route53Resolver.Types.CreateFirewallRuleResponse, AWSError>;
62
+ /**
63
+ * Creates an empty DNS Firewall rule group for filtering DNS network traffic in a VPC. You can add rules to the new rule group by calling CreateFirewallRule.
64
+ */
65
+ createFirewallRuleGroup(params: Route53Resolver.Types.CreateFirewallRuleGroupRequest, callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.CreateFirewallRuleGroupResponse, AWSError>;
66
+ /**
67
+ * Creates an empty DNS Firewall rule group for filtering DNS network traffic in a VPC. You can add rules to the new rule group by calling CreateFirewallRule.
68
+ */
69
+ createFirewallRuleGroup(callback?: (err: AWSError, data: Route53Resolver.Types.CreateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.CreateFirewallRuleGroupResponse, AWSError>;
38
70
  /**
39
71
  * Creates a Resolver endpoint. There are two types of Resolver endpoints, inbound and outbound: An inbound Resolver endpoint forwards DNS queries to the DNS service for a VPC from your network. An outbound Resolver endpoint forwards DNS queries from the DNS service for a VPC to your network.
40
72
  */
@@ -59,6 +91,30 @@ declare class Route53Resolver extends Service {
59
91
  * For DNS queries that originate in your VPCs, specifies which Resolver endpoint the queries pass through, one domain name that you want to forward to your network, and the IP addresses of the DNS resolvers in your network.
60
92
  */
61
93
  createResolverRule(callback?: (err: AWSError, data: Route53Resolver.Types.CreateResolverRuleResponse) => void): Request<Route53Resolver.Types.CreateResolverRuleResponse, AWSError>;
94
+ /**
95
+ * Deletes the specified domain list.
96
+ */
97
+ deleteFirewallDomainList(params: Route53Resolver.Types.DeleteFirewallDomainListRequest, callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallDomainListResponse) => void): Request<Route53Resolver.Types.DeleteFirewallDomainListResponse, AWSError>;
98
+ /**
99
+ * Deletes the specified domain list.
100
+ */
101
+ deleteFirewallDomainList(callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallDomainListResponse) => void): Request<Route53Resolver.Types.DeleteFirewallDomainListResponse, AWSError>;
102
+ /**
103
+ * Deletes the specified firewall rule.
104
+ */
105
+ deleteFirewallRule(params: Route53Resolver.Types.DeleteFirewallRuleRequest, callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallRuleResponse) => void): Request<Route53Resolver.Types.DeleteFirewallRuleResponse, AWSError>;
106
+ /**
107
+ * Deletes the specified firewall rule.
108
+ */
109
+ deleteFirewallRule(callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallRuleResponse) => void): Request<Route53Resolver.Types.DeleteFirewallRuleResponse, AWSError>;
110
+ /**
111
+ * Deletes the specified firewall rule group.
112
+ */
113
+ deleteFirewallRuleGroup(params: Route53Resolver.Types.DeleteFirewallRuleGroupRequest, callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.DeleteFirewallRuleGroupResponse, AWSError>;
114
+ /**
115
+ * Deletes the specified firewall rule group.
116
+ */
117
+ deleteFirewallRuleGroup(callback?: (err: AWSError, data: Route53Resolver.Types.DeleteFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.DeleteFirewallRuleGroupResponse, AWSError>;
62
118
  /**
63
119
  * Deletes a Resolver endpoint. The effect of deleting a Resolver endpoint depends on whether it's an inbound or an outbound Resolver endpoint: Inbound: DNS queries from your network are no longer routed to the DNS service for the specified VPC. Outbound: DNS queries from a VPC are no longer routed to your network.
64
120
  */
@@ -83,6 +139,14 @@ declare class Route53Resolver extends Service {
83
139
  * Deletes a Resolver rule. Before you can delete a Resolver rule, you must disassociate it from all the VPCs that you associated the Resolver rule with. For more information, see DisassociateResolverRule.
84
140
  */
85
141
  deleteResolverRule(callback?: (err: AWSError, data: Route53Resolver.Types.DeleteResolverRuleResponse) => void): Request<Route53Resolver.Types.DeleteResolverRuleResponse, AWSError>;
142
+ /**
143
+ * Disassociates a FirewallRuleGroup from a VPC, to remove DNS filtering from the VPC.
144
+ */
145
+ disassociateFirewallRuleGroup(params: Route53Resolver.Types.DisassociateFirewallRuleGroupRequest, callback?: (err: AWSError, data: Route53Resolver.Types.DisassociateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.DisassociateFirewallRuleGroupResponse, AWSError>;
146
+ /**
147
+ * Disassociates a FirewallRuleGroup from a VPC, to remove DNS filtering from the VPC.
148
+ */
149
+ disassociateFirewallRuleGroup(callback?: (err: AWSError, data: Route53Resolver.Types.DisassociateFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.DisassociateFirewallRuleGroupResponse, AWSError>;
86
150
  /**
87
151
  * Removes IP addresses from an inbound or an outbound Resolver endpoint. If you want to remove more than one IP address, submit one DisassociateResolverEndpointIpAddress request for each IP address. To add an IP address to an endpoint, see AssociateResolverEndpointIpAddress.
88
152
  */
@@ -107,6 +171,46 @@ declare class Route53Resolver extends Service {
107
171
  * Removes the association between a specified Resolver rule and a specified VPC. If you disassociate a Resolver rule from a VPC, Resolver stops forwarding DNS queries for the domain name that you specified in the Resolver rule.
108
172
  */
109
173
  disassociateResolverRule(callback?: (err: AWSError, data: Route53Resolver.Types.DisassociateResolverRuleResponse) => void): Request<Route53Resolver.Types.DisassociateResolverRuleResponse, AWSError>;
174
+ /**
175
+ * Retrieves the configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
176
+ */
177
+ getFirewallConfig(params: Route53Resolver.Types.GetFirewallConfigRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallConfigResponse) => void): Request<Route53Resolver.Types.GetFirewallConfigResponse, AWSError>;
178
+ /**
179
+ * Retrieves the configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
180
+ */
181
+ getFirewallConfig(callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallConfigResponse) => void): Request<Route53Resolver.Types.GetFirewallConfigResponse, AWSError>;
182
+ /**
183
+ * Retrieves the specified firewall domain list.
184
+ */
185
+ getFirewallDomainList(params: Route53Resolver.Types.GetFirewallDomainListRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallDomainListResponse) => void): Request<Route53Resolver.Types.GetFirewallDomainListResponse, AWSError>;
186
+ /**
187
+ * Retrieves the specified firewall domain list.
188
+ */
189
+ getFirewallDomainList(callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallDomainListResponse) => void): Request<Route53Resolver.Types.GetFirewallDomainListResponse, AWSError>;
190
+ /**
191
+ * Retrieves the specified firewall rule group.
192
+ */
193
+ getFirewallRuleGroup(params: Route53Resolver.Types.GetFirewallRuleGroupRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupResponse, AWSError>;
194
+ /**
195
+ * Retrieves the specified firewall rule group.
196
+ */
197
+ getFirewallRuleGroup(callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupResponse, AWSError>;
198
+ /**
199
+ * Retrieves a firewall rule group association, which enables DNS filtering for a VPC with one rule group. A VPC can have more than one firewall rule group association, and a rule group can be associated with more than one VPC.
200
+ */
201
+ getFirewallRuleGroupAssociation(params: Route53Resolver.Types.GetFirewallRuleGroupAssociationRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupAssociationResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupAssociationResponse, AWSError>;
202
+ /**
203
+ * Retrieves a firewall rule group association, which enables DNS filtering for a VPC with one rule group. A VPC can have more than one firewall rule group association, and a rule group can be associated with more than one VPC.
204
+ */
205
+ getFirewallRuleGroupAssociation(callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupAssociationResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupAssociationResponse, AWSError>;
206
+ /**
207
+ * Returns the AWS Identity and Access Management (AWS IAM) policy for sharing the specified rule group. You can use the policy to share the rule group using AWS Resource Access Manager (RAM).
208
+ */
209
+ getFirewallRuleGroupPolicy(params: Route53Resolver.Types.GetFirewallRuleGroupPolicyRequest, callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupPolicyResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupPolicyResponse, AWSError>;
210
+ /**
211
+ * Returns the AWS Identity and Access Management (AWS IAM) policy for sharing the specified rule group. You can use the policy to share the rule group using AWS Resource Access Manager (RAM).
212
+ */
213
+ getFirewallRuleGroupPolicy(callback?: (err: AWSError, data: Route53Resolver.Types.GetFirewallRuleGroupPolicyResponse) => void): Request<Route53Resolver.Types.GetFirewallRuleGroupPolicyResponse, AWSError>;
110
214
  /**
111
215
  * Gets DNSSEC validation information for a specified resource.
112
216
  */
@@ -171,6 +275,62 @@ declare class Route53Resolver extends Service {
171
275
  * Gets information about the Resolver rule policy for a specified rule. A Resolver rule policy includes the rule that you want to share with another account, the account that you want to share the rule with, and the Resolver operations that you want to allow the account to use.
172
276
  */
173
277
  getResolverRulePolicy(callback?: (err: AWSError, data: Route53Resolver.Types.GetResolverRulePolicyResponse) => void): Request<Route53Resolver.Types.GetResolverRulePolicyResponse, AWSError>;
278
+ /**
279
+ * Imports domain names from a file into a domain list, for use in a DNS firewall rule group. Each domain specification in your domain list must satisfy the following requirements: It can optionally start with * (asterisk). With the exception of the optional starting asterisk, it must only contain the following characters: A-Z, a-z, 0-9, - (hyphen). It must be from 1-255 characters in length.
