aws-cdk.aws-route53resolver-alpha


Nameaws-cdk.aws-route53resolver-alpha JSON
Version 2.170.0a0 PyPI version JSON
download
home_pagehttps://github.com/aws/aws-cdk
SummaryThe CDK Construct Library for AWS::Route53Resolver
upload_time2024-11-22 04:42:41
maintainerNone
docs_urlNone
authorAmazon Web Services
requires_python~=3.8
licenseApache-2.0
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Amazon Route53 Resolver Construct Library

<!--BEGIN STABILITY BANNER-->---


![cdk-constructs: Experimental](https://img.shields.io/badge/cdk--constructs-experimental-important.svg?style=for-the-badge)

> The APIs of higher level constructs in this module are experimental and under active development.
> They are subject to non-backward compatible changes or removal in any future version. These are
> not subject to the [Semantic Versioning](https://semver.org/) model and breaking changes will be
> announced in the release notes. This means that while you may use them, you may need to update
> your source code when upgrading to a newer version of this package.

---
<!--END STABILITY BANNER-->

## DNS Firewall

With Route 53 Resolver DNS Firewall, you can filter and regulate outbound DNS traffic for your
virtual private connections (VPCs). To do this, you create reusable collections of filtering rules
in DNS Firewall rule groups and associate the rule groups to your VPC.

DNS Firewall provides protection for outbound DNS requests from your VPCs. These requests route
through Resolver for domain name resolution. A primary use of DNS Firewall protections is to help
prevent DNS exfiltration of your data. DNS exfiltration can happen when a bad actor compromises
an application instance in your VPC and then uses DNS lookup to send data out of the VPC to a domain
that they control. With DNS Firewall, you can monitor and control the domains that your applications
can query. You can deny access to the domains that you know to be bad and allow all other queries
to pass through. Alternately, you can deny access to all domains except for the ones that you
explicitly trust.

### Domain lists

Domain lists can be created using a list of strings, a text file stored in Amazon S3 or a local
text file:

```python
block_list = route53resolver.FirewallDomainList(self, "BlockList",
    domains=route53resolver.FirewallDomains.from_list(["bad-domain.com", "bot-domain.net"])
)

s3_list = route53resolver.FirewallDomainList(self, "S3List",
    domains=route53resolver.FirewallDomains.from_s3_url("s3://bucket/prefix/object")
)

asset_list = route53resolver.FirewallDomainList(self, "AssetList",
    domains=route53resolver.FirewallDomains.from_asset("/path/to/domains.txt")
)
```

The file must be a text file and must contain a single domain per line.

Use `FirewallDomainList.fromFirewallDomainListId()` to import an existing or [AWS managed domain list](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-dns-firewall-managed-domain-lists.html):

```python
# AWSManagedDomainsMalwareDomainList in us-east-1
malware_list = route53resolver.FirewallDomainList.from_firewall_domain_list_id(self, "Malware", "rslvr-fdl-2c46f2ecbfec4dcc")
```

### Rule group

Create a rule group:

```python
# my_block_list: route53resolver.FirewallDomainList

route53resolver.FirewallRuleGroup(self, "RuleGroup",
    rules=[route53resolver.FirewallRule(
        priority=10,
        firewall_domain_list=my_block_list,
        # block and reply with NODATA
        action=route53resolver.FirewallRuleAction.block()
    )
    ]
)
```

Rules can be added at construction time or using `addRule()`:

```python
# my_block_list: route53resolver.FirewallDomainList
# rule_group: route53resolver.FirewallRuleGroup


rule_group.add_rule(
    priority=10,
    firewall_domain_list=my_block_list,
    # block and reply with NXDOMAIN
    action=route53resolver.FirewallRuleAction.block(route53resolver.DnsBlockResponse.nx_domain())
)

rule_group.add_rule(
    priority=20,
    firewall_domain_list=my_block_list,
    # block and override DNS response with a custom domain
    action=route53resolver.FirewallRuleAction.block(route53resolver.DnsBlockResponse.override("amazon.com"))
)
```

Use `associate()` to associate a rule group with a VPC:

```python
import aws_cdk.aws_ec2 as ec2

# rule_group: route53resolver.FirewallRuleGroup
# my_vpc: ec2.Vpc


rule_group.associate("Association",
    priority=101,
    vpc=my_vpc
)
```

