Skip to content

Commit b53cab3

Browse files
author
awstools
committed
docs(client-route53resolver): Update the DNS Firewall settings to correct a spelling issue.
1 parent efa9f25 commit b53cab3

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

clients/client-route53resolver/src/models/models_0.ts

+10-10
Original file line numberDiff line numberDiff line change
@@ -1379,14 +1379,14 @@ export interface CreateFirewallRuleRequest {
13791379

13801380
/**
13811381
* <p>
1382-
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
1382+
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
13831383
* </p>
13841384
* <p>
13851385
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1386-
* added to the allow domain list.</p>
1386+
* added to the domain list.</p>
13871387
* <p>
1388-
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the redirection list to
1389-
* the domain alloww list.</p>
1388+
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1389+
* the domain list.</p>
13901390
* @public
13911391
*/
13921392
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;
@@ -1557,14 +1557,14 @@ export interface FirewallRule {
15571557

15581558
/**
15591559
* <p>
1560-
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
1560+
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
15611561
* </p>
15621562
* <p>
15631563
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
1564-
* added to the allow domain list.</p>
1564+
* added to the domain list.</p>
15651565
* <p>
15661566
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
1567-
* the domain alloww list.</p>
1567+
* the domain list.</p>
15681568
* @public
15691569
*/
15701570
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;
@@ -5648,14 +5648,14 @@ export interface UpdateFirewallRuleRequest {
56485648

56495649
/**
56505650
* <p>
5651-
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS.
5651+
* How you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME.
56525652
* </p>
56535653
* <p>
56545654
* <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be
5655-
* added to the allow domain list.</p>
5655+
* added to the domain list.</p>
56565656
* <p>
56575657
* <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to
5658-
* the domain alloww list.</p>
5658+
* the domain list.</p>
56595659
* @public
56605660
*/
56615661
FirewallDomainRedirectionAction?: FirewallDomainRedirectionAction;

codegen/sdk-codegen/aws-models/route53resolver.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -760,7 +760,7 @@
760760
"FirewallDomainRedirectionAction": {
761761
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
762762
"traits": {
763-
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the redirection list to \n\t\tthe domain alloww list.</p>"
763+
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
764764
}
765765
},
766766
"Qtype": {
@@ -2326,7 +2326,7 @@
23262326
"FirewallDomainRedirectionAction": {
23272327
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
23282328
"traits": {
2329-
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain alloww list.</p>"
2329+
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
23302330
}
23312331
},
23322332
"Qtype": {
@@ -8629,7 +8629,7 @@
86298629
"FirewallDomainRedirectionAction": {
86308630
"target": "com.amazonaws.route53resolver#FirewallDomainRedirectionAction",
86318631
"traits": {
8632-
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME, DNAME, ot ALIAS. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the allow domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain alloww list.</p>"
8632+
"smithy.api#documentation": "<p>\n\t\t\tHow you want the the rule to evaluate DNS redirection in the DNS redirection chain, such as CNAME or DNAME. \n\t\t</p>\n <p>\n <code>Inspect_Redirection_Domain </code>(Default) inspects all domains in the redirection chain. The individual domains in the redirection chain must be \n\t\t\tadded to the domain list.</p>\n <p>\n <code>Trust_Redirection_Domain </code> inspects only the first domain in the redirection chain. You don't need to add the subsequent domains in the domain in the redirection list to \n\t\t\tthe domain list.</p>"
86338633
}
86348634
},
86358635
"Qtype": {

0 commit comments

Comments
 (0)