280
+ */
281
+ importFirewallDomains(params: Route53Resolver.Types.ImportFirewallDomainsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ImportFirewallDomainsResponse) => void): Request<Route53Resolver.Types.ImportFirewallDomainsResponse, AWSError>;
282
+ /**
283
+ * Imports domain names from a file into a domain list, for use in a DNS firewall rule group. Each domain specification in your domain list must satisfy the following requirements: It can optionally start with * (asterisk). With the exception of the optional starting asterisk, it must only contain the following characters: A-Z, a-z, 0-9, - (hyphen). It must be from 1-255 characters in length.
284
+ */
285
+ importFirewallDomains(callback?: (err: AWSError, data: Route53Resolver.Types.ImportFirewallDomainsResponse) => void): Request<Route53Resolver.Types.ImportFirewallDomainsResponse, AWSError>;
286
+ /**
287
+ * Retrieves the firewall configurations that you have defined. DNS Firewall uses the configurations to manage firewall behavior for your VPCs. A single call might return only a partial list of the configurations. For information, see MaxResults.
288
+ */
289
+ listFirewallConfigs(params: Route53Resolver.Types.ListFirewallConfigsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallConfigsResponse) => void): Request<Route53Resolver.Types.ListFirewallConfigsResponse, AWSError>;
290
+ /**
291
+ * Retrieves the firewall configurations that you have defined. DNS Firewall uses the configurations to manage firewall behavior for your VPCs. A single call might return only a partial list of the configurations. For information, see MaxResults.
292
+ */
293
+ listFirewallConfigs(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallConfigsResponse) => void): Request<Route53Resolver.Types.ListFirewallConfigsResponse, AWSError>;
294
+ /**
295
+ * Retrieves the firewall domain lists that you have defined. For each firewall domain list, you can retrieve the domains that are defined for a list by calling ListFirewallDomains. A single call to this list operation might return only a partial list of the domain lists. For information, see MaxResults.
296
+ */
297
+ listFirewallDomainLists(params: Route53Resolver.Types.ListFirewallDomainListsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallDomainListsResponse) => void): Request<Route53Resolver.Types.ListFirewallDomainListsResponse, AWSError>;
298
+ /**
299
+ * Retrieves the firewall domain lists that you have defined. For each firewall domain list, you can retrieve the domains that are defined for a list by calling ListFirewallDomains. A single call to this list operation might return only a partial list of the domain lists. For information, see MaxResults.
300
+ */
301
+ listFirewallDomainLists(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallDomainListsResponse) => void): Request<Route53Resolver.Types.ListFirewallDomainListsResponse, AWSError>;
302
+ /**
303
+ * Retrieves the domains that you have defined for the specified firewall domain list. A single call might return only a partial list of the domains. For information, see MaxResults.
304
+ */
305
+ listFirewallDomains(params: Route53Resolver.Types.ListFirewallDomainsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallDomainsResponse) => void): Request<Route53Resolver.Types.ListFirewallDomainsResponse, AWSError>;
306
+ /**
307
+ * Retrieves the domains that you have defined for the specified firewall domain list. A single call might return only a partial list of the domains. For information, see MaxResults.
308
+ */
309
+ listFirewallDomains(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallDomainsResponse) => void): Request<Route53Resolver.Types.ListFirewallDomainsResponse, AWSError>;
310
+ /**
311
+ * Retrieves the firewall rule group associations that you have defined. Each association enables DNS filtering for a VPC with one rule group. A single call might return only a partial list of the associations. For information, see MaxResults.
312
+ */
313
+ listFirewallRuleGroupAssociations(params: Route53Resolver.Types.ListFirewallRuleGroupAssociationsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRuleGroupAssociationsResponse) => void): Request<Route53Resolver.Types.ListFirewallRuleGroupAssociationsResponse, AWSError>;
314
+ /**
315
+ * Retrieves the firewall rule group associations that you have defined. Each association enables DNS filtering for a VPC with one rule group. A single call might return only a partial list of the associations. For information, see MaxResults.
316
+ */
317
+ listFirewallRuleGroupAssociations(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRuleGroupAssociationsResponse) => void): Request<Route53Resolver.Types.ListFirewallRuleGroupAssociationsResponse, AWSError>;
318
+ /**
319
+ * Retrieves the minimal high-level information for the rule groups that you have defined. A single call might return only a partial list of the rule groups. For information, see MaxResults.
320
+ */
321
+ listFirewallRuleGroups(params: Route53Resolver.Types.ListFirewallRuleGroupsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRuleGroupsResponse) => void): Request<Route53Resolver.Types.ListFirewallRuleGroupsResponse, AWSError>;
322
+ /**
323
+ * Retrieves the minimal high-level information for the rule groups that you have defined. A single call might return only a partial list of the rule groups. For information, see MaxResults.
324
+ */
325
+ listFirewallRuleGroups(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRuleGroupsResponse) => void): Request<Route53Resolver.Types.ListFirewallRuleGroupsResponse, AWSError>;
326
+ /**
327
+ * Retrieves the firewall rules that you have defined for the specified firewall rule group. DNS Firewall uses the rules in a rule group to filter DNS network traffic for a VPC. A single call might return only a partial list of the rules. For information, see MaxResults.
328
+ */
329
+ listFirewallRules(params: Route53Resolver.Types.ListFirewallRulesRequest, callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRulesResponse) => void): Request<Route53Resolver.Types.ListFirewallRulesResponse, AWSError>;
330
+ /**
331
+ * Retrieves the firewall rules that you have defined for the specified firewall rule group. DNS Firewall uses the rules in a rule group to filter DNS network traffic for a VPC. A single call might return only a partial list of the rules. For information, see MaxResults.
332
+ */
333
+ listFirewallRules(callback?: (err: AWSError, data: Route53Resolver.Types.ListFirewallRulesResponse) => void): Request<Route53Resolver.Types.ListFirewallRulesResponse, AWSError>;
174
334
  /**
175
335
  * Lists the configurations for DNSSEC validation that are associated with the current AWS account.
176
336
  */
@@ -235,6 +395,14 @@ declare class Route53Resolver extends Service {
235
395
  * Lists the tags that you associated with the specified resource.
236
396
  */
237
397
  listTagsForResource(callback?: (err: AWSError, data: Route53Resolver.Types.ListTagsForResourceResponse) => void): Request<Route53Resolver.Types.ListTagsForResourceResponse, AWSError>;
398
+ /**
399
+ * Attaches an AWS Identity and Access Management (AWS IAM) policy for sharing the rule group. You can use the policy to share the rule group using AWS Resource Access Manager (RAM).
400
+ */
401
+ putFirewallRuleGroupPolicy(params: Route53Resolver.Types.PutFirewallRuleGroupPolicyRequest, callback?: (err: AWSError, data: Route53Resolver.Types.PutFirewallRuleGroupPolicyResponse) => void): Request<Route53Resolver.Types.PutFirewallRuleGroupPolicyResponse, AWSError>;
402
+ /**
403
+ * Attaches an AWS Identity and Access Management (AWS IAM) policy for sharing the rule group. You can use the policy to share the rule group using AWS Resource Access Manager (RAM).
404
+ */
405
+ putFirewallRuleGroupPolicy(callback?: (err: AWSError, data: Route53Resolver.Types.PutFirewallRuleGroupPolicyResponse) => void): Request<Route53Resolver.Types.PutFirewallRuleGroupPolicyResponse, AWSError>;
238
406
  /**
239
407
  * Specifies an AWS account that you want to share a query logging configuration with, the query logging configuration that you want to share, and the operations that you want the account to be able to perform on the configuration.
240
408
  */
@@ -267,6 +435,38 @@ declare class Route53Resolver extends Service {
267
435
  * Removes one or more tags from a specified resource.
268
436
  */
269
437
  untagResource(callback?: (err: AWSError, data: Route53Resolver.Types.UntagResourceResponse) => void): Request<Route53Resolver.Types.UntagResourceResponse, AWSError>;
438
+ /**
439
+ * Updates the configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
440
+ */
441
+ updateFirewallConfig(params: Route53Resolver.Types.UpdateFirewallConfigRequest, callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallConfigResponse) => void): Request<Route53Resolver.Types.UpdateFirewallConfigResponse, AWSError>;
442
+ /**
443
+ * Updates the configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
444
+ */
445
+ updateFirewallConfig(callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallConfigResponse) => void): Request<Route53Resolver.Types.UpdateFirewallConfigResponse, AWSError>;
446
+ /**
447
+ * Updates the firewall domain list from an array of domain specifications.
448
+ */
449
+ updateFirewallDomains(params: Route53Resolver.Types.UpdateFirewallDomainsRequest, callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallDomainsResponse) => void): Request<Route53Resolver.Types.UpdateFirewallDomainsResponse, AWSError>;
450
+ /**
451
+ * Updates the firewall domain list from an array of domain specifications.
452
+ */
453
+ updateFirewallDomains(callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallDomainsResponse) => void): Request<Route53Resolver.Types.UpdateFirewallDomainsResponse, AWSError>;
454
+ /**
455
+ * Updates the specified firewall rule.
456
+ */
457
+ updateFirewallRule(params: Route53Resolver.Types.UpdateFirewallRuleRequest, callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallRuleResponse) => void): Request<Route53Resolver.Types.UpdateFirewallRuleResponse, AWSError>;
458
+ /**
459
+ * Updates the specified firewall rule.
460
+ */
461
+ updateFirewallRule(callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallRuleResponse) => void): Request<Route53Resolver.Types.UpdateFirewallRuleResponse, AWSError>;
462
+ /**
463
+ * Changes the association of a FirewallRuleGroup with a VPC. The association enables DNS filtering for the VPC.
