This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
pxz-hos-client-cpp-module/support/aws-sdk-cpp-master/aws-cpp-sdk-cloudfront/include/aws/cloudfront/model/ViewerCertificate.h

573 lines
35 KiB
C
Raw Normal View History

/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include <aws/cloudfront/CloudFront_EXPORTS.h>
#include <aws/core/utils/memory/stl/AWSString.h>
#include <aws/cloudfront/model/SSLSupportMethod.h>
#include <aws/cloudfront/model/MinimumProtocolVersion.h>
#include <utility>
namespace Aws
{
namespace Utils
{
namespace Xml
{
class XmlNode;
} // namespace Xml
} // namespace Utils
namespace CloudFront
{
namespace Model
{
/**
* <p>A complex type that determines the distributions SSL/TLS configuration for
* communicating with viewers.</p> <p>If the distribution doesnt use
* <code>Aliases</code> (also known as alternate domain names or CNAMEs)that is,
* if the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>set
* <code>CloudFrontDefaultCertificate</code> to <code>true</code> and leave all
* other fields empty.</p> <p>If the distribution uses <code>Aliases</code>
* (alternate domain names or CNAMEs), use the fields in this type to specify the
* following settings:</p> <ul> <li> <p>Which viewers the distribution accepts
* HTTPS connections from: only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a> (recommended), or all viewers including those that dont
* support SNI.</p> <ul> <li> <p>To accept HTTPS connections from only viewers that
* support SNI, set <code>SSLSupportMethod</code> to <code>sni-only</code>. This is
* recommended. Most browsers and clients support SNI. </p> </li> <li> <p>To accept
* HTTPS connections from all viewers, including those that dont support SNI, set
* <code>SSLSupportMethod</code> to <code>vip</code>. This is not recommended, and
* results in additional monthly charges from CloudFront. </p> </li> </ul> </li>
* <li> <p>The minimum SSL/TLS protocol version that the distribution can use to
* communicate with viewers. To specify a minimum version, choose a value for
* <code>MinimumProtocolVersion</code>. For more information, see <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> in the <i>Amazon CloudFront Developer Guide</i>.</p> </li> <li>
* <p>The location of the SSL/TLS certificate, <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a> (recommended) or <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>. You specify the location by
* setting a value in one of the following fields (not both):</p> <ul> <li> <p>
* <code>ACMCertificateArn</code> </p> </li> <li> <p> <code>IAMCertificateId</code>
* </p> </li> </ul> </li> </ul> <p>All distributions support HTTPS connections from
* viewers. To require viewers to use HTTPS only, or to redirect them from HTTP to
* HTTPS, use <code>ViewerProtocolPolicy</code> in the <code>CacheBehavior</code>
* or <code>DefaultCacheBehavior</code>. To specify how CloudFront should use
* SSL/TLS to communicate with your custom origin, use
* <code>CustomOriginConfig</code>.</p> <p>For more information, see <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https.html">Using
* HTTPS with CloudFront</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/using-https-alternate-domain-names.html">
* Using Alternate Domain Names and HTTPS</a> in the <i>Amazon CloudFront Developer
* Guide</i>.</p><p><h3>See Also:</h3> <a
* href="http://docs.aws.amazon.com/goto/WebAPI/cloudfront-2020-05-31/ViewerCertificate">AWS
* API Reference</a></p>
*/
class AWS_CLOUDFRONT_API ViewerCertificate
{
public:
ViewerCertificate();
ViewerCertificate(const Aws::Utils::Xml::XmlNode& xmlNode);
ViewerCertificate& operator=(const Aws::Utils::Xml::XmlNode& xmlNode);
void AddToNode(Aws::Utils::Xml::XmlNode& parentNode) const;
/**
* <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, set this field to
* <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code>
* (alternate domain names or CNAMEs), set this field to <code>false</code> and
* specify values for the following fields:</p> <ul> <li> <p>
* <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value
* for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p>
* </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul>
*/
inline bool GetCloudFrontDefaultCertificate() const{ return m_cloudFrontDefaultCertificate; }
/**
* <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, set this field to
* <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code>