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/aws/aws-cdk",
    "name": "aws-cdk.aws-route53resolver-alpha",
    "maintainer": null,
    "docs_url": null,
    "requires_python": "~=3.8",
    "maintainer_email": null,
    "keywords": null,
    "author": "Amazon Web Services",
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/35/a0/a8167f7c0d3d7d4aa9557d27c31c38fb8a026b21b012854bead889d5cbe1/aws_cdk_aws_route53resolver_alpha-2.170.0a0.tar.gz",
    "platform": null,
    "description": "# Amazon Route53 Resolver Construct Library\n\n<!--BEGIN STABILITY BANNER-->---\n\n\n![cdk-constructs: Experimental](https://img.shields.io/badge/cdk--constructs-experimental-important.svg?style=for-the-badge)\n\n> The APIs of higher level constructs in this module are experimental and under active development.\n> They are subject to non-backward compatible changes or removal in any future version. These are\n> not subject to the [Semantic Versioning](https://semver.org/) model and breaking changes will be\n> announced in the release notes. This means that while you may use them, you may need to update\n> your source code when upgrading to a newer version of this package.\n\n---\n<!--END STABILITY BANNER-->\n\n## DNS Firewall\n\nWith Route 53 Resolver DNS Firewall, you can filter and regulate outbound DNS traffic for your\nvirtual private connections (VPCs). To do this, you create reusable collections of filtering rules\nin DNS Firewall rule groups and associate the rule groups to your VPC.\n\nDNS Firewall provides protection for outbound DNS requests from your VPCs. These requests route\nthrough Resolver for domain name resolution. A primary use of DNS Firewall protections is to help\nprevent DNS exfiltration of your data. DNS exfiltration can happen when a bad actor compromises\nan application instance in your VPC and then uses DNS lookup to send data out of the VPC to a domain\nthat they control. With DNS Firewall, you can monitor and control the domains that your applications\ncan query. You can deny access to the domains that you know to be bad and allow all other queries\nto pass through. Alternately, you can deny access to all domains except for the ones that you\nexplicitly trust.\n\n### Domain lists\n\nDomain lists can be created using a list of strings, a text file stored in Amazon S3 or a local\ntext file:\n\n```python\nblock_list = route53resolver.FirewallDomainList(self, \"BlockList\",\n    domains=route53resolver.FirewallDomains.from_list([\"bad-domain.com\", \"bot-domain.net\"])\n)\n\ns3_list = route53resolver.FirewallDomainList(self, \"S3List\",\n    domains=route53resolver.FirewallDomains.from_s3_url(\"s3://bucket/prefix/object\")\n)\n\nasset_list = route53resolver.FirewallDomainList(self, \"AssetList\",\n    domains=route53resolver.FirewallDomains.from_asset(\"/path/to/domains.txt\")\n)\n```\n\nThe file must be a text file and must contain a single domain per line.\n\nUse `FirewallDomainList.fromFirewallDomainListId()` to import an existing or [AWS managed domain list](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-dns-firewall-managed-domain-lists.html):\n\n```python\n# AWSManagedDomainsMalwareDomainList in us-east-1\nmalware_list = route53resolver.FirewallDomainList.from_firewall_domain_list_id(self, \"Malware\", \"rslvr-fdl-2c46f2ecbfec4dcc\")\n```\n\n### Rule group\n\nCreate a rule group:\n\n```python\n# my_block_list: route53resolver.FirewallDomainList\n\nroute53resolver.FirewallRuleGroup(self, \"RuleGroup\",\n    rules=[route53resolver.FirewallRule(\n        priority=10,\n        firewall_domain_list=my_block_list,\n        # block and reply with NODATA\n        action=route53resolver.FirewallRuleAction.block()\n    )\n    ]\n)\n```\n\nRules can be added at construction time or using `addRule()`:\n\n```python\n# my_block_list: route53resolver.FirewallDomainList\n# rule_group: route53resolver.FirewallRuleGroup\n\n\nrule_group.add_rule(\n    priority=10,\n    firewall_domain_list=my_block_list,\n    # block and reply with NXDOMAIN\n    action=route53resolver.FirewallRuleAction.block(route53resolver.DnsBlockResponse.nx_domain())\n)\n\nrule_group.add_rule(\n    priority=20,\n    firewall_domain_list=my_block_list,\n    # block and override DNS response with a custom domain\n    action=route53resolver.FirewallRuleAction.block(route53resolver.DnsBlockResponse.override(\"amazon.com\"))\n)\n```\n\nUse `associate()` to associate a rule group with a VPC:\n\n```python\nimport aws_cdk.aws_ec2 as ec2\n\n# rule_group: route53resolver.FirewallRuleGroup\n# my_vpc: ec2.Vpc\n\n\nrule_group.associate(\"Association\",\n    priority=101,\n    vpc=my_vpc\n)\n```\n",
    "bugtrack_url": null,
    "license": "Apache-2.0",
    "summary": "The CDK Construct Library for AWS::Route53Resolver",
    "version": "2.170.0a0",
    "project_urls": {
        "Homepage": "https://github.com/aws/aws-cdk",
        "Source": "https://github.com/aws/aws-cdk.git"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "68fab5b18ae80d1094197f8551af2c366b0e0092d34a125575afb9e06e675ff9",
                "md5": "4ebac3c91817cd6bf371d6ccea41501c",
                "sha256": "520608908c55a499b3147f7dd0abe09de0084e130efe9baf962e1b26afdbf6db"
            },
            "downloads": -1,
            "filename": "aws_cdk.aws_route53resolver_alpha-2.170.0a0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "4ebac3c91817cd6bf371d6ccea41501c",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": "~=3.8",
            "size": 64027,
            "upload_time": "2024-11-22T04:41:56",
            "upload_time_iso_8601": "2024-11-22T04:41:56.737752Z",
            "url": "https://files.pythonhosted.org/packages/68/fa/b5b18ae80d1094197f8551af2c366b0e0092d34a125575afb9e06e675ff9/aws_cdk.aws_route53resolver_alpha-2.170.0a0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "35a0a8167f7c0d3d7d4aa9557d27c31c38fb8a026b21b012854bead889d5cbe1",
                "md5": "3576441ddd715e288e37a2938e511ace",
                "sha256": "23d7082881fc48ce61c1334ba126d78aa0aec29184f5e2e82f46732c256ef434"
            },
            "downloads": -1,
            "filename": "aws_cdk_aws_route53resolver_alpha-2.170.0a0.tar.gz",
            "has_sig": false,
            "md5_digest": "3576441ddd715e288e37a2938e511ace",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": "~=3.8",
            "size": 65457,
            "upload_time": "2024-11-22T04:42:41",
            "upload_time_iso_8601": "2024-11-22T04:42:41.461292Z",
            "url": "https://files.pythonhosted.org/packages/35/a0/a8167f7c0d3d7d4aa9557d27c31c38fb8a026b21b012854bead889d5cbe1/aws_cdk_aws_route53resolver_alpha-2.170.0a0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-22 04:42:41",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "aws",
    "github_project": "aws-cdk",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "aws-cdk.aws-route53resolver-alpha"
}
        
Elapsed time: 0.70237s