464
+ */
465
+ updateFirewallRuleGroupAssociation(params: Route53Resolver.Types.UpdateFirewallRuleGroupAssociationRequest, callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallRuleGroupAssociationResponse) => void): Request<Route53Resolver.Types.UpdateFirewallRuleGroupAssociationResponse, AWSError>;
466
+ /**
467
+ * Changes the association of a FirewallRuleGroup with a VPC. The association enables DNS filtering for the VPC.
468
+ */
469
+ updateFirewallRuleGroupAssociation(callback?: (err: AWSError, data: Route53Resolver.Types.UpdateFirewallRuleGroupAssociationResponse) => void): Request<Route53Resolver.Types.UpdateFirewallRuleGroupAssociationResponse, AWSError>;
270
470
  /**
271
471
  * Updates an existing DNSSEC validation configuration. If there is no existing DNSSEC validation configuration, one is created.
272
472
  */
@@ -294,7 +494,44 @@ declare class Route53Resolver extends Service {
294
494
  }
295
495
  declare namespace Route53Resolver {
296
496
  export type AccountId = string;
497
+ export type Action = "ALLOW"|"BLOCK"|"ALERT"|string;
297
498
  export type Arn = string;
499
+ export interface AssociateFirewallRuleGroupRequest {
500
+ /**
501
+ * A unique string that identifies the request and that allows failed requests to be retried without the risk of executing the operation twice. CreatorRequestId can be any unique string, for example, a date/time stamp.
502
+ */
503
+ CreatorRequestId: CreatorRequestId;
504
+ /**
505
+ * The unique identifier of the firewall rule group.
506
+ */
507
+ FirewallRuleGroupId: ResourceId;
508
+ /**
509
+ * The unique identifier of the VPC that you want to associate with the rule group.
510
+ */
511
+ VpcId: ResourceId;
512
+ /**
513
+ * The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from rule group with the lowest numeric priority setting. You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 100, 200, and so on. You can change the priority setting for a rule group association after you create it.
514
+ */
515
+ Priority: Priority;
516
+ /**
517
+ * A name that lets you identify the association, to manage and use it.
518
+ */
519
+ Name: Name;
520
+ /**
521
+ * If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections. When you create the association, the default setting is DISABLED.
522
+ */
523
+ MutationProtection?: MutationProtectionStatus;
524
+ /**
525
+ * A list of the tag keys and values that you want to associate with the rule group association.
526
+ */
527
+ Tags?: TagList;
528
+ }
529
+ export interface AssociateFirewallRuleGroupResponse {
530
+ /**
531
+ * The association that you just created. The association has an Id that you can use to identify it in other requests, like update and delete.
532
+ */
533
+ FirewallRuleGroupAssociation?: FirewallRuleGroupAssociation;
534
+ }
298
535
  export interface AssociateResolverEndpointIpAddressRequest {
299
536
  /**
300
537
  * The ID of the Resolver endpoint that you want to associate IP addresses with.
@@ -347,8 +584,100 @@ declare namespace Route53Resolver {
347
584
  */
348
585
  ResolverRuleAssociation?: ResolverRuleAssociation;
349
586
  }
587
+ export type BlockOverrideDnsType = "CNAME"|string;
588
+ export type BlockOverrideDomain = string;
589
+ export type BlockOverrideTtl = number;
590
+ export type BlockResponse = "NODATA"|"NXDOMAIN"|"OVERRIDE"|string;
350
591
  export type Boolean = boolean;
351
592
  export type Count = number;
593
+ export interface CreateFirewallDomainListRequest {
594
+ /**
595
+ * A unique string that identifies the request and that allows you to retry failed requests without the risk of executing the operation twice. CreatorRequestId can be any unique string, for example, a date/time stamp.
596
+ */
597
+ CreatorRequestId: CreatorRequestId;
598
+ /**
599
+ * A name that lets you identify the domain list to manage and use it.
600
+ */
601
+ Name: Name;
602
+ /**
603
+ * A list of the tag keys and values that you want to associate with the domain list.
604
+ */
605
+ Tags?: TagList;
606
+ }
607
+ export interface CreateFirewallDomainListResponse {
608
+ /**
609
+ * The domain list that you just created.
610
+ */
611
+ FirewallDomainList?: FirewallDomainList;
612
+ }
613
+ export interface CreateFirewallRuleGroupRequest {
614
+ /**
615
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
616
+ */
617
+ CreatorRequestId: CreatorRequestId;
618
+ /**
619
+ * A name that lets you identify the rule group, to manage and use it.
620
+ */
621
+ Name: Name;
622
+ /**
623
+ * A list of the tag keys and values that you want to associate with the rule group.
624
+ */
625
+ Tags?: TagList;
626
+ }
627
+ export interface CreateFirewallRuleGroupResponse {
628
+ /**
629
+ * A collection of rules used to filter DNS network traffic.
630
+ */
631
+ FirewallRuleGroup?: FirewallRuleGroup;
632
+ }
633
+ export interface CreateFirewallRuleRequest {
634
+ /**
635
+ * A unique string that identifies the request and that allows you to retry failed requests without the risk of executing the operation twice. CreatorRequestId can be any unique string, for example, a date/time stamp.
636
+ */
637
+ CreatorRequestId: CreatorRequestId;
638
+ /**
639
+ * The unique identifier of the firewall rule group where you want to create the rule.
640
+ */
641
+ FirewallRuleGroupId: ResourceId;
642
+ /**
643
+ * The ID of the domain list that you want to use in the rule.
644
+ */
645
+ FirewallDomainListId: ResourceId;
646
+ /**
647
+ * The setting that determines the processing order of the rule in the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting. You must specify a unique priority for each rule in a rule group. To make it easier to insert rules later, leave space between the numbers, for example, use 100, 200, and so on. You can change the priority setting for the rules in a rule group at any time.
648
+ */
649
+ Priority: Priority;
650
+ /**
651
+ * The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list: ALLOW - Permit the request to go through. ALERT - Permit the request and send metrics and log to Cloud Watch. BLOCK - Disallow the request. This option requires additional details in the rule's BlockResponse.
652
+ */
653
+ Action: Action;
654
+ /**
655
+ * The way that you want DNS Firewall to block the request, used with the rule aciton setting BLOCK. NODATA - Respond indicating that the query was successful, but no response is available for it. NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist. OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings. This setting is required if the rule action setting is BLOCK.
656
+ */
657
+ BlockResponse?: BlockResponse;
658
+ /**
659
+ * The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE. This setting is required if the BlockResponse setting is OVERRIDE.
660
+ */
661
+ BlockOverrideDomain?: BlockOverrideDomain;
662
+ /**
663
+ * The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE. This setting is required if the BlockResponse setting is OVERRIDE.
664
+ */
665
+ BlockOverrideDnsType?: BlockOverrideDnsType;
666
+ /**
667
+ * The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE. This setting is required if the BlockResponse setting is OVERRIDE.
668
+ */
669
+ BlockOverrideTtl?: BlockOverrideTtl;
670
+ /**
671
+ * A name that lets you identify the rule in the rule group.
672
+ */
673
+ Name: Name;
674
+ }
675
+ export interface CreateFirewallRuleResponse {
676
+ /**
677
+ * The firewall rule that you just created.
678
+ */
679
+ FirewallRule?: FirewallRule;
680
+ }
352
681
  export interface CreateResolverEndpointRequest {
353
682
  /**
354
683
  * A unique string that identifies the request and that allows failed requests to be retried without the risk of executing the operation twice. CreatorRequestId can be any unique string, for example, a date/time stamp.
@@ -442,106 +771,491 @@ declare namespace Route53Resolver {
442
771
  ResolverRule?: ResolverRule;
443
772
  }
444
773
  export type CreatorRequestId = string;
774
+ export interface DeleteFirewallDomainListRequest {
775
+ /**
776
+ * The ID of the domain list that you want to delete.
777
+ */
778
+ FirewallDomainListId: ResourceId;
779
+ }
780
+ export interface DeleteFirewallDomainListResponse {
781
+ /**
782
+ * The domain list that you just deleted.
783
+ */
784
+ FirewallDomainList?: FirewallDomainList;
785
+ }
786
+ export interface DeleteFirewallRuleGroupRequest {
787
+ /**
788
+ * The unique identifier of the firewall rule group that you want to delete.
789
+ */
790
+ FirewallRuleGroupId: ResourceId;
791
+ }
792
+ export interface DeleteFirewallRuleGroupResponse {
793
+ /**
794
+ * A collection of rules used to filter DNS network traffic.
795
+ */
796
+ FirewallRuleGroup?: FirewallRuleGroup;
797
+ }
798
+ export interface DeleteFirewallRuleRequest {
799
+ /**
800
+ * The unique identifier of the firewall rule group that you want to delete the rule from.
801
+ */
802
+ FirewallRuleGroupId: ResourceId;
803
+ /**
804
+ * The ID of the domain list that's used in the rule.
805
+ */
806
+ FirewallDomainListId: ResourceId;
807
+ }
808
+ export interface DeleteFirewallRuleResponse {
809
+ /**
810
+ * The specification for the firewall rule that you just deleted.
811
+ */
812
+ FirewallRule?: FirewallRule;
813
+ }
445
814
  export interface DeleteResolverEndpointRequest {
446
815
  /**
447
- * The ID of the Resolver endpoint that you want to delete.
816
+ * The ID of the Resolver endpoint that you want to delete.
817
+ */
818
+ ResolverEndpointId: ResourceId;
819
+ }
820
+ export interface DeleteResolverEndpointResponse {
821
+ /**
822
+ * Information about the DeleteResolverEndpoint request, including the status of the request.