* (alternate domain names or CNAMEs), set this field to <code>false</code> and
* specify values for the following fields:</p> <ul> <li> <p>
* <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value
* for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p>
* </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul>
*/
inline bool CloudFrontDefaultCertificateHasBeenSet() const { return m_cloudFrontDefaultCertificateHasBeenSet; }
/**
* <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, set this field to
* <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code>
* (alternate domain names or CNAMEs), set this field to <code>false</code> and
* specify values for the following fields:</p> <ul> <li> <p>
* <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value
* for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p>
* </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul>
*/
inline void SetCloudFrontDefaultCertificate(bool value) { m_cloudFrontDefaultCertificateHasBeenSet = true; m_cloudFrontDefaultCertificate = value; }
/**
* <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, set this field to
* <code>true</code>.</p> <p>If the distribution uses <code>Aliases</code>
* (alternate domain names or CNAMEs), set this field to <code>false</code> and
* specify values for the following fields:</p> <ul> <li> <p>
* <code>ACMCertificateArn</code> or <code>IAMCertificateId</code> (specify a value
* for one, not both)</p> </li> <li> <p> <code>MinimumProtocolVersion</code> </p>
* </li> <li> <p> <code>SSLSupportMethod</code> </p> </li> </ul>
*/
inline ViewerCertificate& WithCloudFrontDefaultCertificate(bool value) { SetCloudFrontDefaultCertificate(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline const Aws::String& GetIAMCertificateId() const{ return m_iAMCertificateId; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline bool IAMCertificateIdHasBeenSet() const { return m_iAMCertificateIdHasBeenSet; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline void SetIAMCertificateId(const Aws::String& value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId = value; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline void SetIAMCertificateId(Aws::String&& value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId = std::move(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline void SetIAMCertificateId(const char* value) { m_iAMCertificateIdHasBeenSet = true; m_iAMCertificateId.assign(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithIAMCertificateId(const Aws::String& value) { SetIAMCertificateId(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithIAMCertificateId(Aws::String&& value) { SetIAMCertificateId(std::move(value)); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_server-certs.html">AWS
* Identity and Access Management (AWS IAM)</a>, provide the ID of the IAM
* certificate.</p> <p>If you specify an IAM certificate ID, you must also specify
* values for <code>MinimumProtocolVerison</code> and
* <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithIAMCertificateId(const char* value) { SetIAMCertificateId(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline const Aws::String& GetACMCertificateArn() const{ return m_aCMCertificateArn; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline bool ACMCertificateArnHasBeenSet() const { return m_aCMCertificateArnHasBeenSet; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline void SetACMCertificateArn(const Aws::String& value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn = value; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline void SetACMCertificateArn(Aws::String&& value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn = std::move(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline void SetACMCertificateArn(const char* value) { m_aCMCertificateArnHasBeenSet = true; m_aCMCertificateArn.assign(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithACMCertificateArn(const Aws::String& value) { SetACMCertificateArn(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithACMCertificateArn(Aws::String&& value) { SetACMCertificateArn(std::move(value)); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs) and the SSL/TLS certificate is stored in <a
* href="https://docs.aws.amazon.com/acm/latest/userguide/acm-overview.html">AWS
* Certificate Manager (ACM)</a>, provide the Amazon Resource Name (ARN) of the ACM
* certificate. CloudFront only supports ACM certificates in the US East (N.
