aws-sdk-appmesh 1.33.0 → 1.34.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-appmesh.rb +1 -1
- data/lib/aws-sdk-appmesh/client.rb +287 -1
- data/lib/aws-sdk-appmesh/client_api.rb +70 -0
- data/lib/aws-sdk-appmesh/types.rb +1001 -36
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d6b516eae334dae0e972b0a478d2909f8b21ee89888b6d0c57a1f5d24344496d
|
4
|
+
data.tar.gz: e3e049aa17298c2b0a578e17bff377ff043ff0bc9c1ae1ddbd8251581a3cd86c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: '072961c3122d77bdc74379e23e98061d4833b146d939981a68a5ad8d21c77917c6ec19fa9e5fe7e622544a1211a7a11bfd89bc2c24d33e084337c05762a25f74'
|
7
|
+
data.tar.gz: b21597e983254a8f7118ea3754b115723a3a75f39d7b34560fa4b17bf87ea8ff7356f7566c53a1167b4017bfa0bfb5c1a760485ea0fa38abe946510318b86d5e
|
data/lib/aws-sdk-appmesh.rb
CHANGED
@@ -958,9 +958,23 @@ module Aws::AppMesh
|
|
958
958
|
# backend_defaults: {
|
959
959
|
# client_policy: {
|
960
960
|
# tls: {
|
961
|
+
# certificate: {
|
962
|
+
# file: {
|
963
|
+
# certificate_chain: "FilePath", # required
|
964
|
+
# private_key: "FilePath", # required
|
965
|
+
# },
|
966
|
+
# sds: {
|
967
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
968
|
+
# },
|
969
|
+
# },
|
961
970
|
# enforce: false,
|
962
971
|
# ports: [1],
|
963
972
|
# validation: { # required
|
973
|
+
# subject_alternative_names: {
|
974
|
+
# match: { # required
|
975
|
+
# exact: ["SubjectAlternativeName"], # required
|
976
|
+
# },
|
977
|
+
# },
|
964
978
|
# trust: { # required
|
965
979
|
# acm: {
|
966
980
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -968,6 +982,9 @@ module Aws::AppMesh
|
|
968
982
|
# file: {
|
969
983
|
# certificate_chain: "FilePath", # required
|
970
984
|
# },
|
985
|
+
# sds: {
|
986
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
987
|
+
# },
|
971
988
|
# },
|
972
989
|
# },
|
973
990
|
# },
|
@@ -1009,8 +1026,26 @@ module Aws::AppMesh
|
|
1009
1026
|
# certificate_chain: "FilePath", # required
|
1010
1027
|
# private_key: "FilePath", # required
|
1011
1028
|
# },
|
1029
|
+
# sds: {
|
1030
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
1031
|
+
# },
|
1012
1032
|
# },
|
1013
1033
|
# mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
|
1034
|
+
# validation: {
|
1035
|
+
# subject_alternative_names: {
|
1036
|
+
# match: { # required
|
1037
|
+
# exact: ["SubjectAlternativeName"], # required
|
1038
|
+
# },
|
1039
|
+
# },
|
1040
|
+
# trust: { # required
|
1041
|
+
# file: {
|
1042
|
+
# certificate_chain: "FilePath", # required
|
1043
|
+
# },
|
1044
|
+
# sds: {
|
1045
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
1046
|
+
# },
|
1047
|
+
# },
|
1048
|
+
# },
|
1014
1049
|
# },
|
1015
1050
|
# },
|
1016
1051
|
# ],
|
@@ -1041,12 +1076,18 @@ module Aws::AppMesh
|
|
1041
1076
|
# resp.virtual_gateway.metadata.resource_owner #=> String
|
1042
1077
|
# resp.virtual_gateway.metadata.uid #=> String
|
1043
1078
|
# resp.virtual_gateway.metadata.version #=> Integer
|
1079
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
1080
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
1081
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
1044
1082
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
1045
1083
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
|
1046
1084
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
1085
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
1086
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1047
1087
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
1048
1088
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
1049
1089
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
1090
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
1050
1091
|
# resp.virtual_gateway.spec.listeners #=> Array
|
1051
1092
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
1052
1093
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
|
@@ -1064,7 +1105,12 @@ module Aws::AppMesh
|
|
1064
1105
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
1065
1106
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
1066
1107
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
|
1108
|
+
# resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
1067
1109
|
# resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
1110
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
1111
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1112
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
1113
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
1068
1114
|
# resp.virtual_gateway.spec.logging.access_log.file.path #=> String
|
1069
1115
|
# resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
|
1070
1116
|
# resp.virtual_gateway.virtual_gateway_name #=> String
|
@@ -1168,9 +1214,23 @@ module Aws::AppMesh
|
|
1168
1214
|
# backend_defaults: {
|
1169
1215
|
# client_policy: {
|
1170
1216
|
# tls: {
|
1217
|
+
# certificate: {
|
1218
|
+
# file: {
|
1219
|
+
# certificate_chain: "FilePath", # required
|
1220
|
+
# private_key: "FilePath", # required
|
1221
|
+
# },
|
1222
|
+
# sds: {
|
1223
|
+
