aws-sdk-appmesh 1.33.0 → 1.34.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5bc974496fa11f0cc63f4dc244520de8ce39c1369b15ab66fb2141c0067ddad7
4
- data.tar.gz: d9d4c27319a172ea9c6b5f41166a774293ec383b594b591aebf8c1bec0eef681
3
+ metadata.gz: d6b516eae334dae0e972b0a478d2909f8b21ee89888b6d0c57a1f5d24344496d
4
+ data.tar.gz: e3e049aa17298c2b0a578e17bff377ff043ff0bc9c1ae1ddbd8251581a3cd86c
5
5
  SHA512:
6
- metadata.gz: 97080b92fae29df6e7f2c791d6b27bbe32d6d12e6e8e83b0d7de874f90552ce7bff383ac24500111b45f3bcd3be71e27ad90ca7fb5805e9d7896f8fadc878377
7
- data.tar.gz: 6f600bd398a7e6651a016f3ff9cf45c9d3ea6bed37c1f4824dc19cb85c9cc299245a9839df44f05f325cd1b9c97be374dec22d74487ec68d3ffec1f4b2e7dd28
6
+ metadata.gz: '072961c3122d77bdc74379e23e98061d4833b146d939981a68a5ad8d21c77917c6ec19fa9e5fe7e622544a1211a7a11bfd89bc2c24d33e084337c05762a25f74'
7
+ data.tar.gz: b21597e983254a8f7118ea3754b115723a3a75f39d7b34560fa4b17bf87ea8ff7356f7566c53a1167b4017bfa0bfb5c1a760485ea0fa38abe946510318b86d5e
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-appmesh/customizations'
48
48
  # @!group service
49
49
  module Aws::AppMesh
50
50
 
51
- GEM_VERSION = '1.33.0'
51
+ GEM_VERSION = '1.34.0'
52
52
 
53
53
  end
@@ -958,9 +958,23 @@ module Aws::AppMesh
958
958
  # backend_defaults: {
959
959
  # client_policy: {
960
960
  # tls: {
961
+ # certificate: {
962
+ # file: {
963
+ # certificate_chain: "FilePath", # required
964
+ # private_key: "FilePath", # required
965
+ # },
966
+ # sds: {
967
+ # secret_name: "VirtualGatewaySdsSecretName", # required
968
+ # },
969
+ # },
961
970
  # enforce: false,
962
971
  # ports: [1],
963
972
  # validation: { # required
973
+ # subject_alternative_names: {
974
+ # match: { # required
975
+ # exact: ["SubjectAlternativeName"], # required
976
+ # },
977
+ # },
964
978
  # trust: { # required
965
979
  # acm: {
966
980
  # certificate_authority_arns: ["Arn"], # required
@@ -968,6 +982,9 @@ module Aws::AppMesh
968
982
  # file: {
969
983
  # certificate_chain: "FilePath", # required
970
984
  # },
985
+ # sds: {
986
+ # secret_name: "VirtualGatewaySdsSecretName", # required
987
+ # },
971
988
  # },
972
989
  # },
973
990
  # },
@@ -1009,8 +1026,26 @@ module Aws::AppMesh
1009
1026
  # certificate_chain: "FilePath", # required
1010
1027
  # private_key: "FilePath", # required
1011
1028
  # },
1029
+ # sds: {
1030
+ # secret_name: "VirtualGatewaySdsSecretName", # required
1031
+ # },
1012
1032
  # },
1013
1033
  # mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
1034
+ # validation: {
1035
+ # subject_alternative_names: {
1036
+ # match: { # required
1037
+ # exact: ["SubjectAlternativeName"], # required
1038
+ # },
1039
+ # },
1040
+ # trust: { # required
1041
+ # file: {
1042
+ # certificate_chain: "FilePath", # required
1043
+ # },
1044
+ # sds: {
1045
+ # secret_name: "VirtualGatewaySdsSecretName", # required
1046
+ # },
1047
+ # },
1048
+ # },
1014
1049
  # },
1015
1050
  # },
1016
1051
  # ],
@@ -1041,12 +1076,18 @@ module Aws::AppMesh
1041
1076
  # resp.virtual_gateway.metadata.resource_owner #=> String
1042
1077
  # resp.virtual_gateway.metadata.uid #=> String
1043
1078
  # resp.virtual_gateway.metadata.version #=> Integer
1079
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
1080
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
1081
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
1044
1082
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
1045
1083
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
1046
1084
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
1085
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
1086
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
1047
1087
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
1048
1088
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
1049
1089
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
1090
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
1050
1091
  # resp.virtual_gateway.spec.listeners #=> Array
1051
1092
  # resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
1052
1093
  # resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
@@ -1064,7 +1105,12 @@ module Aws::AppMesh
1064
1105
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
1065
1106
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
1066
1107
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
1108
+ # resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
1067
1109
  # resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
1110
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
1111
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
1112
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
1113
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
1068
1114
  # resp.virtual_gateway.spec.logging.access_log.file.path #=> String
1069
1115
  # resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
1070
1116
  # resp.virtual_gateway.virtual_gateway_name #=> String
@@ -1168,9 +1214,23 @@ module Aws::AppMesh
1168
1214
  # backend_defaults: {
1169
1215
  # client_policy: {
1170
1216
  # tls: {
1217
+ # certificate: {
1218
+ # file: {
1219