823
+ */
824
+ ResolverEndpoint?: ResolverEndpoint;
825
+ }
826
+ export interface DeleteResolverQueryLogConfigRequest {
827
+ /**
828
+ * The ID of the query logging configuration that you want to delete.
829
+ */
830
+ ResolverQueryLogConfigId: ResourceId;
831
+ }
832
+ export interface DeleteResolverQueryLogConfigResponse {
833
+ /**
834
+ * Information about the query logging configuration that you deleted, including the status of the request.
835
+ */
836
+ ResolverQueryLogConfig?: ResolverQueryLogConfig;
837
+ }
838
+ export interface DeleteResolverRuleRequest {
839
+ /**
840
+ * The ID of the Resolver rule that you want to delete.
841
+ */
842
+ ResolverRuleId: ResourceId;
843
+ }
844
+ export interface DeleteResolverRuleResponse {
845
+ /**
846
+ * Information about the DeleteResolverRule request, including the status of the request.
847
+ */
848
+ ResolverRule?: ResolverRule;
849
+ }
850
+ export type DestinationArn = string;
851
+ export interface DisassociateFirewallRuleGroupRequest {
852
+ /**
853
+ * The identifier of the FirewallRuleGroupAssociation.
854
+ */
855
+ FirewallRuleGroupAssociationId: ResourceId;
856
+ }
857
+ export interface DisassociateFirewallRuleGroupResponse {
858
+ /**
859
+ * The firewall rule group association that you just removed.
860
+ */
861
+ FirewallRuleGroupAssociation?: FirewallRuleGroupAssociation;
862
+ }
863
+ export interface DisassociateResolverEndpointIpAddressRequest {
864
+ /**
865
+ * The ID of the Resolver endpoint that you want to disassociate an IP address from.
866
+ */
867
+ ResolverEndpointId: ResourceId;
868
+ /**
869
+ * The IPv4 address that you want to remove from a Resolver endpoint.
870
+ */
871
+ IpAddress: IpAddressUpdate;
872
+ }
873
+ export interface DisassociateResolverEndpointIpAddressResponse {
874
+ /**
875
+ * The response to an DisassociateResolverEndpointIpAddress request.
876
+ */
877
+ ResolverEndpoint?: ResolverEndpoint;
878
+ }
879
+ export interface DisassociateResolverQueryLogConfigRequest {
880
+ /**
881
+ * The ID of the query logging configuration that you want to disassociate a specified VPC from.
882
+ */
883
+ ResolverQueryLogConfigId: ResourceId;
884
+ /**
885
+ * The ID of the Amazon VPC that you want to disassociate from a specified query logging configuration.
886
+ */
887
+ ResourceId: ResourceId;
888
+ }
889
+ export interface DisassociateResolverQueryLogConfigResponse {
890
+ /**
891
+ * A complex type that contains settings for the association that you deleted between an Amazon VPC and a query logging configuration.
892
+ */
893
+ ResolverQueryLogConfigAssociation?: ResolverQueryLogConfigAssociation;
894
+ }
895
+ export interface DisassociateResolverRuleRequest {
896
+ /**
897
+ * The ID of the VPC that you want to disassociate the Resolver rule from.
898
+ */
899
+ VPCId: ResourceId;
900
+ /**
901
+ * The ID of the Resolver rule that you want to disassociate from the specified VPC.
902
+ */
903
+ ResolverRuleId: ResourceId;
904
+ }
905
+ export interface DisassociateResolverRuleResponse {
906
+ /**
907
+ * Information about the DisassociateResolverRule request, including the status of the request.
908
+ */
909
+ ResolverRuleAssociation?: ResolverRuleAssociation;
910
+ }
911
+ export type DomainListFileUrl = string;
912
+ export type DomainName = string;
913
+ export interface Filter {
914
+ /**
915
+ * The name of the parameter that you want to use to filter objects. The valid values for Name depend on the action that you're including the filter in, ListResolverEndpoints, ListResolverRules, ListResolverRuleAssociations, ListResolverQueryLogConfigs, or ListResolverQueryLogConfigAssociations. In early versions of Resolver, values for Name were listed as uppercase, with underscore (_) delimiters. For example, CreatorRequestId was originally listed as CREATOR_REQUEST_ID. Uppercase values for Name are still supported. ListResolverEndpoints Valid values for Name include the following: CreatorRequestId: The value that you specified when you created the Resolver endpoint. Direction: Whether you want to return inbound or outbound Resolver endpoints. If you specify DIRECTION for Name, specify INBOUND or OUTBOUND for Values. HostVpcId: The ID of the VPC that inbound DNS queries pass through on the way from your network to your VPCs in a region, or the VPC that outbound queries pass through on the way from your VPCs to your network. In a CreateResolverEndpoint request, SubnetId indirectly identifies the VPC. In a GetResolverEndpoint request, the VPC ID for a Resolver endpoint is returned in the HostVPCId element. IpAddressCount: The number of IP addresses that you have associated with the Resolver endpoint. Name: The name of the Resolver endpoint. SecurityGroupIds: The IDs of the VPC security groups that you specified when you created the Resolver endpoint. Status: The status of the Resolver endpoint. If you specify Status for Name, specify one of the following status codes for Values: CREATING, OPERATIONAL, UPDATING, AUTO_RECOVERING, ACTION_NEEDED, or DELETING. For more information, see Status in ResolverEndpoint. ListResolverRules Valid values for Name include the following: CreatorRequestId: The value that you specified when you created the Resolver rule. DomainName: The domain name for which Resolver is forwarding DNS queries to your network. In the value that you specify for Values, include a trailing dot (.) after the domain name. For example, if the domain name is example.com, specify the following value. Note the "." after com: example.com. Name: The name of the Resolver rule. ResolverEndpointId: The ID of the Resolver endpoint that the Resolver rule is associated with. You can filter on the Resolver endpoint only for rules that have a value of FORWARD for RuleType. Status: The status of the Resolver rule. If you specify Status for Name, specify one of the following status codes for Values: COMPLETE, DELETING, UPDATING, or FAILED. Type: The type of the Resolver rule. If you specify TYPE for Name, specify FORWARD or SYSTEM for Values. ListResolverRuleAssociations Valid values for Name include the following: Name: The name of the Resolver rule association. ResolverRuleId: The ID of the Resolver rule that is associated with one or more VPCs. Status: The status of the Resolver rule association. If you specify Status for Name, specify one of the following status codes for Values: CREATING, COMPLETE, DELETING, or FAILED. VPCId: The ID of the VPC that the Resolver rule is associated with. ListResolverQueryLogConfigs Valid values for Name include the following: Arn: The ARN for the query logging configuration. AssociationCount: The number of VPCs that are associated with the query logging configuration. CreationTime: The date and time that the query logging configuration was created, in Unix time format and Coordinated Universal Time (UTC). CreatorRequestId: A unique string that identifies the request that created the query logging configuration. Destination: The AWS service that you want to forward query logs to. Valid values include the following: S3 CloudWatchLogs KinesisFirehose DestinationArn: The ARN of the location that Resolver is sending query logs to. This value can be the ARN for an S3 bucket, a CloudWatch Logs log group, or a Kinesis Data Firehose delivery stream. Id: The ID of the query logging configuration Name: The name of the query logging configuration OwnerId: The AWS account ID for the account that created the query logging configuration. ShareStatus: An indication of whether the query logging configuration is shared with other AWS accounts, or was shared with the current account by another AWS account. Valid values include: NOT_SHARED, SHARED_WITH_ME, or SHARED_BY_ME. Status: The status of the query logging configuration. If you specify Status for Name, specify the applicable status code for Values: CREATING, CREATED, DELETING, or FAILED. For more information, see Status. ListResolverQueryLogConfigAssociations Valid values for Name include the following: CreationTime: The date and time that the VPC was associated with the query logging configuration, in Unix time format and Coordinated Universal Time (UTC). Error: If the value of Status is FAILED, specify the cause: DESTINATION_NOT_FOUND or ACCESS_DENIED. Id: The ID of the query logging association. ResolverQueryLogConfigId: The ID of the query logging configuration that a VPC is associated with. ResourceId: The ID of the Amazon VPC that is associated with the query logging configuration. Status: The status of the query logging association. If you specify Status for Name, specify the applicable status code for Values: CREATING, CREATED, DELETING, or FAILED. For more information, see Status.
916
+ */
917
+ Name?: FilterName;
918
+ /**
919
+ * When you're using a List operation and you want the operation to return a subset of objects, such as Resolver endpoints or Resolver rules, the value of the parameter that you want to use to filter objects. For example, to list only inbound Resolver endpoints, specify Direction for Name and specify INBOUND for Values.
920
+ */
921
+ Values?: FilterValues;
922
+ }
923
+ export type FilterName = string;
924
+ export type FilterValue = string;
925
+ export type FilterValues = FilterValue[];
926
+ export type Filters = Filter[];
927
+ export interface FirewallConfig {
928
+ /**
929
+ * The Id of the firewall configuration.
930
+ */
931
+ Id?: ResourceId;
932
+ /**
933
+ * The ID of the VPC that this firewall configuration applies to.
934
+ */
935
+ ResourceId?: ResourceId;
936
+ /**
937
+ * The AWS account ID of the owner of the VPC that this firewall configuration applies to.
938
+ */
939
+ OwnerId?: AccountId;
940
+ /**
941
+ * Determines how DNS Firewall operates during failures, for example when all traffic that is sent to DNS Firewall fails to receive a reply. By default, fail open is disabled, which means the failure mode is closed. This approach favors security over availability. DNS Firewall returns a failure error when it is unable to properly evaluate a query. If you enable this option, the failure mode is open. This approach favors availability over security. DNS Firewall allows queries to proceed if it is unable to properly evaluate them. This behavior is only enforced for VPCs that have at least one DNS Firewall rule group association.