# secret_name: "SdsSecretName", # required
|
1224
|
+
# },
|
1225
|
+
# },
|
1171
1226
|
# enforce: false,
|
1172
1227
|
# ports: [1],
|
1173
1228
|
# validation: { # required
|
1229
|
+
# subject_alternative_names: {
|
1230
|
+
# match: { # required
|
1231
|
+
# exact: ["SubjectAlternativeName"], # required
|
1232
|
+
# },
|
1233
|
+
# },
|
1174
1234
|
# trust: { # required
|
1175
1235
|
# acm: {
|
1176
1236
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -1178,6 +1238,9 @@ module Aws::AppMesh
|
|
1178
1238
|
# file: {
|
1179
1239
|
# certificate_chain: "FilePath", # required
|
1180
1240
|
# },
|
1241
|
+
# sds: {
|
1242
|
+
# secret_name: "SdsSecretName", # required
|
1243
|
+
# },
|
1181
1244
|
# },
|
1182
1245
|
# },
|
1183
1246
|
# },
|
@@ -1188,9 +1251,23 @@ module Aws::AppMesh
|
|
1188
1251
|
# virtual_service: {
|
1189
1252
|
# client_policy: {
|
1190
1253
|
# tls: {
|
1254
|
+
# certificate: {
|
1255
|
+
# file: {
|
1256
|
+
# certificate_chain: "FilePath", # required
|
1257
|
+
# private_key: "FilePath", # required
|
1258
|
+
# },
|
1259
|
+
# sds: {
|
1260
|
+
# secret_name: "SdsSecretName", # required
|
1261
|
+
# },
|
1262
|
+
# },
|
1191
1263
|
# enforce: false,
|
1192
1264
|
# ports: [1],
|
1193
1265
|
# validation: { # required
|
1266
|
+
# subject_alternative_names: {
|
1267
|
+
# match: { # required
|
1268
|
+
# exact: ["SubjectAlternativeName"], # required
|
1269
|
+
# },
|
1270
|
+
# },
|
1194
1271
|
# trust: { # required
|
1195
1272
|
# acm: {
|
1196
1273
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -1198,6 +1275,9 @@ module Aws::AppMesh
|
|
1198
1275
|
# file: {
|
1199
1276
|
# certificate_chain: "FilePath", # required
|
1200
1277
|
# },
|
1278
|
+
# sds: {
|
1279
|
+
# secret_name: "SdsSecretName", # required
|
1280
|
+
# },
|
1201
1281
|
# },
|
1202
1282
|
# },
|
1203
1283
|
# },
|
@@ -1295,8 +1375,26 @@ module Aws::AppMesh
|
|
1295
1375
|
# certificate_chain: "FilePath", # required
|
1296
1376
|
# private_key: "FilePath", # required
|
1297
1377
|
# },
|
1378
|
+
# sds: {
|
1379
|
+
# secret_name: "SdsSecretName", # required
|
1380
|
+
# },
|
1298
1381
|
# },
|
1299
1382
|
# mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
|
1383
|
+
# validation: {
|
1384
|
+
# subject_alternative_names: {
|
1385
|
+
# match: { # required
|
1386
|
+
# exact: ["SubjectAlternativeName"], # required
|
1387
|
+
# },
|
1388
|
+
# },
|
1389
|
+
# trust: { # required
|
1390
|
+
# file: {
|
1391
|
+
# certificate_chain: "FilePath", # required
|
1392
|
+
# },
|
1393
|
+
# sds: {
|
1394
|
+
# secret_name: "SdsSecretName", # required
|
1395
|
+
# },
|
1396
|
+
# },
|
1397
|
+
# },
|
1300
1398
|
# },
|
1301
1399
|
# },
|
1302
1400
|
# ],
|
@@ -1342,19 +1440,31 @@ module Aws::AppMesh
|
|
1342
1440
|
# resp.virtual_node.metadata.resource_owner #=> String
|
1343
1441
|
# resp.virtual_node.metadata.uid #=> String
|
1344
1442
|
# resp.virtual_node.metadata.version #=> Integer
|
1443
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
1444
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
1445
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
1345
1446
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
1346
1447
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
|
1347
1448
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
1449
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
1450
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1348
1451
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
1349
1452
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
1350
1453
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
1454
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
1351
1455
|
# resp.virtual_node.spec.backends #=> Array
|
1456
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
|
1457
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
|
1458
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
|
1352
1459
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
|
1353
1460
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
|
1354
1461
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
|
1462
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
1463
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1355
1464
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
1356
1465
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
1357
1466
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
1467
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
|
1358
1468
|
# resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
|
1359
1469
|
# resp.virtual_node.spec.listeners #=> Array
|
1360
1470
|
# resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
@@ -1394,7 +1504,12 @@ module Aws::AppMesh
|
|
1394
1504
|
# resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
1395
1505
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
1396
1506
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
|
1507
|
+
# resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
1397
1508
|
# resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
1509
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