+ # certificate_chain: "FilePath", # required
1220
+ # private_key: "FilePath", # required
1221
+ # },
1222
+ # sds: {
1223
+ # secret_name: "SdsSecretName", # required
1224
+ # },
1225
+ # },
1171
1226
  # enforce: false,
1172
1227
  # ports: [1],
1173
1228
  # validation: { # required
1229
+ # subject_alternative_names: {
1230
+ # match: { # required
1231
+ # exact: ["SubjectAlternativeName"], # required
1232
+ # },
1233
+ # },
1174
1234
  # trust: { # required
1175
1235
  # acm: {
1176
1236
  # certificate_authority_arns: ["Arn"], # required
@@ -1178,6 +1238,9 @@ module Aws::AppMesh
1178
1238
  # file: {
1179
1239
  # certificate_chain: "FilePath", # required
1180
1240
  # },
1241
+ # sds: {
1242
+ # secret_name: "SdsSecretName", # required
1243
+ # },
1181
1244
  # },
1182
1245
  # },
1183
1246
  # },
@@ -1188,9 +1251,23 @@ module Aws::AppMesh
1188
1251
  # virtual_service: {
1189
1252
  # client_policy: {
1190
1253
  # tls: {
1254
+ # certificate: {
1255
+ # file: {
1256
+ # certificate_chain: "FilePath", # required
1257
+ # private_key: "FilePath", # required
1258
+ # },
1259
+ # sds: {
1260
+ # secret_name: "SdsSecretName", # required
1261
+ # },
1262
+ # },
1191
1263
  # enforce: false,
1192
1264
  # ports: [1],
1193
1265
  # validation: { # required
1266
+ # subject_alternative_names: {
1267
+ # match: { # required
1268
+ # exact: ["SubjectAlternativeName"], # required
1269
+ # },
1270
+ # },
1194
1271
  # trust: { # required
1195
1272
  # acm: {
1196
1273
  # certificate_authority_arns: ["Arn"], # required
@@ -1198,6 +1275,9 @@ module Aws::AppMesh
1198
1275
  # file: {
1199
1276
  # certificate_chain: "FilePath", # required
1200
1277
  # },
1278
+ # sds: {
1279
+ # secret_name: "SdsSecretName", # required
1280
+ # },
1201
1281
  # },
1202
1282
  # },
1203
1283
  # },
@@ -1295,8 +1375,26 @@ module Aws::AppMesh
1295
1375
  # certificate_chain: "FilePath", # required
1296
1376
  # private_key: "FilePath", # required
1297
1377
  # },
1378
+ # sds: {
1379
+ # secret_name: "SdsSecretName", # required
1380
+ # },
1298
1381
  # },
1299
1382
  # mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
1383
+ # validation: {
1384
+ # subject_alternative_names: {
1385
+ # match: { # required
1386
+ # exact: ["SubjectAlternativeName"], # required
1387
+ # },
1388
+ # },
1389
+ # trust: { # required
1390
+ # file: {
1391
+ # certificate_chain: "FilePath", # required
1392
+ # },
1393
+ # sds: {
1394
+ # secret_name: "SdsSecretName", # required
1395
+ # },
1396
+ # },
1397
+ # },
1300
1398
  # },
1301
1399
  # },
1302
1400
  # ],
@@ -1342,19 +1440,31 @@ module Aws::AppMesh
1342
1440
  # resp.virtual_node.metadata.resource_owner #=> String
1343
1441
  # resp.virtual_node.metadata.uid #=> String
1344
1442
  # resp.virtual_node.metadata.version #=> Integer
1443
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
1444
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
1445
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
1345
1446
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
1346
1447
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
1347
1448
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
1449
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
1450
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
1348
1451
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
1349
1452
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
1350
1453
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
1454
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
1351
1455
  # resp.virtual_node.spec.backends #=> Array
1456
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
1457
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
1458
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
1352
1459
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
1353
1460
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
1354
1461
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
1462
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
1463
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
1355
1464
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
1356
1465
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
1357
1466
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
1467
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
1358
1468
  # resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
1359
1469
  # resp.virtual_node.spec.listeners #=> Array
1360
1470
  # resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
@@ -1394,7 +1504,12 @@ module Aws::AppMesh
1394
1504
  # resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
1395
1505
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
1396
1506
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
1507
+ # resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
1397
1508
  # resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
1509
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
1510
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
1511
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
1512
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
1398
1513