942
+ */
943
+ FirewallFailOpen?: FirewallFailOpenStatus;
944
+ }
945
+ export type FirewallConfigList = FirewallConfig[];
946
+ export type FirewallDomainImportOperation = "REPLACE"|string;
947
+ export interface FirewallDomainList {
948
+ /**
949
+ * The ID of the domain list.
950
+ */
951
+ Id?: ResourceId;
952
+ /**
953
+ * The Amazon Resource Name (ARN) of the firewall domain list.
954
+ */
955
+ Arn?: Arn;
956
+ /**
957
+ * The name of the domain list.
958
+ */
959
+ Name?: Name;
960
+ /**
961
+ * The number of domain names that are specified in the domain list.
962
+ */
963
+ DomainCount?: Unsigned;
964
+ /**
965
+ * The status of the domain list.
966
+ */
967
+ Status?: FirewallDomainListStatus;
968
+ /**
969
+ * Additional information about the status of the list, if available.
970
+ */
971
+ StatusMessage?: StatusMessage;
972
+ /**
973
+ * The owner of the list, used only for lists that are not managed by you. For example, the managed domain list AWSManagedDomainsMalwareDomainList has the managed owner name Route 53 Resolver DNS Firewall.
974
+ */
975
+ ManagedOwnerName?: ServicePrinciple;
976
+ /**
977
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
978
+ */
979
+ CreatorRequestId?: CreatorRequestId;
980
+ /**
981
+ * The date and time that the domain list was created, in Unix time format and Coordinated Universal Time (UTC).
982
+ */
983
+ CreationTime?: Rfc3339TimeString;
984
+ /**
985
+ * The date and time that the domain list was last modified, in Unix time format and Coordinated Universal Time (UTC).
986
+ */
987
+ ModificationTime?: Rfc3339TimeString;
988
+ }
989
+ export interface FirewallDomainListMetadata {
990
+ /**
991
+ * The ID of the domain list.
992
+ */
993
+ Id?: ResourceId;
994
+ /**
995
+ * The Amazon Resource Name (ARN) of the firewall domain list metadata.
996
+ */
997
+ Arn?: Arn;
998
+ /**
999
+ * The name of the domain list.
1000
+ */
1001
+ Name?: Name;
1002
+ /**
1003
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
1004
+ */
1005
+ CreatorRequestId?: CreatorRequestId;
1006
+ /**
1007
+ * The owner of the list, used only for lists that are not managed by you. For example, the managed domain list AWSManagedDomainsMalwareDomainList has the managed owner name Route 53 Resolver DNS Firewall.
1008
+ */
1009
+ ManagedOwnerName?: ServicePrinciple;
1010
+ }
1011
+ export type FirewallDomainListMetadataList = FirewallDomainListMetadata[];
1012
+ export type FirewallDomainListStatus = "COMPLETE"|"COMPLETE_IMPORT_FAILED"|"IMPORTING"|"DELETING"|"UPDATING"|string;
1013
+ export type FirewallDomainName = string;
1014
+ export type FirewallDomainUpdateOperation = "ADD"|"REMOVE"|"REPLACE"|string;
1015
+ export type FirewallDomains = FirewallDomainName[];
1016
+ export type FirewallFailOpenStatus = "ENABLED"|"DISABLED"|string;
1017
+ export interface FirewallRule {
1018
+ /**
1019
+ * The unique identifier of the firewall rule group of the rule.
1020
+ */
1021
+ FirewallRuleGroupId?: ResourceId;
1022
+ /**
1023
+ * The ID of the domain list that's used in the rule.
1024
+ */
1025
+ FirewallDomainListId?: ResourceId;
1026
+ /**
1027
+ * The name of the rule.
1028
+ */
1029
+ Name?: Name;
1030
+ /**
1031
+ * The priority of the rule in the rule group. This value must be unique within the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting.
1032
+ */
1033
+ Priority?: Priority;
1034
+ /**
1035
+ * The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list: ALLOW - Permit the request to go through. ALERT - Permit the request to go through but send an alert to the logs. BLOCK - Disallow the request. If this is specified, additional handling details are provided in the rule's BlockResponse setting.
1036
+ */
1037
+ Action?: Action;
1038
+ /**
1039
+ * The way that you want DNS Firewall to block the request. Used for the rule action setting BLOCK. NODATA - Respond indicating that the query was successful, but no response is available for it. NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist. OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings.
1040
+ */
1041
+ BlockResponse?: BlockResponse;
1042
+ /**
1043
+ * The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
1044
+ */
1045
+ BlockOverrideDomain?: BlockOverrideDomain;
1046
+ /**
1047
+ * The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
1048
+ */
1049
+ BlockOverrideDnsType?: BlockOverrideDnsType;
1050
+ /**
1051
+ * The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
1052
+ */
1053
+ BlockOverrideTtl?: Unsigned;
1054
+ /**
1055
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
1056
+ */
1057
+ CreatorRequestId?: CreatorRequestId;
1058
+ /**
1059
+ * The date and time that the rule was created, in Unix time format and Coordinated Universal Time (UTC).
1060
+ */
1061
+ CreationTime?: Rfc3339TimeString;
1062
+ /**
1063
+ * The date and time that the rule was last modified, in Unix time format and Coordinated Universal Time (UTC).
1064
+ */
1065
+ ModificationTime?: Rfc3339TimeString;
1066
+ }
1067
+ export interface FirewallRuleGroup {
1068
+ /**
1069
+ * The ID of the rule group.
1070
+ */
1071
+ Id?: ResourceId;
1072
+ /**
1073
+ * The ARN (Amazon Resource Name) of the rule group.
1074
+ */
1075
+ Arn?: Arn;
1076
+ /**
1077
+ * The name of the rule group.
1078
+ */
1079
+ Name?: Name;
1080
+ /**
1081
+ * The number of rules in the rule group.
1082
+ */
1083
+ RuleCount?: Unsigned;
1084
+ /**
1085
+ * The status of the domain list.
1086
+ */
1087
+ Status?: FirewallRuleGroupStatus;
1088
+ /**
1089
+ * Additional information about the status of the rule group, if available.
1090
+ */
1091
+ StatusMessage?: StatusMessage;
1092
+ /**
1093
+ * The AWS account ID for the account that created the rule group. When a rule group is shared with your account, this is the account that has shared the rule group with you.
1094
+ */
1095
+ OwnerId?: AccountId;
1096
+ /**
1097
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
1098
+ */
1099
+ CreatorRequestId?: CreatorRequestId;
1100
+ /**
1101
+ * Whether the rule group is shared with other AWS accounts, or was shared with the current account by another AWS account. Sharing is configured through AWS Resource Access Manager (AWS RAM).
1102
+ */
1103
+ ShareStatus?: ShareStatus;
1104
+ /**
1105
+ * The date and time that the rule group was created, in Unix time format and Coordinated Universal Time (UTC).
1106
+ */
1107
+ CreationTime?: Rfc3339TimeString;
1108
+ /**
1109
+ * The date and time that the rule group was last modified, in Unix time format and Coordinated Universal Time (UTC).
1110
+ */
1111
+ ModificationTime?: Rfc3339TimeString;
1112
+ }
1113
+ export interface FirewallRuleGroupAssociation {
1114
+ /**
1115
+ * The identifier for the association.
1116
+ */
1117
+ Id?: ResourceId;
1118
+ /**
1119
+ * The Amazon Resource Name (ARN) of the firewall rule group association.
1120
+ */
1121
+ Arn?: Arn;
1122
+ /**
1123
+ * The unique identifier of the firewall rule group.
1124
+ */
1125
+ FirewallRuleGroupId?: ResourceId;
1126
+ /**
1127
+ * The unique identifier of the VPC that is associated with the rule group.
1128
+ */
1129
+ VpcId?: ResourceId;
1130
+ /**
1131
+ * The name of the association.
1132
+ */
1133
+ Name?: Name;
1134
+ /**
1135
+ * The setting that determines the processing order of the rule group among the rule groups that are associated with a single VPC. DNS Firewall filters VPC traffic starting from rule group with the lowest numeric priority setting.
1136
+ */
1137
+ Priority?: Priority;
1138
+ /**
1139
+ * If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections.
1140
+ */
1141
+ MutationProtection?: MutationProtectionStatus;
1142
+ /**
1143
+ * The owner of the association, used only for associations that are not managed by you. If you use AWS Firewall Manager to manage your DNS Firewalls, then this reports Firewall Manager as the managed owner.
1144
+ */
1145
+ ManagedOwnerName?: ServicePrinciple;
1146
+ /**
1147
+ * The current status of the association.
1148
+ */
1149
+ Status?: FirewallRuleGroupAssociationStatus;
1150
+ /**
1151
+ * Additional information about the status of the response, if available.
1152
+ */
1153
+ StatusMessage?: StatusMessage;
1154
+ /**
1155
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
1156
+ */
1157
+ CreatorRequestId?: CreatorRequestId;
1158
+ /**
1159
+ * The date and time that the association was created, in Unix time format and Coordinated Universal Time (UTC).
1160
+ */
1161
+ CreationTime?: Rfc3339TimeString;
1162
+ /**
1163
+ * The date and time that the association was last modified, in Unix time format and Coordinated Universal Time (UTC).
448
1164
  */
449
- ResolverEndpointId: ResourceId;
1165
+ ModificationTime?: Rfc3339TimeString;
450
1166
  }
451
- export interface DeleteResolverEndpointResponse {
1167
+ export type FirewallRuleGroupAssociationStatus = "COMPLETE"|"DELETING"|"UPDATING"|string;
1168
+ export type FirewallRuleGroupAssociations = FirewallRuleGroupAssociation[];
1169
+ export interface FirewallRuleGroupMetadata {
452
1170
  /**
453
- * Information about the DeleteResolverEndpoint request, including the status of the request.