1510
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1511
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
1512
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
1398
1513
|
# resp.virtual_node.spec.logging.access_log.file.path #=> String
|
1399
1514
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
|
1400
1515
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
|
@@ -1909,12 +2024,18 @@ module Aws::AppMesh
|
|
1909
2024
|
# resp.virtual_gateway.metadata.resource_owner #=> String
|
1910
2025
|
# resp.virtual_gateway.metadata.uid #=> String
|
1911
2026
|
# resp.virtual_gateway.metadata.version #=> Integer
|
2027
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
2028
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
2029
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
1912
2030
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
1913
2031
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
|
1914
2032
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
2033
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2034
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1915
2035
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
1916
2036
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
1917
2037
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2038
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
1918
2039
|
# resp.virtual_gateway.spec.listeners #=> Array
|
1919
2040
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
1920
2041
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
|
@@ -1932,7 +2053,12 @@ module Aws::AppMesh
|
|
1932
2053
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
1933
2054
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
1934
2055
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
|
2056
|
+
# resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
1935
2057
|
# resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
2058
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
2059
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2060
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
2061
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
1936
2062
|
# resp.virtual_gateway.spec.logging.access_log.file.path #=> String
|
1937
2063
|
# resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
|
1938
2064
|
# resp.virtual_gateway.virtual_gateway_name #=> String
|
@@ -1989,19 +2115,31 @@ module Aws::AppMesh
|
|
1989
2115
|
# resp.virtual_node.metadata.resource_owner #=> String
|
1990
2116
|
# resp.virtual_node.metadata.uid #=> String
|
1991
2117
|
# resp.virtual_node.metadata.version #=> Integer
|
2118
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
2119
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
2120
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
1992
2121
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
1993
2122
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
|
1994
2123
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
2124
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2125
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
1995
2126
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
1996
2127
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
1997
2128
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2129
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
1998
2130
|
# resp.virtual_node.spec.backends #=> Array
|
2131
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
|
2132
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
|
2133
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
|
1999
2134
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
|
2000
2135
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
|
2001
2136
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
|
2137
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2138
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2002
2139
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
2003
2140
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
2004
2141
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2142
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
|
2005
2143
|
# resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
|
2006
2144
|
# resp.virtual_node.spec.listeners #=> Array
|
2007
2145
|
# resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
@@ -2041,7 +2179,12 @@ module Aws::AppMesh
|
|
2041
2179
|
# resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
2042
2180
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
2043
2181
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
|
2182
|
+
# resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
2044
2183
|
# resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
2184
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
2185
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2186
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
2187
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
2045
2188
|
# resp.virtual_node.spec.logging.access_log.file.path #=> String
|