  # resp.virtual_node.spec.logging.access_log.file.path #=> String
1399
1514
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
1400
1515
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
@@ -1909,12 +2024,18 @@ module Aws::AppMesh
1909
2024
  # resp.virtual_gateway.metadata.resource_owner #=> String
1910
2025
  # resp.virtual_gateway.metadata.uid #=> String
1911
2026
  # resp.virtual_gateway.metadata.version #=> Integer
2027
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
2028
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
2029
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
1912
2030
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
1913
2031
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
1914
2032
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
2033
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2034
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
1915
2035
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
1916
2036
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
1917
2037
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
2038
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
1918
2039
  # resp.virtual_gateway.spec.listeners #=> Array
1919
2040
  # resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
1920
2041
  # resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
@@ -1932,7 +2053,12 @@ module Aws::AppMesh
1932
2053
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
1933
2054
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
1934
2055
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
2056
+ # resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
1935
2057
  # resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
2058
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
2059
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
2060
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
2061
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
1936
2062
  # resp.virtual_gateway.spec.logging.access_log.file.path #=> String
1937
2063
  # resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
1938
2064
  # resp.virtual_gateway.virtual_gateway_name #=> String
@@ -1989,19 +2115,31 @@ module Aws::AppMesh
1989
2115
  # resp.virtual_node.metadata.resource_owner #=> String
1990
2116
  # resp.virtual_node.metadata.uid #=> String
1991
2117
  # resp.virtual_node.metadata.version #=> Integer
2118
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
2119
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
2120
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
1992
2121
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
1993
2122
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
1994
2123
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
2124
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2125
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
1995
2126
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
1996
2127
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
1997
2128
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
2129
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
1998
2130
  # resp.virtual_node.spec.backends #=> Array
2131
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
2132
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
2133
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
1999
2134
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
2000
2135
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
2001
2136
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
2137
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2138
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
2002
2139
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
2003
2140
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
2004
2141
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
2142
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
2005
2143
  # resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
2006
2144
  # resp.virtual_node.spec.listeners #=> Array
2007
2145
  # resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
@@ -2041,7 +2179,12 @@ module Aws::AppMesh
2041
2179
  # resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
2042
2180
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
2043
2181
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
2182
+ # resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
2044
2183
  # resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
2184
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
2185
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
2186
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
2187
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
2045
2188
  # resp.virtual_node.spec.logging.access_log.file.path #=> String
2046
2189
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
2047
2190
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
@@ -2467,12 +2610,18 @@ module Aws::AppMesh
2467
2610
  # resp.virtual_gateway.metadata.resource_owner #=> String
2468
2611
  # resp.virtual_gateway.metadata.uid #=> String
2469
2612