1171
+ * The ID of the rule group.
454
1172
  */
455
- ResolverEndpoint?: ResolverEndpoint;
456
- }
457
- export interface DeleteResolverQueryLogConfigRequest {
1173
+ Id?: ResourceId;
458
1174
  /**
459
- * The ID of the query logging configuration that you want to delete.
1175
+ * The ARN (Amazon Resource Name) of the rule group.
460
1176
  */
461
- ResolverQueryLogConfigId: ResourceId;
462
- }
463
- export interface DeleteResolverQueryLogConfigResponse {
1177
+ Arn?: Arn;
464
1178
  /**
465
- * Information about the query logging configuration that you deleted, including the status of the request.
1179
+ * The name of the rule group.
466
1180
  */
467
- ResolverQueryLogConfig?: ResolverQueryLogConfig;
468
- }
469
- export interface DeleteResolverRuleRequest {
1181
+ Name?: Name;
470
1182
  /**
471
- * The ID of the Resolver rule that you want to delete.
1183
+ * The AWS account ID for the account that created the rule group. When a rule group is shared with your account, this is the account that has shared the rule group with you.
472
1184
  */
473
- ResolverRuleId: ResourceId;
474
- }
475
- export interface DeleteResolverRuleResponse {
1185
+ OwnerId?: AccountId;
476
1186
  /**
477
- * Information about the DeleteResolverRule request, including the status of the request.
1187
+ * A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.
478
1188
  */
479
- ResolverRule?: ResolverRule;
480
- }
481
- export type DestinationArn = string;
482
- export interface DisassociateResolverEndpointIpAddressRequest {
1189
+ CreatorRequestId?: CreatorRequestId;
483
1190
  /**
484
- * The ID of the Resolver endpoint that you want to disassociate an IP address from.
1191
+ * Whether the rule group is shared with other AWS accounts, or was shared with the current account by another AWS account. Sharing is configured through AWS Resource Access Manager (AWS RAM).
485
1192
  */
486
- ResolverEndpointId: ResourceId;
1193
+ ShareStatus?: ShareStatus;
1194
+ }
1195
+ export type FirewallRuleGroupMetadataList = FirewallRuleGroupMetadata[];
1196
+ export type FirewallRuleGroupPolicy = string;
1197
+ export type FirewallRuleGroupStatus = "COMPLETE"|"DELETING"|"UPDATING"|string;
1198
+ export type FirewallRules = FirewallRule[];
1199
+ export interface GetFirewallConfigRequest {
487
1200
  /**
488
- * The IPv4 address that you want to remove from a Resolver endpoint.
1201
+ * The ID of the Amazon virtual private cloud (VPC) that the configuration is for.
489
1202
  */
490
- IpAddress: IpAddressUpdate;
1203
+ ResourceId: ResourceId;
491
1204
  }
492
- export interface DisassociateResolverEndpointIpAddressResponse {
1205
+ export interface GetFirewallConfigResponse {
493
1206
  /**
494
- * The response to an DisassociateResolverEndpointIpAddress request.
1207
+ * Configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
495
1208
  */
496
- ResolverEndpoint?: ResolverEndpoint;
1209
+ FirewallConfig?: FirewallConfig;
497
1210
  }
498
- export interface DisassociateResolverQueryLogConfigRequest {
1211
+ export interface GetFirewallDomainListRequest {
499
1212
  /**
500
- * The ID of the query logging configuration that you want to disassociate a specified VPC from.
1213
+ * The ID of the domain list.
501
1214
  */
502
- ResolverQueryLogConfigId: ResourceId;
1215
+ FirewallDomainListId: ResourceId;
1216
+ }
1217
+ export interface GetFirewallDomainListResponse {
503
1218
  /**
504
- * The ID of the Amazon VPC that you want to disassociate from a specified query logging configuration.
1219
+ * The domain list that you requested.
505
1220
  */
506
- ResourceId: ResourceId;
1221
+ FirewallDomainList?: FirewallDomainList;
507
1222
  }
508
- export interface DisassociateResolverQueryLogConfigResponse {
1223
+ export interface GetFirewallRuleGroupAssociationRequest {
509
1224
  /**
510
- * A complex type that contains settings for the association that you deleted between an Amazon VPC and a query logging configuration.
1225
+ * The identifier of the FirewallRuleGroupAssociation.
511
1226
  */
512
- ResolverQueryLogConfigAssociation?: ResolverQueryLogConfigAssociation;
1227
+ FirewallRuleGroupAssociationId: ResourceId;
513
1228
  }
514
- export interface DisassociateResolverRuleRequest {
1229
+ export interface GetFirewallRuleGroupAssociationResponse {
515
1230
  /**
516
- * The ID of the VPC that you want to disassociate the Resolver rule from.
1231
+ * The association that you requested.
517
1232
  */
518
- VPCId: ResourceId;
1233
+ FirewallRuleGroupAssociation?: FirewallRuleGroupAssociation;
1234
+ }
1235
+ export interface GetFirewallRuleGroupPolicyRequest {
519
1236
  /**
520
- * The ID of the Resolver rule that you want to disassociate from the specified VPC.
1237
+ * The ARN (Amazon Resource Name) for the rule group.
521
1238
  */
522
- ResolverRuleId: ResourceId;
1239
+ Arn: Arn;
523
1240
  }
524
- export interface DisassociateResolverRuleResponse {
1241
+ export interface GetFirewallRuleGroupPolicyResponse {
525
1242
  /**
526
- * Information about the DisassociateResolverRule request, including the status of the request.
1243
+ * The AWS Identity and Access Management (AWS IAM) policy for sharing the specified rule group. You can use the policy to share the rule group using AWS Resource Access Manager (RAM).
527
1244
  */
528
- ResolverRuleAssociation?: ResolverRuleAssociation;
1245
+ FirewallRuleGroupPolicy?: FirewallRuleGroupPolicy;
529
1246
  }
530
- export type DomainName = string;
531
- export interface Filter {
1247
+ export interface GetFirewallRuleGroupRequest {
532
1248
  /**
533
- * The name of the parameter that you want to use to filter objects. The valid values for Name depend on the action that you're including the filter in, ListResolverEndpoints, ListResolverRules, ListResolverRuleAssociations, ListResolverQueryLogConfigs, or ListResolverQueryLogConfigAssociations. In early versions of Resolver, values for Name were listed as uppercase, with underscore (_) delimiters. For example, CreatorRequestId was originally listed as CREATOR_REQUEST_ID. Uppercase values for Name are still supported. ListResolverEndpoints Valid values for Name include the following: CreatorRequestId: The value that you specified when you created the Resolver endpoint. Direction: Whether you want to return inbound or outbound Resolver endpoints. If you specify DIRECTION for Name, specify INBOUND or OUTBOUND for Values. HostVpcId: The ID of the VPC that inbound DNS queries pass through on the way from your network to your VPCs in a region, or the VPC that outbound queries pass through on the way from your VPCs to your network. In a CreateResolverEndpoint request, SubnetId indirectly identifies the VPC. In a GetResolverEndpoint request, the VPC ID for a Resolver endpoint is returned in the HostVPCId element. IpAddressCount: The number of IP addresses that you have associated with the Resolver endpoint. Name: The name of the Resolver endpoint. SecurityGroupIds: The IDs of the VPC security groups that you specified when you created the Resolver endpoint. Status: The status of the Resolver endpoint. If you specify Status for Name, specify one of the following status codes for Values: CREATING, OPERATIONAL, UPDATING, AUTO_RECOVERING, ACTION_NEEDED, or DELETING. For more information, see Status in ResolverEndpoint. ListResolverRules Valid values for Name include the following: CreatorRequestId: The value that you specified when you created the Resolver rule. DomainName: The domain name for which Resolver is forwarding DNS queries to your network. In the value that you specify for Values, include a trailing dot (.) after the domain name. For example, if the domain name is example.com, specify the following value. Note the "." after com: example.com. Name: The name of the Resolver rule. ResolverEndpointId: The ID of the Resolver endpoint that the Resolver rule is associated with. You can filter on the Resolver endpoint only for rules that have a value of FORWARD for RuleType. Status: The status of the Resolver rule. If you specify Status for Name, specify one of the following status codes for Values: COMPLETE, DELETING, UPDATING, or FAILED. Type: The type of the Resolver rule. If you specify TYPE for Name, specify FORWARD or SYSTEM for Values. ListResolverRuleAssociations Valid values for Name include the following: Name: The name of the Resolver rule association. ResolverRuleId: The ID of the Resolver rule that is associated with one or more VPCs. Status: The status of the Resolver rule association. If you specify Status for Name, specify one of the following status codes for Values: CREATING, COMPLETE, DELETING, or FAILED. VPCId: The ID of the VPC that the Resolver rule is associated with. ListResolverQueryLogConfigs Valid values for Name include the following: Arn: The ARN for the query logging configuration. AssociationCount: The number of VPCs that are associated with the query logging configuration. CreationTime: The date and time that the query logging configuration was created, in Unix time format and Coordinated Universal Time (UTC). CreatorRequestId: A unique string that identifies the request that created the query logging configuration. Destination: The AWS service that you want to forward query logs to. Valid values include the following: S3 CloudWatchLogs KinesisFirehose DestinationArn: The ARN of the location that Resolver is sending query logs to. This value can be the ARN for an S3 bucket, a CloudWatch Logs log group, or a Kinesis Data Firehose delivery stream. Id: The ID of the query logging configuration Name: The name of the query logging configuration OwnerId: The AWS account ID for the account that created the query logging configuration. ShareStatus: An indication of whether the query logging configuration is shared with other AWS accounts, or was shared with the current account by another AWS account. Valid values include: NOT_SHARED, SHARED_WITH_ME, or SHARED_BY_ME. Status: The status of the query logging configuration. If you specify Status for Name, specify the applicable status code for Values: CREATING, CREATED, DELETING, or FAILED. For more information, see Status. ListResolverQueryLogConfigAssociations Valid values for Name include the following: CreationTime: The date and time that the VPC was associated with the query logging configuration, in Unix time format and Coordinated Universal Time (UTC). Error: If the value of Status is FAILED, specify the cause: DESTINATION_NOT_FOUND or ACCESS_DENIED. Id: The ID of the query logging association. ResolverQueryLogConfigId: The ID of the query logging configuration that a VPC is associated with. ResourceId: The ID of the Amazon VPC that is associated with the query logging configuration. Status: The status of the query logging association. If you specify Status for Name, specify the applicable status code for Values: CREATING, CREATED, DELETING, or FAILED. For more information, see Status.