2046
2189
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
|
2047
2190
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
|
@@ -2467,12 +2610,18 @@ module Aws::AppMesh
|
|
2467
2610
|
# resp.virtual_gateway.metadata.resource_owner #=> String
|
2468
2611
|
# resp.virtual_gateway.metadata.uid #=> String
|
2469
2612
|
# resp.virtual_gateway.metadata.version #=> Integer
|
2613
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
2614
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
2615
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
2470
2616
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
2471
2617
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
|
2472
2618
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
2619
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2620
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2473
2621
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
2474
2622
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
2475
2623
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2624
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
2476
2625
|
# resp.virtual_gateway.spec.listeners #=> Array
|
2477
2626
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
2478
2627
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
|
@@ -2490,7 +2639,12 @@ module Aws::AppMesh
|
|
2490
2639
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
2491
2640
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
2492
2641
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
|
2642
|
+
# resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
2493
2643
|
# resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
2644
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
2645
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2646
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
2647
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
2494
2648
|
# resp.virtual_gateway.spec.logging.access_log.file.path #=> String
|
2495
2649
|
# resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
|
2496
2650
|
# resp.virtual_gateway.virtual_gateway_name #=> String
|
@@ -2544,19 +2698,31 @@ module Aws::AppMesh
|
|
2544
2698
|
# resp.virtual_node.metadata.resource_owner #=> String
|
2545
2699
|
# resp.virtual_node.metadata.uid #=> String
|
2546
2700
|
# resp.virtual_node.metadata.version #=> Integer
|
2701
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
2702
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
2703
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
2547
2704
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
2548
2705
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
|
2549
2706
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
2707
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2708
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2550
2709
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
2551
2710
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
2552
2711
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2712
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
2553
2713
|
# resp.virtual_node.spec.backends #=> Array
|
2714
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
|
2715
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
|
2716
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
|
2554
2717
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
|
2555
2718
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
|
2556
2719
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
|
2720
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
2721
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2557
2722
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
2558
2723
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
2559
2724
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
2725
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
|
2560
2726
|
# resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
|
2561
2727
|
# resp.virtual_node.spec.listeners #=> Array
|
2562
2728
|
# resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
@@ -2596,7 +2762,12 @@ module Aws::AppMesh
|
|
2596
2762
|
# resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
2597
2763
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
2598
2764
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
|
2765
|
+
# resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
2599
2766
|
# resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
2767
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
2768
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
2769
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
2770
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
2600
2771
|
# resp.virtual_node.spec.logging.access_log.file.path #=> String
|
2601
2772
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
|
2602
2773
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
|
@@ -3863,9 +4034,23 @@ module Aws::AppMesh
|
|
3863
4034
|
# backend_defaults: {
|
3864
4035
|
# client_policy: {
|
3865