  # resp.virtual_gateway.metadata.version #=> Integer
2613
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
2614
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
2615
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
2470
2616
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
2471
2617
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
2472
2618
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
2619
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2620
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
2473
2621
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
2474
2622
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
2475
2623
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
2624
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
2476
2625
  # resp.virtual_gateway.spec.listeners #=> Array
2477
2626
  # resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
2478
2627
  # resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
@@ -2490,7 +2639,12 @@ module Aws::AppMesh
2490
2639
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
2491
2640
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
2492
2641
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
2642
+ # resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
2493
2643
  # resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
2644
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
2645
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
2646
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
2647
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
2494
2648
  # resp.virtual_gateway.spec.logging.access_log.file.path #=> String
2495
2649
  # resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
2496
2650
  # resp.virtual_gateway.virtual_gateway_name #=> String
@@ -2544,19 +2698,31 @@ module Aws::AppMesh
2544
2698
  # resp.virtual_node.metadata.resource_owner #=> String
2545
2699
  # resp.virtual_node.metadata.uid #=> String
2546
2700
  # resp.virtual_node.metadata.version #=> Integer
2701
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
2702
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
2703
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
2547
2704
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
2548
2705
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
2549
2706
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
2707
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2708
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
2550
2709
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
2551
2710
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
2552
2711
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
2712
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
2553
2713
  # resp.virtual_node.spec.backends #=> Array
2714
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
2715
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
2716
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
2554
2717
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
2555
2718
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
2556
2719
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
2720
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
2721
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
2557
2722
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
2558
2723
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
2559
2724
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
2725
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
2560
2726
  # resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
2561
2727
  # resp.virtual_node.spec.listeners #=> Array
2562
2728
  # resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
@@ -2596,7 +2762,12 @@ module Aws::AppMesh
2596
2762
  # resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
2597
2763
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
2598
2764
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
2765
+ # resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
2599
2766
  # resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
2767
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
2768
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
2769
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
2770
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
2600
2771
  # resp.virtual_node.spec.logging.access_log.file.path #=> String
2601
2772
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
2602
2773
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
@@ -3863,9 +4034,23 @@ module Aws::AppMesh
3863
4034
  # backend_defaults: {
3864
4035
  # client_policy: {
3865
4036
  # tls: {
4037
+ # certificate: {
4038
+ # file: {
4039
+ # certificate_chain: "FilePath", # required
4040
+ # private_key: "FilePath", # required
4041
+ # },
4042
+ # sds: {
4043
+ # secret_name: "VirtualGatewaySdsSecretName", # required
4044
+ # },
4045
+ # },
3866
4046
  # enforce: false,
3867
4047
  # ports: [1],
3868
4048
  # validation: { # required
4049
+ # subject_alternative_names: {
4050
+ # match: { # required
4051