* Virginia) Region (<code>us-east-1</code>).</p> <p>If you specify an ACM
* certificate ARN, you must also specify values for
* <code>MinimumProtocolVerison</code> and <code>SSLSupportMethod</code>. </p>
*/
inline ViewerCertificate& WithACMCertificateArn(const char* value) { SetACMCertificateArn(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline const SSLSupportMethod& GetSSLSupportMethod() const{ return m_sSLSupportMethod; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline bool SSLSupportMethodHasBeenSet() const { return m_sSLSupportMethodHasBeenSet; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline void SetSSLSupportMethod(const SSLSupportMethod& value) { m_sSLSupportMethodHasBeenSet = true; m_sSLSupportMethod = value; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline void SetSSLSupportMethod(SSLSupportMethod&& value) { m_sSLSupportMethodHasBeenSet = true; m_sSLSupportMethod = std::move(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline ViewerCertificate& WithSSLSupportMethod(const SSLSupportMethod& value) { SetSSLSupportMethod(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify which viewers the distribution accepts HTTPS connections
* from.</p> <ul> <li> <p> <code>sni-only</code> The distribution accepts HTTPS
* connections from only viewers that support <a
* href="https://en.wikipedia.org/wiki/Server_Name_Indication">server name
* indication (SNI)</a>. This is recommended. Most browsers and clients support
* SNI.</p> </li> <li> <p> <code>vip</code> The distribution accepts HTTPS
* connections from all viewers including those that dont support SNI. This is not
* recommended, and results in additional monthly charges from CloudFront.</p>
* </li> </ul> <p>If the distribution uses the CloudFront domain name such as
* <code>d111111abcdef8.cloudfront.net</code>, dont set a value for this
* field.</p>
*/
inline ViewerCertificate& WithSSLSupportMethod(SSLSupportMethod&& value) { SetSSLSupportMethod(std::move(value)); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline const MinimumProtocolVersion& GetMinimumProtocolVersion() const{ return m_minimumProtocolVersion; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline bool MinimumProtocolVersionHasBeenSet() const { return m_minimumProtocolVersionHasBeenSet; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline void SetMinimumProtocolVersion(const MinimumProtocolVersion& value) { m_minimumProtocolVersionHasBeenSet = true; m_minimumProtocolVersion = value; }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline void SetMinimumProtocolVersion(MinimumProtocolVersion&& value) { m_minimumProtocolVersionHasBeenSet = true; m_minimumProtocolVersion = std::move(value); }
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline ViewerCertificate& WithMinimumProtocolVersion(const MinimumProtocolVersion& value) { SetMinimumProtocolVersion(value); return *this;}
/**
* <p>If the distribution uses <code>Aliases</code> (alternate domain names or
* CNAMEs), specify the security policy that you want CloudFront to use for HTTPS
* connections with viewers. The security policy determines two settings:</p> <ul>
* <li> <p>The minimum SSL/TLS protocol that CloudFront can use to communicate with
* viewers.</p> </li> <li> <p>The ciphers that CloudFront can use to encrypt the
* content that it returns to viewers.</p> </li> </ul> <p>For more information, see
* <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValues-security-policy">Security
* Policy</a> and <a
* href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers">Supported
* Protocols and Ciphers Between Viewers and CloudFront</a> in the <i>Amazon
* CloudFront Developer Guide</i>.</p> <p>On the CloudFront console, this
* setting is called <b>Security Policy</b>.</p> <p>When youre using SNI
* only (you set <code>SSLSupportMethod</code> to <code>sni-only</code>), you must
* specify <code>TLSv1</code> or higher. </p> <p>If the distribution uses the
* CloudFront domain name such as <code>d111111abcdef8.cloudfront.net</code> (you
* set <code>CloudFrontDefaultCertificate</code> to <code>true</code>), CloudFront
* automatically sets the security policy to <code>TLSv1</code> regardless of the
* value that you set here.</p>
*/
inline ViewerCertificate& WithMinimumProtocolVersion(MinimumProtocolVersion&& value) { SetMinimumProtocolVersion(std::move(value)); return *this;}
private:
bool m_cloudFrontDefaultCertificate;
bool m_cloudFrontDefaultCertificateHasBeenSet;
Aws::String m_iAMCertificateId;
bool m_iAMCertificateIdHasBeenSet;
Aws::String m_aCMCertificateArn;
bool m_aCMCertificateArnHasBeenSet;
SSLSupportMethod m_sSLSupportMethod;
bool m_sSLSupportMethodHasBeenSet;
MinimumProtocolVersion m_minimumProtocolVersion;
bool m_minimumProtocolVersionHasBeenSet;
};
} // namespace Model
} // namespace CloudFront
} // namespace Aws