4036
|
# tls: {
|
4037
|
+
# certificate: {
|
4038
|
+
# file: {
|
4039
|
+
# certificate_chain: "FilePath", # required
|
4040
|
+
# private_key: "FilePath", # required
|
4041
|
+
# },
|
4042
|
+
# sds: {
|
4043
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
4044
|
+
# },
|
4045
|
+
# },
|
3866
4046
|
# enforce: false,
|
3867
4047
|
# ports: [1],
|
3868
4048
|
# validation: { # required
|
4049
|
+
# subject_alternative_names: {
|
4050
|
+
# match: { # required
|
4051
|
+
# exact: ["SubjectAlternativeName"], # required
|
4052
|
+
# },
|
4053
|
+
# },
|
3869
4054
|
# trust: { # required
|
3870
4055
|
# acm: {
|
3871
4056
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -3873,6 +4058,9 @@ module Aws::AppMesh
|
|
3873
4058
|
# file: {
|
3874
4059
|
# certificate_chain: "FilePath", # required
|
3875
4060
|
# },
|
4061
|
+
# sds: {
|
4062
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
4063
|
+
# },
|
3876
4064
|
# },
|
3877
4065
|
# },
|
3878
4066
|
# },
|
@@ -3914,8 +4102,26 @@ module Aws::AppMesh
|
|
3914
4102
|
# certificate_chain: "FilePath", # required
|
3915
4103
|
# private_key: "FilePath", # required
|
3916
4104
|
# },
|
4105
|
+
# sds: {
|
4106
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
4107
|
+
# },
|
3917
4108
|
# },
|
3918
4109
|
# mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
|
4110
|
+
# validation: {
|
4111
|
+
# subject_alternative_names: {
|
4112
|
+
# match: { # required
|
4113
|
+
# exact: ["SubjectAlternativeName"], # required
|
4114
|
+
# },
|
4115
|
+
# },
|
4116
|
+
# trust: { # required
|
4117
|
+
# file: {
|
4118
|
+
# certificate_chain: "FilePath", # required
|
4119
|
+
# },
|
4120
|
+
# sds: {
|
4121
|
+
# secret_name: "VirtualGatewaySdsSecretName", # required
|
4122
|
+
# },
|
4123
|
+
# },
|
4124
|
+
# },
|
3919
4125
|
# },
|
3920
4126
|
# },
|
3921
4127
|
# ],
|
@@ -3940,12 +4146,18 @@ module Aws::AppMesh
|
|
3940
4146
|
# resp.virtual_gateway.metadata.resource_owner #=> String
|
3941
4147
|
# resp.virtual_gateway.metadata.uid #=> String
|
3942
4148
|
# resp.virtual_gateway.metadata.version #=> Integer
|
4149
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
4150
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
4151
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
3943
4152
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
3944
4153
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
|
3945
4154
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
4155
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
4156
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
3946
4157
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
3947
4158
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
3948
4159
|
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
4160
|
+
# resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
3949
4161
|
# resp.virtual_gateway.spec.listeners #=> Array
|
3950
4162
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
3951
4163
|
# resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
|
@@ -3963,7 +4175,12 @@ module Aws::AppMesh
|
|
3963
4175
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
3964
4176
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
3965
4177
|
# resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
|
4178
|
+
# resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
3966
4179
|
# resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
4180
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
4181
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
4182
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
4183
|
+
# resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
3967
4184
|
# resp.virtual_gateway.spec.logging.access_log.file.path #=> String
|
3968
4185
|
# resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
|
3969
4186
|
# resp.virtual_gateway.virtual_gateway_name #=> String
|
@@ -4021,9 +4238,23 @@ module Aws::AppMesh
|
|
4021
4238
|
# backend_defaults: {
|
4022
4239
|
# client_policy: {
|
4023
4240
|
# tls: {
|
4241
|
+
# certificate: {
|
4242
|
+
# file: {
|
4243
|
+
# certificate_chain: "FilePath", # required
|
4244
|
+
# private_key: "FilePath", # required
|
4245
|
+
# },
|
4246
|
+
# sds: {
|
4247
|
+
# secret_name: "SdsSecretName", # required
|
4248
|
+
# },
|
4249
|
+
# },
|
4024
4250
|
# enforce: false,
|
4025
4251
|
# ports: [1],
|
4026
4252
|
# validation: { # required
|
4253
|
+
# subject_alternative_names: {
|
4254
|
+
# match: { # required
|
4255
|
+
# exact: ["SubjectAlternativeName"], # required
|
4256
|
+
# },
|
4257
|
+
# },
|
4027
4258
|
# trust: { # required
|
4028
4259
|
# acm: {
|
4029
4260
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -4031,6 +4262,9 @@ module Aws::AppMesh
|
|
4031
4262
|
# file: {
|
4032
4263
|
# certificate_chain: "FilePath", # required
|
4033
4264
|
# },
|
4265
|
+
# sds: {
|
4266
|
+
# secret_name: "SdsSecretName", # required
|
4267
|
+
# },
|
4034
4268
|
# },
|
4035
4269
|
# },
|
4036
4270
|
# },
|
@@ -4041,9 +4275,23 @@ module Aws::AppMesh
|
|
4041
4275
|
# virtual_service: {
|
4042
4276
|
