diff --git a/clients/client-route53resolver/src/commands/CreateResolverRuleCommand.ts b/clients/client-route53resolver/src/commands/CreateResolverRuleCommand.ts index 6bcb47838d6a..c8b7d097b172 100644 --- a/clients/client-route53resolver/src/commands/CreateResolverRuleCommand.ts +++ b/clients/client-route53resolver/src/commands/CreateResolverRuleCommand.ts @@ -47,6 +47,7 @@ export interface CreateResolverRuleCommandOutput extends CreateResolverRuleRespo * Port: Number("int"), * Ipv6: "STRING_VALUE", * Protocol: "DoH" || "Do53" || "DoH-FIPS", + * ServerNameIndication: "STRING_VALUE", * }, * ], * ResolverEndpointId: "STRING_VALUE", @@ -75,6 +76,7 @@ export interface CreateResolverRuleCommandOutput extends CreateResolverRuleRespo * // Port: Number("int"), * // Ipv6: "STRING_VALUE", * // Protocol: "DoH" || "Do53" || "DoH-FIPS", + * // ServerNameIndication: "STRING_VALUE", * // }, * // ], * // ResolverEndpointId: "STRING_VALUE", diff --git a/clients/client-route53resolver/src/commands/DeleteResolverRuleCommand.ts b/clients/client-route53resolver/src/commands/DeleteResolverRuleCommand.ts index 3adee0d443ff..01400e69df10 100644 --- a/clients/client-route53resolver/src/commands/DeleteResolverRuleCommand.ts +++ b/clients/client-route53resolver/src/commands/DeleteResolverRuleCommand.ts @@ -58,6 +58,7 @@ export interface DeleteResolverRuleCommandOutput extends DeleteResolverRuleRespo * // Port: Number("int"), * // Ipv6: "STRING_VALUE", * // Protocol: "DoH" || "Do53" || "DoH-FIPS", + * // ServerNameIndication: "STRING_VALUE", * // }, * // ], * // ResolverEndpointId: "STRING_VALUE", diff --git a/clients/client-route53resolver/src/commands/GetResolverRuleCommand.ts b/clients/client-route53resolver/src/commands/GetResolverRuleCommand.ts index 26ccd4962873..0e3b0a69c2a9 100644 --- a/clients/client-route53resolver/src/commands/GetResolverRuleCommand.ts +++ b/clients/client-route53resolver/src/commands/GetResolverRuleCommand.ts @@ -57,6 +57,7 @@ export interface GetResolverRuleCommandOutput extends GetResolverRuleResponse, _ * // Port: Number("int"), * // Ipv6: "STRING_VALUE", * // Protocol: "DoH" || "Do53" || "DoH-FIPS", + * // ServerNameIndication: "STRING_VALUE", * // }, * // ], * // ResolverEndpointId: "STRING_VALUE", diff --git a/clients/client-route53resolver/src/commands/ListResolverRulesCommand.ts b/clients/client-route53resolver/src/commands/ListResolverRulesCommand.ts index 89c3e6ba2f5e..53ad58b14fda 100644 --- a/clients/client-route53resolver/src/commands/ListResolverRulesCommand.ts +++ b/clients/client-route53resolver/src/commands/ListResolverRulesCommand.ts @@ -68,6 +68,7 @@ export interface ListResolverRulesCommandOutput extends ListResolverRulesRespons * // Port: Number("int"), * // Ipv6: "STRING_VALUE", * // Protocol: "DoH" || "Do53" || "DoH-FIPS", + * // ServerNameIndication: "STRING_VALUE", * // }, * // ], * // ResolverEndpointId: "STRING_VALUE", diff --git a/clients/client-route53resolver/src/commands/UpdateResolverRuleCommand.ts b/clients/client-route53resolver/src/commands/UpdateResolverRuleCommand.ts index 76df294bddd4..55785f651ca3 100644 --- a/clients/client-route53resolver/src/commands/UpdateResolverRuleCommand.ts +++ b/clients/client-route53resolver/src/commands/UpdateResolverRuleCommand.ts @@ -46,6 +46,7 @@ export interface UpdateResolverRuleCommandOutput extends UpdateResolverRuleRespo * Port: Number("int"), * Ipv6: "STRING_VALUE", * Protocol: "DoH" || "Do53" || "DoH-FIPS", + * ServerNameIndication: "STRING_VALUE", * }, * ], * ResolverEndpointId: "STRING_VALUE", @@ -69,6 +70,7 @@ export interface UpdateResolverRuleCommandOutput extends UpdateResolverRuleRespo * // Port: Number("int"), * // Ipv6: "STRING_VALUE", * // Protocol: "DoH" || "Do53" || "DoH-FIPS", + * // ServerNameIndication: "STRING_VALUE", * // }, * // ], * // ResolverEndpointId: "STRING_VALUE", diff --git a/clients/client-route53resolver/src/models/models_0.ts b/clients/client-route53resolver/src/models/models_0.ts index d44e8eda09f2..3b76906aacc8 100644 --- a/clients/client-route53resolver/src/models/models_0.ts +++ b/clients/client-route53resolver/src/models/models_0.ts @@ -2149,11 +2149,11 @@ export interface CreateResolverQueryLogConfigRequest { *
* S3 bucket:
*
- * arn:aws:s3:::examplebucket
+ * arn:aws:s3:::amzn-s3-demo-bucket
*
You can optionally append a file prefix to the end of the ARN.