+ # exact: ["SubjectAlternativeName"], # required
4052
+ # },
4053
+ # },
3869
4054
  # trust: { # required
3870
4055
  # acm: {
3871
4056
  # certificate_authority_arns: ["Arn"], # required
@@ -3873,6 +4058,9 @@ module Aws::AppMesh
3873
4058
  # file: {
3874
4059
  # certificate_chain: "FilePath", # required
3875
4060
  # },
4061
+ # sds: {
4062
+ # secret_name: "VirtualGatewaySdsSecretName", # required
4063
+ # },
3876
4064
  # },
3877
4065
  # },
3878
4066
  # },
@@ -3914,8 +4102,26 @@ module Aws::AppMesh
3914
4102
  # certificate_chain: "FilePath", # required
3915
4103
  # private_key: "FilePath", # required
3916
4104
  # },
4105
+ # sds: {
4106
+ # secret_name: "VirtualGatewaySdsSecretName", # required
4107
+ # },
3917
4108
  # },
3918
4109
  # mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
4110
+ # validation: {
4111
+ # subject_alternative_names: {
4112
+ # match: { # required
4113
+ # exact: ["SubjectAlternativeName"], # required
4114
+ # },
4115
+ # },
4116
+ # trust: { # required
4117
+ # file: {
4118
+ # certificate_chain: "FilePath", # required
4119
+ # },
4120
+ # sds: {
4121
+ # secret_name: "VirtualGatewaySdsSecretName", # required
4122
+ # },
4123
+ # },
4124
+ # },
3919
4125
  # },
3920
4126
  # },
3921
4127
  # ],
@@ -3940,12 +4146,18 @@ module Aws::AppMesh
3940
4146
  # resp.virtual_gateway.metadata.resource_owner #=> String
3941
4147
  # resp.virtual_gateway.metadata.uid #=> String
3942
4148
  # resp.virtual_gateway.metadata.version #=> Integer
4149
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
4150
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
4151
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
3943
4152
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
3944
4153
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports #=> Array
3945
4154
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
4155
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
4156
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
3946
4157
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
3947
4158
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
3948
4159
  # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
4160
+ # resp.virtual_gateway.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
3949
4161
  # resp.virtual_gateway.spec.listeners #=> Array
3950
4162
  # resp.virtual_gateway.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
3951
4163
  # resp.virtual_gateway.spec.listeners[0].connection_pool.http.max_connections #=> Integer
@@ -3963,7 +4175,12 @@ module Aws::AppMesh
3963
4175
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
3964
4176
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
3965
4177
  # resp.virtual_gateway.spec.listeners[0].tls.certificate.file.private_key #=> String
4178
+ # resp.virtual_gateway.spec.listeners[0].tls.certificate.sds.secret_name #=> String
3966
4179
  # resp.virtual_gateway.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
4180
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
4181
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
4182
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
4183
+ # resp.virtual_gateway.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
3967
4184
  # resp.virtual_gateway.spec.logging.access_log.file.path #=> String
3968
4185
  # resp.virtual_gateway.status.status #=> String, one of "ACTIVE", "INACTIVE", "DELETED"
3969
4186
  # resp.virtual_gateway.virtual_gateway_name #=> String
@@ -4021,9 +4238,23 @@ module Aws::AppMesh
4021
4238
  # backend_defaults: {
4022
4239
  # client_policy: {
4023
4240
  # tls: {
4241
+ # certificate: {
4242
+ # file: {
4243
+ # certificate_chain: "FilePath", # required
4244
+ # private_key: "FilePath", # required
4245
+ # },
4246
+ # sds: {
4247
+ # secret_name: "SdsSecretName", # required
4248
+ # },
4249
+ # },
4024
4250
  # enforce: false,
4025
4251
  # ports: [1],
4026
4252
  # validation: { # required
4253
+ # subject_alternative_names: {
4254
+ # match: { # required
4255
+ # exact: ["SubjectAlternativeName"], # required
4256
+ # },
4257
+ # },
4027
4258
  # trust: { # required
4028
4259
  # acm: {
4029
4260
  # certificate_authority_arns: ["Arn"], # required
@@ -4031,6 +4262,9 @@ module Aws::AppMesh
4031
4262
  # file: {
4032
4263
  # certificate_chain: "FilePath", # required
4033
4264
  # },
4265
+ # sds: {
4266
+ # secret_name: "SdsSecretName", # required
4267
+ # },
4034
4268
  # },
4035
4269
  # },
4036
4270
  # },
@@ -4041,9 +4275,23 @@ module Aws::AppMesh
4041
4275
  # virtual_service: {
4042
4276
  # client_policy: {
4043
4277
  # tls: {
4278
+ # certificate: {
4279
+ # file: {
4280
+ # certificate_chain: "FilePath", # required
4281
+ # private_key: "FilePath", # required
4282
+ # },
4283
+ # sds: {
4284
+ # secret_name: "SdsSecretName", # required
4285
+ # },
4286
+ # },
4044
4287
  # enforce: false,
4045
4288
  # ports: [1],
4046
4289
  # validation: { # required
4290
+ # subject_alternative_names: {
4291
+ # match: { # required
4292
+ # exact: ["SubjectAlternativeName"], # required
4293
+ # },
4294
+ # },
4047
4295
  # trust: { # required
4048
4296
  # acm: {
4049
4297