# client_policy: {
|
4043
4277
|
# tls: {
|
4278
|
+
# certificate: {
|
4279
|
+
# file: {
|
4280
|
+
# certificate_chain: "FilePath", # required
|
4281
|
+
# private_key: "FilePath", # required
|
4282
|
+
# },
|
4283
|
+
# sds: {
|
4284
|
+
# secret_name: "SdsSecretName", # required
|
4285
|
+
# },
|
4286
|
+
# },
|
4044
4287
|
# enforce: false,
|
4045
4288
|
# ports: [1],
|
4046
4289
|
# validation: { # required
|
4290
|
+
# subject_alternative_names: {
|
4291
|
+
# match: { # required
|
4292
|
+
# exact: ["SubjectAlternativeName"], # required
|
4293
|
+
# },
|
4294
|
+
# },
|
4047
4295
|
# trust: { # required
|
4048
4296
|
# acm: {
|
4049
4297
|
# certificate_authority_arns: ["Arn"], # required
|
@@ -4051,6 +4299,9 @@ module Aws::AppMesh
|
|
4051
4299
|
# file: {
|
4052
4300
|
# certificate_chain: "FilePath", # required
|
4053
4301
|
# },
|
4302
|
+
# sds: {
|
4303
|
+
# secret_name: "SdsSecretName", # required
|
4304
|
+
# },
|
4054
4305
|
# },
|
4055
4306
|
# },
|
4056
4307
|
# },
|
@@ -4148,8 +4399,26 @@ module Aws::AppMesh
|
|
4148
4399
|
# certificate_chain: "FilePath", # required
|
4149
4400
|
# private_key: "FilePath", # required
|
4150
4401
|
# },
|
4402
|
+
# sds: {
|
4403
|
+
# secret_name: "SdsSecretName", # required
|
4404
|
+
# },
|
4151
4405
|
# },
|
4152
4406
|
# mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
|
4407
|
+
# validation: {
|
4408
|
+
# subject_alternative_names: {
|
4409
|
+
# match: { # required
|
4410
|
+
# exact: ["SubjectAlternativeName"], # required
|
4411
|
+
# },
|
4412
|
+
# },
|
4413
|
+
# trust: { # required
|
4414
|
+
# file: {
|
4415
|
+
# certificate_chain: "FilePath", # required
|
4416
|
+
# },
|
4417
|
+
# sds: {
|
4418
|
+
# secret_name: "SdsSecretName", # required
|
4419
|
+
# },
|
4420
|
+
# },
|
4421
|
+
# },
|
4153
4422
|
# },
|
4154
4423
|
# },
|
4155
4424
|
# ],
|
@@ -4189,19 +4458,31 @@ module Aws::AppMesh
|
|
4189
4458
|
# resp.virtual_node.metadata.resource_owner #=> String
|
4190
4459
|
# resp.virtual_node.metadata.uid #=> String
|
4191
4460
|
# resp.virtual_node.metadata.version #=> Integer
|
4461
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
|
4462
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
|
4463
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
|
4192
4464
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
|
4193
4465
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
|
4194
4466
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
|
4467
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
4468
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
4195
4469
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
4196
4470
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
4197
4471
|
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
4472
|
+
# resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
|
4198
4473
|
# resp.virtual_node.spec.backends #=> Array
|
4474
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
|
4475
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
|
4476
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
|
4199
4477
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
|
4200
4478
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
|
4201
4479
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
|
4480
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
|
4481
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
|
4202
4482
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
|
4203
4483
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
|
4204
4484
|
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
|
4485
|
+
# resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
|
4205
4486
|
# resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
|
4206
4487
|
# resp.virtual_node.spec.listeners #=> Array
|
4207
4488
|
# resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
|
@@ -4241,7 +4522,12 @@ module Aws::AppMesh
|
|
4241
4522
|
# resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
|
4242
4523
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
|
4243
4524
|
# resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
|
4525
|
+
# resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
|
4244
4526
|
# resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
|
4527
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
|
4528
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
|
4529
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
|
4530
|
+
# resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
|
4245
4531
|
# resp.virtual_node.spec.logging.access_log.file.path #=> String
|
4246
4532
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
|
4247
4533
|
# resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
|
@@ -4429,7 +4715,7 @@ module Aws::AppMesh
|
|
4429
4715
|
params: params,
|
4430
4716
|
config: config)
|
4431
4717
|
context[:gem_name] = 'aws-sdk-appmesh'
|
4432
|
-
context[:gem_version] = '1.
|
4718
|
+
context[:gem_version] = '1.34.0'
|
4433
4719
|
Seahorse::Client::Request.new(handlers, context)
|
4434
4720
|
end
|
4435
4721
|
|