amazonka-route53resolver-2.0: Amazon Route 53 Resolver SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.Route53Resolver.Types.FirewallRule

Description

 
Synopsis

Documentation

data FirewallRule Source #

A single firewall rule in a rule group.

See: newFirewallRule smart constructor.

Constructors

FirewallRule' 

Fields

  • action :: Maybe Action

    The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:

    • ALLOW - Permit the request to go through.
    • ALERT - Permit the request to go through but send an alert to the logs.
    • BLOCK - Disallow the request. If this is specified, additional handling details are provided in the rule's BlockResponse setting.
  • blockOverrideDnsType :: Maybe BlockOverrideDnsType

    The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

  • blockOverrideDomain :: Maybe Text

    The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

  • blockOverrideTtl :: Maybe Int

    The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

  • blockResponse :: Maybe BlockResponse

    The way that you want DNS Firewall to block the request. Used for the rule action setting BLOCK.

    • NODATA - Respond indicating that the query was successful, but no response is available for it.
    • NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist.
    • OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings.
  • creationTime :: Maybe Text

    The date and time that the rule was created, in Unix time format and Coordinated Universal Time (UTC).

  • creatorRequestId :: Maybe Text

    A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.

  • firewallDomainListId :: Maybe Text

    The ID of the domain list that's used in the rule.

  • firewallRuleGroupId :: Maybe Text

    The unique identifier of the firewall rule group of the rule.

  • modificationTime :: Maybe Text

    The date and time that the rule was last modified, in Unix time format and Coordinated Universal Time (UTC).

  • name :: Maybe Text

    The name of the rule.

  • priority :: Maybe Int

    The priority of the rule in the rule group. This value must be unique within the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting.

Instances

Instances details
FromJSON FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

Generic FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

Associated Types

type Rep FirewallRule :: Type -> Type #

Read FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

Show FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

NFData FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

Methods

rnf :: FirewallRule -> () #

Eq FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

Hashable FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

type Rep FirewallRule Source # 
Instance details

Defined in Amazonka.Route53Resolver.Types.FirewallRule

type Rep FirewallRule = D1 ('MetaData "FirewallRule" "Amazonka.Route53Resolver.Types.FirewallRule" "amazonka-route53resolver-2.0-GFukx1WIgCPEXMh1BiYlp6" 'False) (C1 ('MetaCons "FirewallRule'" 'PrefixI 'True) (((S1 ('MetaSel ('Just "action") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Action)) :*: (S1 ('MetaSel ('Just "blockOverrideDnsType") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe BlockOverrideDnsType)) :*: S1 ('MetaSel ('Just "blockOverrideDomain") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)))) :*: (S1 ('MetaSel ('Just "blockOverrideTtl") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Int)) :*: (S1 ('MetaSel ('Just "blockResponse") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe BlockResponse)) :*: S1 ('MetaSel ('Just "creationTime") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text))))) :*: ((S1 ('MetaSel ('Just "creatorRequestId") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)) :*: (S1 ('MetaSel ('Just "firewallDomainListId") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)) :*: S1 ('MetaSel ('Just "firewallRuleGroupId") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)))) :*: (S1 ('MetaSel ('Just "modificationTime") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)) :*: (S1 ('MetaSel ('Just "name") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Text)) :*: S1 ('MetaSel ('Just "priority") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Int)))))))

newFirewallRule :: FirewallRule Source #

Create a value of FirewallRule with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:action:FirewallRule', firewallRule_action - The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:

  • ALLOW - Permit the request to go through.
  • ALERT - Permit the request to go through but send an alert to the logs.
  • BLOCK - Disallow the request. If this is specified, additional handling details are provided in the rule's BlockResponse setting.

$sel:blockOverrideDnsType:FirewallRule', firewallRule_blockOverrideDnsType - The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

$sel:blockOverrideDomain:FirewallRule', firewallRule_blockOverrideDomain - The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

$sel:blockOverrideTtl:FirewallRule', firewallRule_blockOverrideTtl - The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

$sel:blockResponse:FirewallRule', firewallRule_blockResponse - The way that you want DNS Firewall to block the request. Used for the rule action setting BLOCK.

  • NODATA - Respond indicating that the query was successful, but no response is available for it.
  • NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist.
  • OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings.

$sel:creationTime:FirewallRule', firewallRule_creationTime - The date and time that the rule was created, in Unix time format and Coordinated Universal Time (UTC).

$sel:creatorRequestId:FirewallRule', firewallRule_creatorRequestId - A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.

$sel:firewallDomainListId:FirewallRule', firewallRule_firewallDomainListId - The ID of the domain list that's used in the rule.

$sel:firewallRuleGroupId:FirewallRule', firewallRule_firewallRuleGroupId - The unique identifier of the firewall rule group of the rule.

$sel:modificationTime:FirewallRule', firewallRule_modificationTime - The date and time that the rule was last modified, in Unix time format and Coordinated Universal Time (UTC).

$sel:name:FirewallRule', firewallRule_name - The name of the rule.

$sel:priority:FirewallRule', firewallRule_priority - The priority of the rule in the rule group. This value must be unique within the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting.

firewallRule_action :: Lens' FirewallRule (Maybe Action) Source #

The action that DNS Firewall should take on a DNS query when it matches one of the domains in the rule's domain list:

  • ALLOW - Permit the request to go through.
  • ALERT - Permit the request to go through but send an alert to the logs.
  • BLOCK - Disallow the request. If this is specified, additional handling details are provided in the rule's BlockResponse setting.

firewallRule_blockOverrideDnsType :: Lens' FirewallRule (Maybe BlockOverrideDnsType) Source #

The DNS record's type. This determines the format of the record value that you provided in BlockOverrideDomain. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

firewallRule_blockOverrideDomain :: Lens' FirewallRule (Maybe Text) Source #

The custom DNS record to send back in response to the query. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

firewallRule_blockOverrideTtl :: Lens' FirewallRule (Maybe Int) Source #

The recommended amount of time, in seconds, for the DNS resolver or web browser to cache the provided override record. Used for the rule action BLOCK with a BlockResponse setting of OVERRIDE.

firewallRule_blockResponse :: Lens' FirewallRule (Maybe BlockResponse) Source #

The way that you want DNS Firewall to block the request. Used for the rule action setting BLOCK.

  • NODATA - Respond indicating that the query was successful, but no response is available for it.
  • NXDOMAIN - Respond indicating that the domain name that's in the query doesn't exist.
  • OVERRIDE - Provide a custom override in the response. This option requires custom handling details in the rule's BlockOverride* settings.

firewallRule_creationTime :: Lens' FirewallRule (Maybe Text) Source #

The date and time that the rule was created, in Unix time format and Coordinated Universal Time (UTC).

firewallRule_creatorRequestId :: Lens' FirewallRule (Maybe Text) Source #

A unique string defined by you to identify the request. This allows you to retry failed requests without the risk of executing the operation twice. This can be any unique string, for example, a timestamp.

firewallRule_firewallDomainListId :: Lens' FirewallRule (Maybe Text) Source #

The ID of the domain list that's used in the rule.

firewallRule_firewallRuleGroupId :: Lens' FirewallRule (Maybe Text) Source #

The unique identifier of the firewall rule group of the rule.

firewallRule_modificationTime :: Lens' FirewallRule (Maybe Text) Source #

The date and time that the rule was last modified, in Unix time format and Coordinated Universal Time (UTC).

firewallRule_priority :: Lens' FirewallRule (Maybe Int) Source #

The priority of the rule in the rule group. This value must be unique within the rule group. DNS Firewall processes the rules in a rule group by order of priority, starting from the lowest setting.