*
- * arn:aws:s3:::examplebucket/development/
+ * arn:aws:s3:::amzn-s3-demo-bucket/development/
*
+ * The Server Name Indication of the DoH server that you want to forward queries to.
+ * This is only used if the Protocol of the TargetAddress
is DoH
.
+ *
If you set up a firewall BLOCK rule with action NXDOMAIN on query type equals AAAA, + * this action will not be applied to synthetic IPv6 addresses generated when DNS64 is enabled.
+ *The ARN of the resource that you want Resolver to send query logs. You can send query logs to an S3 bucket, a CloudWatch Logs log group, \n\t\t\tor a Kinesis Data Firehose delivery stream. Examples of valid values include the following:
\n\n S3 bucket:
\n\n arn:aws:s3:::examplebucket
\n
You can optionally append a file prefix to the end of the ARN.
\n\n arn:aws:s3:::examplebucket/development/
\n
\n CloudWatch Logs log group:
\n\n arn:aws:logs:us-west-1:123456789012:log-group:/mystack-testgroup-12ABC1AB12A1:*
\n
\n Kinesis Data Firehose delivery stream:
\n\n arn:aws:kinesis:us-east-2:0123456789:stream/my_stream_name
\n
The ARN of the resource that you want Resolver to send query logs. You can send query logs to an S3 bucket, a CloudWatch Logs log group, \n\t\t\tor a Kinesis Data Firehose delivery stream. Examples of valid values include the following:
\n\n S3 bucket:
\n\n arn:aws:s3:::amzn-s3-demo-bucket
\n
You can optionally append a file prefix to the end of the ARN.
\n\n arn:aws:s3:::amzn-s3-demo-bucket/development/
\n
\n CloudWatch Logs log group:
\n\n arn:aws:logs:us-west-1:123456789012:log-group:/mystack-testgroup-12ABC1AB12A1:*
\n
\n Kinesis Data Firehose delivery stream:
\n\n arn:aws:kinesis:us-east-2:0123456789:stream/my_stream_name
\n
\n\t\t\tThe protocols for the Resolver endpoints. DoH-FIPS is applicable for inbound endpoints only.\n\t\t\t\n\t\t
\nFor an inbound endpoint you can apply the protocols as follows:
\nDo53 and DoH in combination.
\nDo53 and DoH-FIPS in combination.
\nDo53 alone.
\nDoH alone.
\nDoH-FIPS alone.
\nNone, which is treated as Do53.
\nFor an outbound endpoint you can apply the protocols as follows:
\nDo53 and DoH in combination.
\nDo53 alone.
\nDoH alone.
\nNone, which is treated as Do53.
\n\n\t\t\tThe Server Name Indication of the DoH server that you want to forward queries to. \n\t\t\tThis is only used if the Protocol of the TargetAddress
is DoH
.\n\t\t
\n\t\t\tThe DNS query type you want the rule to evaluate. Allowed values are;\n\t\t
\n\n\t\t\t\tA: Returns an IPv4 address.
\nAAAA: Returns an Ipv6 address.
\nCAA: Restricts CAs that can create SSL/TLS certifications for the domain.
\nCNAME: Returns another domain name.
\nDS: Record that identifies the DNSSEC signing key of a delegated zone.
\nMX: Specifies mail servers.
\nNAPTR: Regular-expression-based rewriting of domain names.
\nNS: Authoritative name servers.
\nPTR: Maps an IP address to a domain name.
\nSOA: Start of authority record for the zone.
\nSPF: Lists the servers authorized to send emails from a domain.
\nSRV: Application specific values that identify servers.
\nTXT: Verifies email senders and application-specific values.
\nA query type you define by using the DNS type ID, for example 28 for AAAA. The values must be\n\t\t\t\tdefined as TYPENUMBER, where the\n\t\t\t\tNUMBER can be 1-65334, for\n\t\t\t\texample, TYPE28. For more information, see \n\t\t\t\tList of DNS record types.
\n\n\t\t\tThe DNS query type you want the rule to evaluate. Allowed values are;\n\t\t
\n\n\t\t\t\tA: Returns an IPv4 address.
\nAAAA: Returns an Ipv6 address.
\nCAA: Restricts CAs that can create SSL/TLS certifications for the domain.
\nCNAME: Returns another domain name.
\nDS: Record that identifies the DNSSEC signing key of a delegated zone.
\nMX: Specifies mail servers.
\nNAPTR: Regular-expression-based rewriting of domain names.
\nNS: Authoritative name servers.
\nPTR: Maps an IP address to a domain name.
\nSOA: Start of authority record for the zone.
\nSPF: Lists the servers authorized to send emails from a domain.
\nSRV: Application specific values that identify servers.
\nTXT: Verifies email senders and application-specific values.
\nA query type you define by using the DNS type ID, for example 28 for AAAA. The values must be\n\t\t\t\tdefined as TYPENUMBER, where the\n\t\t\t\tNUMBER can be 1-65334, for\n\t\t\t\texample, TYPE28. For more information, see \n\t\t\t\tList of DNS record types.
\nIf you set up a firewall BLOCK rule with action NXDOMAIN on query type equals AAAA, \n\t\t\t\t\tthis action will not be applied to synthetic IPv6 addresses generated when DNS64 is enabled.
\n