  # certificate_authority_arns: ["Arn"], # required
@@ -4051,6 +4299,9 @@ module Aws::AppMesh
4051
4299
  # file: {
4052
4300
  # certificate_chain: "FilePath", # required
4053
4301
  # },
4302
+ # sds: {
4303
+ # secret_name: "SdsSecretName", # required
4304
+ # },
4054
4305
  # },
4055
4306
  # },
4056
4307
  # },
@@ -4148,8 +4399,26 @@ module Aws::AppMesh
4148
4399
  # certificate_chain: "FilePath", # required
4149
4400
  # private_key: "FilePath", # required
4150
4401
  # },
4402
+ # sds: {
4403
+ # secret_name: "SdsSecretName", # required
4404
+ # },
4151
4405
  # },
4152
4406
  # mode: "STRICT", # required, accepts STRICT, PERMISSIVE, DISABLED
4407
+ # validation: {
4408
+ # subject_alternative_names: {
4409
+ # match: { # required
4410
+ # exact: ["SubjectAlternativeName"], # required
4411
+ # },
4412
+ # },
4413
+ # trust: { # required
4414
+ # file: {
4415
+ # certificate_chain: "FilePath", # required
4416
+ # },
4417
+ # sds: {
4418
+ # secret_name: "SdsSecretName", # required
4419
+ # },
4420
+ # },
4421
+ # },
4153
4422
  # },
4154
4423
  # },
4155
4424
  # ],
@@ -4189,19 +4458,31 @@ module Aws::AppMesh
4189
4458
  # resp.virtual_node.metadata.resource_owner #=> String
4190
4459
  # resp.virtual_node.metadata.uid #=> String
4191
4460
  # resp.virtual_node.metadata.version #=> Integer
4461
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.certificate_chain #=> String
4462
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.file.private_key #=> String
4463
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.certificate.sds.secret_name #=> String
4192
4464
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.enforce #=> Boolean
4193
4465
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports #=> Array
4194
4466
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.ports[0] #=> Integer
4467
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
4468
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
4195
4469
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
4196
4470
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
4197
4471
  # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.file.certificate_chain #=> String
4472
+ # resp.virtual_node.spec.backend_defaults.client_policy.tls.validation.trust.sds.secret_name #=> String
4198
4473
  # resp.virtual_node.spec.backends #=> Array
4474
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.certificate_chain #=> String
4475
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.file.private_key #=> String
4476
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.certificate.sds.secret_name #=> String
4199
4477
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.enforce #=> Boolean
4200
4478
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports #=> Array
4201
4479
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.ports[0] #=> Integer
4480
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact #=> Array
4481
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.subject_alternative_names.match.exact[0] #=> String
4202
4482
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns #=> Array
4203
4483
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.acm.certificate_authority_arns[0] #=> String
4204
4484
  # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.file.certificate_chain #=> String
4485
+ # resp.virtual_node.spec.backends[0].virtual_service.client_policy.tls.validation.trust.sds.secret_name #=> String
4205
4486
  # resp.virtual_node.spec.backends[0].virtual_service.virtual_service_name #=> String
4206
4487
  # resp.virtual_node.spec.listeners #=> Array
4207
4488
  # resp.virtual_node.spec.listeners[0].connection_pool.grpc.max_requests #=> Integer
@@ -4241,7 +4522,12 @@ module Aws::AppMesh
4241
4522
  # resp.virtual_node.spec.listeners[0].tls.certificate.acm.certificate_arn #=> String
4242
4523
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.certificate_chain #=> String
4243
4524
  # resp.virtual_node.spec.listeners[0].tls.certificate.file.private_key #=> String
4525
+ # resp.virtual_node.spec.listeners[0].tls.certificate.sds.secret_name #=> String
4244
4526
  # resp.virtual_node.spec.listeners[0].tls.mode #=> String, one of "STRICT", "PERMISSIVE", "DISABLED"
4527
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact #=> Array
4528
+ # resp.virtual_node.spec.listeners[0].tls.validation.subject_alternative_names.match.exact[0] #=> String
4529
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.file.certificate_chain #=> String
4530
+ # resp.virtual_node.spec.listeners[0].tls.validation.trust.sds.secret_name #=> String
4245
4531
  # resp.virtual_node.spec.logging.access_log.file.path #=> String
4246
4532
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes #=> Array
4247
4533
  # resp.virtual_node.spec.service_discovery.aws_cloud_map.attributes[0].key #=> String
@@ -4429,7 +4715,7 @@ module Aws::AppMesh
4429
4715
  params: params,
4430
4716
  config: config)
4431
4717
  context[:gem_name] = 'aws-sdk-appmesh'
4432
- context[:gem_version] = '1.33.0'
4718
+ context[:gem_version] = '1.34.0'
4433
4719
  Seahorse::Client::Request.new(handlers, context)
4434
4720
  end
4435
4721