/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include namespace Aws { namespace Route53Resolver { namespace Model { /** */ class UpdateFirewallConfigRequest : public Route53ResolverRequest { public: AWS_ROUTE53RESOLVER_API UpdateFirewallConfigRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "UpdateFirewallConfig"; } AWS_ROUTE53RESOLVER_API Aws::String SerializePayload() const override; AWS_ROUTE53RESOLVER_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** *

The ID of the VPC that the configuration is for.

*/ inline const Aws::String& GetResourceId() const{ return m_resourceId; } /** *

The ID of the VPC that the configuration is for.

*/ inline bool ResourceIdHasBeenSet() const { return m_resourceIdHasBeenSet; } /** *

The ID of the VPC that the configuration is for.

*/ inline void SetResourceId(const Aws::String& value) { m_resourceIdHasBeenSet = true; m_resourceId = value; } /** *

The ID of the VPC that the configuration is for.

*/ inline void SetResourceId(Aws::String&& value) { m_resourceIdHasBeenSet = true; m_resourceId = std::move(value); } /** *

The ID of the VPC that the configuration is for.

*/ inline void SetResourceId(const char* value) { m_resourceIdHasBeenSet = true; m_resourceId.assign(value); } /** *

The ID of the VPC that the configuration is for.

*/ inline UpdateFirewallConfigRequest& WithResourceId(const Aws::String& value) { SetResourceId(value); return *this;} /** *

The ID of the VPC that the configuration is for.

*/ inline UpdateFirewallConfigRequest& WithResourceId(Aws::String&& value) { SetResourceId(std::move(value)); return *this;} /** *

The ID of the VPC that the configuration is for.

*/ inline UpdateFirewallConfigRequest& WithResourceId(const char* value) { SetResourceId(value); return *this;} /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline const FirewallFailOpenStatus& GetFirewallFailOpen() const{ return m_firewallFailOpen; } /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline bool FirewallFailOpenHasBeenSet() const { return m_firewallFailOpenHasBeenSet; } /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline void SetFirewallFailOpen(const FirewallFailOpenStatus& value) { m_firewallFailOpenHasBeenSet = true; m_firewallFailOpen = value; } /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline void SetFirewallFailOpen(FirewallFailOpenStatus&& value) { m_firewallFailOpenHasBeenSet = true; m_firewallFailOpen = std::move(value); } /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline UpdateFirewallConfigRequest& WithFirewallFailOpen(const FirewallFailOpenStatus& value) { SetFirewallFailOpen(value); return *this;} /** *

Determines how Route 53 Resolver handles queries during failures, for example * when all traffic that is sent to DNS Firewall fails to receive a reply.

*
  • By default, fail open is disabled, which means the failure mode is * closed. This approach favors security over availability. DNS Firewall blocks * queries that it is unable to evaluate properly.

  • If you enable * this option, the failure mode is open. This approach favors availability over * security. DNS Firewall allows queries to proceed if it is unable to properly * evaluate them.

This behavior is only enforced for VPCs that * have at least one DNS Firewall rule group association.

*/ inline UpdateFirewallConfigRequest& WithFirewallFailOpen(FirewallFailOpenStatus&& value) { SetFirewallFailOpen(std::move(value)); return *this;} private: Aws::String m_resourceId; bool m_resourceIdHasBeenSet = false; FirewallFailOpenStatus m_firewallFailOpen; bool m_firewallFailOpenHasBeenSet = false; }; } // namespace Model } // namespace Route53Resolver } // namespace Aws