Skip to content

Commit

Permalink
docs(client-route53resolver): Update the DNS Firewall settings to cor…
Browse files Browse the repository at this point in the history
…rect a spelling issue.
  • Loading branch information
awstools committed May 9, 2024
1 parent efa9f25 commit b53cab3
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 13 deletions.
20 changes: 10 additions & 10 deletions clients/client-route53resolver/src/models/models_0.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1379,14 +1379,14 @@ export interface CreateFirewallRuleRequest {

/**
* <p>
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
* </p>
* <p>
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
* added to the allow domain list.</p>
* added to the domain list.</p>
* <p>
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the redirection list to
* the domain alloww list.</p>
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
* the domain list.</p>
* @public
*/
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;
Expand Down Expand Up @@ -1557,14 +1557,14 @@ export interface FirewallRule {

/**
* <p>
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
* </p>
* <p>
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
* added to the allow domain list.</p>
* added to the domain list.</p>
* <p>
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
* the domain alloww list.</p>
* the domain list.</p>
* @public
*/
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;
Expand Down Expand Up @@ -5648,14 +5648,14 @@ export interface UpdateFirewallRuleRequest {

/**
* <p>
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
* </p>
* <p>
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
* added to the allow domain list.</p>
* added to the domain list.</p>
* <p>
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
* the domain alloww list.</p>
* the domain list.</p>
* @public
*/
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;
Expand Down
6 changes: 3 additions & 3 deletions codegen/sdk-codegen/aws-models/route53resolver.json
Original file line number Diff line number Diff line change
Expand Up @@ -760,7 +760,7 @@
"FirewallDomainRedirectionAction": {
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
"traits": {
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the redirection list to \n\t\tthe domain alloww list.</p>"
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
}
},
"Qtype": {
Expand Down Expand Up @@ -2326,7 +2326,7 @@
"FirewallDomainRedirectionAction": {
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
"traits": {
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain alloww list.</p>"
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
}
},
"Qtype": {
Expand Down Expand Up @@ -8629,7 +8629,7 @@
"FirewallDomainRedirectionAction": {
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
"traits": {
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain alloww list.</p>"
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
}
},
"Qtype": {
Expand Down

0 comments on commit b53cab3

Please sign in to comment.