1249
+ * The unique identifier of the firewall rule group.
534
1250
  */
535
- Name?: FilterName;
1251
+ FirewallRuleGroupId: ResourceId;
1252
+ }
1253
+ export interface GetFirewallRuleGroupResponse {
536
1254
  /**
537
- * When you're using a List operation and you want the operation to return a subset of objects, such as Resolver endpoints or Resolver rules, the value of the parameter that you want to use to filter objects. For example, to list only inbound Resolver endpoints, specify Direction for Name and specify INBOUND for Values.
1255
+ * A collection of rules used to filter DNS network traffic.
538
1256
  */
539
- Values?: FilterValues;
1257
+ FirewallRuleGroup?: FirewallRuleGroup;
540
1258
  }
541
- export type FilterName = string;
542
- export type FilterValue = string;
543
- export type FilterValues = FilterValue[];
544
- export type Filters = Filter[];
545
1259
  export interface GetResolverDnssecConfigRequest {
546
1260
  /**
547
1261
  * The ID of the virtual private cloud (VPC) for the DNSSEC validation status.
@@ -638,6 +1352,38 @@ declare namespace Route53Resolver {
638
1352
  */
639
1353
  ResolverRule?: ResolverRule;
640
1354
  }
1355
+ export interface ImportFirewallDomainsRequest {
1356
+ /**
1357
+ * The ID of the domain list that you want to modify with the import operation.
1358
+ */
1359
+ FirewallDomainListId: ResourceId;
1360
+ /**
1361
+ * What you want DNS Firewall to do with the domains that are listed in the file. This must be set to REPLACE, which updates the domain list to exactly match the list in the file.
1362
+ */
1363
+ Operation: FirewallDomainImportOperation;
1364
+ /**
1365
+ * The fully qualified URL or URI of the file stored in Amazon Simple Storage Service (S3) that contains the list of domains to import. The file must be in an S3 bucket that's in the same Region as your DNS Firewall. The file must be a text file and must contain a single domain per line.
1366
+ */
1367
+ DomainFileUrl: DomainListFileUrl;
1368
+ }
1369
+ export interface ImportFirewallDomainsResponse {
1370
+ /**
1371
+ * The Id of the firewall domain list that DNS Firewall just updated.
1372
+ */
1373
+ Id?: ResourceId;
1374
+ /**
1375
+ * The name of the domain list.
1376
+ */
1377
+ Name?: Name;
1378
+ /**
1379
+ *
1380
+ */
1381
+ Status?: FirewallDomainListStatus;
1382
+ /**
1383
+ * Additional information about the status of the list, if available.
1384
+ */
1385
+ StatusMessage?: StatusMessage;
1386
+ }
641
1387
  export type Ip = string;
642
1388
  export type IpAddressCount = number;
643
1389
  export interface IpAddressRequest {
@@ -697,6 +1443,160 @@ declare namespace Route53Resolver {
697
1443
  }
698
1444
  export type IpAddressesRequest = IpAddressRequest[];
699
1445
  export type IpAddressesResponse = IpAddressResponse[];
1446
+ export type ListDomainMaxResults = number;
1447
+ export type ListFirewallConfigsMaxResult = number;
1448
+ export interface ListFirewallConfigsRequest {
1449
+ /**
1450
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1451
+ */
1452
+ MaxResults?: ListFirewallConfigsMaxResult;
1453
+ /**
1454
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1455
+ */
1456
+ NextToken?: NextToken;
1457
+ }
1458
+ export interface ListFirewallConfigsResponse {
1459
+ /**
1460
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1461
+ */
1462
+ NextToken?: NextToken;
1463
+ /**
1464
+ * The configurations for the firewall behavior provided by DNS Firewall for Amazon virtual private clouds (VPC).
1465
+ */
1466
+ FirewallConfigs?: FirewallConfigList;
1467
+ }
1468
+ export interface ListFirewallDomainListsRequest {
1469
+ /**
1470
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1471
+ */
1472
+ MaxResults?: MaxResults;
1473
+ /**
1474
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1475
+ */
1476
+ NextToken?: NextToken;
1477
+ }
1478
+ export interface ListFirewallDomainListsResponse {
1479
+ /**
1480
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1481
+ */
1482
+ NextToken?: NextToken;
1483
+ /**
1484
+ * A list of the domain lists that you have defined. This might be a parital list of the domain lists that you've defined. For information, see MaxResults.
1485
+ */
1486
+ FirewallDomainLists?: FirewallDomainListMetadataList;
1487
+ }
1488
+ export interface ListFirewallDomainsRequest {
1489
+ /**
1490
+ * The ID of the domain list whose domains you want to retrieve.
1491
+ */
1492
+ FirewallDomainListId: ResourceId;
1493
+ /**
1494
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1495
+ */
1496
+ MaxResults?: ListDomainMaxResults;
1497
+ /**
1498
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1499
+ */
1500
+ NextToken?: NextToken;
1501
+ }
1502
+ export interface ListFirewallDomainsResponse {
1503
+ /**
1504
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1505
+ */
1506
+ NextToken?: NextToken;
1507
+ /**
1508
+ * A list of the domains in the firewall domain list. This might be a parital list of the domains that you've defined in the domain list. For information, see MaxResults.
1509
+ */
1510
+ Domains?: FirewallDomains;
1511
+ }
1512
+ export interface ListFirewallRuleGroupAssociationsRequest {
1513
+ /**
1514
+ * The unique identifier of the firewall rule group that you want to retrieve the associations for. Leave this blank to retrieve associations for any rule group.
1515
+ */
1516
+ FirewallRuleGroupId?: ResourceId;
1517
+ /**
1518
+ * The unique identifier of the VPC that you want to retrieve the associations for. Leave this blank to retrieve associations for any VPC.
1519
+ */
1520
+ VpcId?: ResourceId;
1521
+ /**
1522
+ * The setting that determines the processing order of the rule group among the rule groups that are associated with a single VPC. DNS Firewall filters VPC traffic starting from rule group with the lowest numeric priority setting.
1523
+ */
1524
+ Priority?: Priority;
1525
+ /**
1526
+ * The association Status setting that you want DNS Firewall to filter on for the list. If you don't specify this, then DNS Firewall returns all associations, regardless of status.
1527
+ */
1528
+ Status?: FirewallRuleGroupAssociationStatus;
1529
+ /**
1530
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1531
+ */
1532
+ MaxResults?: MaxResults;
1533
+ /**
1534
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1535
+ */
1536
+ NextToken?: NextToken;
1537
+ }
1538
+ export interface ListFirewallRuleGroupAssociationsResponse {
1539
+ /**
1540
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1541
+ */
1542
+ NextToken?: NextToken;
1543
+ /**
1544
+ * A list of your firewall rule group associations. This might be a partial list of the associations that you have defined. For information, see MaxResults.
1545
+ */
1546
+ FirewallRuleGroupAssociations?: FirewallRuleGroupAssociations;
1547
+ }
1548
+ export interface ListFirewallRuleGroupsRequest {
1549
+ /**
1550
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1551
+ */
1552
+ MaxResults?: MaxResults;
1553
+ /**
1554
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1555
+ */
1556
+ NextToken?: NextToken;
1557
+ }
1558
+ export interface ListFirewallRuleGroupsResponse {
1559
+ /**
1560
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1561
+ */
1562
+ NextToken?: NextToken;
1563
+ /**
1564
+ * A list of your firewall rule groups. This might be a partial list of the rule groups that you have defined. For information, see MaxResults.
1565
+ */
1566
+ FirewallRuleGroups?: FirewallRuleGroupMetadataList;
1567
+ }
1568
+ export interface ListFirewallRulesRequest {
1569
+ /**
1570
+ * The unique identifier of the firewall rule group that you want to retrieve the rules for.
1571
+ */
1572
+ FirewallRuleGroupId: ResourceId;
1573
+ /**
1574
+ * Optional additional filter for the rules to retrieve. The setting that determines the processing order of the rules in a rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting.
1575
+ */
1576
+ Priority?: Priority;
1577
+ /**
1578
+ * Optional additional filter for the rules to retrieve. The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list: ALLOW - Permit the request to go through. ALERT - Permit the request to go through but send an alert to the logs. BLOCK - Disallow the request. If this is specified, additional handling details are provided in the rule's BlockResponse setting.
1579
+ */
1580
+ Action?: Action;
1581
+ /**
1582
+ * The maximum number of objects that you want Resolver to return for this request. If more objects are available, in the response, Resolver provides a NextToken value that you can use in a subsequent call to get the next batch of objects. If you don't specify a value for MaxResults, Resolver returns up to 100 objects.
1583
+ */
1584
+ MaxResults?: MaxResults;
1585
+ /**
1586
+ * For the first call to this list request, omit this value. When you request a list of objects, Resolver returns at most the number of objects specified in MaxResults. If more objects are available for retrieval, Resolver returns a NextToken value in the response. To retrieve the next batch of objects, use the token that was returned for the prior request in your next request.
1587
+ */
1588
+ NextToken?: NextToken;
1589
+ }
1590
+ export interface ListFirewallRulesResponse {
1591
+ /**
1592
+ * If objects are still available for retrieval, Resolver returns this token in the response. To retrieve the next batch of objects, provide this token in your next request.
1593
+ */
1594
+ NextToken?: NextToken;
1595
+ /**
1596
+ * A list of the rules that you have defined. This might be a parital list of the firewall rules that you've defined. For information, see MaxResults.
1597
+ */
1598
+ FirewallRules?: FirewallRules;
1599
+ }
700
1600
  export interface ListResolverDnssecConfigsRequest {
701
1601
  /**
702
1602
  * Optional: An integer that specifies the maximum number of DNSSEC configuration results that you want Amazon Route 53 to return. If you don't specify a value for MaxResults, Route 53 returns up to 100 configuration per page.
@@ -938,9 +1838,27 @@ declare namespace Route53Resolver {
938
1838
  NextToken?: NextToken;
939
1839
  }
940
1840
  export type MaxResults = number;
1841
+ export type MutationProtectionStatus = "ENABLED"|"DISABLED"|string;
941
1842
  export type Name = string;
942
1843
  export type NextToken = string;
943
1844
  export type Port = number;
1845
+ export type Priority = number;
1846
+ export interface PutFirewallRuleGroupPolicyRequest {
1847
+ /**
1848
+ * The ARN (Amazon Resource Name) for the rule group that you want to share.
1849
+ */
1850
+ Arn: Arn;
1851
+ /**
1852
+ * The AWS Identity and Access Management (AWS IAM) policy to attach to the rule group.
1853
+ */
1854
+ FirewallRuleGroupPolicy: FirewallRuleGroupPolicy;
1855
+ }
1856
+ export interface PutFirewallRuleGroupPolicyResponse {
1857
+ /**
1858
+ *
1859
+ */
1860
+ ReturnValue?: Boolean;
1861
+ }
944
1862
  export interface PutResolverQueryLogConfigPolicyRequest {
945
1863
  /**
946
1864
  * The Amazon Resource Name (ARN) of the account that you want to share rules with.
@@ -1233,6 +2151,7 @@ declare namespace Route53Resolver {
1233
2151
  export type Rfc3339TimeString = string;
1234
2152
  export type RuleTypeOption = "FORWARD"|"SYSTEM"|"RECURSIVE"|string;
1235
2153
  export type SecurityGroupIds = ResourceId[];
2154
+ export type ServicePrinciple = string;
1236
2155
  export type ShareStatus = "NOT_SHARED"|"SHARED_WITH_ME"|"SHARED_BY_ME"|string;
1237
2156
  export type SortByKey = string;
1238
2157
  export type SortOrder = "ASCENDING"|"DESCENDING"|string;
@@ -1275,6 +2194,7 @@ declare namespace Route53Resolver {
1275
2194
  Port?: Port;
1276
2195
  }
1277
2196
  export type TargetList = TargetAddress[];
2197
+ export type Unsigned = number;
1278
2198
  export interface UntagResourceRequest {
1279
2199
  /**
1280
2200
  * The Amazon Resource Name (ARN) for the resource that you want to remove tags from. To get the ARN for a resource, use the applicable Get or List command: GetResolverEndpoint GetResolverRule GetResolverRuleAssociation ListResolverEndpoints ListResolverRuleAssociations ListResolverRules
@@ -1287,6 +2207,122 @@ declare namespace Route53Resolver {
1287
2207
  }
1288
2208
  export interface UntagResourceResponse {
1289
2209
  }
2210
+ export interface UpdateFirewallConfigRequest {
2211
+ /**
2212
+ * The ID of the Amazon virtual private cloud (VPC) that the configuration is for.
2213
+ */
2214
+ ResourceId: ResourceId;
2215
+ /**
2216
+ * Determines how Route 53 Resolver handles queries during failures, for example when all traffic that is sent to DNS Firewall fails to receive a reply. By default, fail open is disabled, which means the failure mode is closed. This approach favors security over availability. DNS Firewall blocks queries that it is unable to evaluate properly. If you enable this option, the failure mode is open. This approach favors availability over security. DNS Firewall allows queries to proceed if it is unable to properly evaluate them. This behavior is only enforced for VPCs that have at least one DNS Firewall rule group association.
2217
+ */
2218
+ FirewallFailOpen: FirewallFailOpenStatus;
2219
+ }
2220
+ export interface UpdateFirewallConfigResponse {
2221
+ /**
2222
+ * Configuration of the firewall behavior provided by DNS Firewall for a single Amazon virtual private cloud (VPC).
2223
+ */
2224
+ FirewallConfig?: FirewallConfig;
2225
+ }
2226
+ export interface UpdateFirewallDomainsRequest {
2227
+ /**
2228
+ * The ID of the domain list whose domains you want to update.
2229
+ */
2230
+ FirewallDomainListId: ResourceId;
2231
+ /**
2232
+ * What you want DNS Firewall to do with the domains that you are providing: ADD - Add the domains to the ones that are already in the domain list. REMOVE - Search the domain list for the domains and remove them from the list. REPLACE - Update the domain list to exactly match the list that you are providing.
2233
+ */
2234
+ Operation: FirewallDomainUpdateOperation;
2235
+ /**
2236
+ * A list of domains to use in the update operation. Each domain specification in your domain list must satisfy the following requirements: It can optionally start with * (asterisk). With the exception of the optional starting asterisk, it must only contain the following characters: A-Z, a-z, 0-9, - (hyphen). It must be from 1-255 characters in length.
2237
+ */
2238
+ Domains: FirewallDomains;
2239
+ }
2240
+ export interface UpdateFirewallDomainsResponse {
2241
+ /**
2242
+ * The Id of the firewall domain list that DNS Firewall just updated.
2243
+ */
2244
+ Id?: ResourceId;
2245
+ /**
2246
+ * The name of the domain list.
2247
+ */
2248
+ Name?: Name;
2249
+ /**
2250
+ *
2251
+ */
2252
+ Status?: FirewallDomainListStatus;
2253
+ /**
2254
+ * Additional information about the status of the list, if available.
2255
+ */
2256
+ StatusMessage?: StatusMessage;
2257
+ }
2258
+ export interface UpdateFirewallRuleGroupAssociationRequest {
2259
+ /**
2260
+ * The identifier of the FirewallRuleGroupAssociation.
2261
+ */
2262
+ FirewallRuleGroupAssociationId: ResourceId;
2263
+ /**
2264
+ * The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from rule group with the lowest numeric priority setting. You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 100, 200, and so on. You can change the priority setting for a rule group association after you create it.
2265
+ */
2266
+ Priority?: Priority;
2267
+ /**
2268
+ * If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections.
2269
+ */
2270
+ MutationProtection?: MutationProtectionStatus;
2271
+ /**
2272
+ * The name of the rule group association.
2273
+ */
2274
+ Name?: Name;
2275
+ }
2276
+ export interface UpdateFirewallRuleGroupAssociationResponse {
2277
+ /**
2278
+ * The association that you just updated.
2279
+ */
2280
+ FirewallRuleGroupAssociation?: FirewallRuleGroupAssociation;
2281
+ }
2282
+ export interface UpdateFirewallRuleRequest {
2283
+ /**
2284
+ * The unique identifier of the firewall rule group for the rule.
2285
+ */
2286
+ FirewallRuleGroupId: ResourceId;
2287
+ /**
2288
+ * The ID of the domain list to use in the rule.
2289
+ */
2290
+ FirewallDomainListId: ResourceId;
2291
+ /**
2292
+ * The setting that determines the processing order of the rule in the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting. You must specify a unique priority for each rule in a rule group. To make it easier to insert rules later, leave space between the numbers, for example, use 100, 200, and so on. You can change the priority setting for the rules in a rule group at any time.
2293
+ */
2294
+ Priority?: Priority;
2295
+ /**
2296
+ * The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list: ALLOW - Permit the request to go through. ALERT - Permit the request to go through but send an alert to the logs. BLOCK - Disallow the request. This option requires additional details in the rule's BlockResponse.
2297
+ */
2298
+ Action?: Action;
2299
+ /**
2300
+ * The way that you want DNS Firewall to block the request. Used for the rule action setting BLOCK. NODATA - Respond indicating that the query was successful, but no response is available for it. NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist. OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings.
2301
+ */
2302
+ BlockResponse?: BlockResponse;
2303
+ /**
2304
+ * The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
2305
+ */
2306
+ BlockOverrideDomain?: BlockOverrideDomain;
2307
+ /**
2308
+ * The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
2309
+ */
2310
+ BlockOverrideDnsType?: BlockOverrideDnsType;
2311
+ /**
2312
+ * The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.
2313
+ */
2314
+ BlockOverrideTtl?: BlockOverrideTtl;
2315
+ /**
2316
+ * The name of the rule.
2317
+ */
2318
+ Name?: Name;
2319
+ }
2320
+ export interface UpdateFirewallRuleResponse {
2321
+ /**
2322
+ * The firewall rule that you just updated.
2323
+ */
2324
+ FirewallRule?: FirewallRule;
2325
+ }
1290
2326
  export interface UpdateResolverDnssecConfigRequest {
1291
2327
  /**
1292
2328
  * The ID of the virtual private cloud (VPC) that you're updating the DNSSEC validation status for.