This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files

94 lines
4.3 KiB
C++
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include <aws/apigateway/APIGateway_EXPORTS.h>
namespace Aws
{
namespace Utils
{
namespace Json
{
class JsonValue;
class JsonView;
} // namespace Json
} // namespace Utils
namespace APIGateway
{
namespace Model
{
class AWS_APIGATEWAY_API TlsConfig
{
public:
TlsConfig();
TlsConfig(Aws::Utils::Json::JsonView jsonValue);
TlsConfig& operator=(Aws::Utils::Json::JsonView jsonValue);
Aws::Utils::Json::JsonValue Jsonize() const;
/**
* <p>Specifies whether or not API Gateway skips verification that the certificate
* for an integration endpoint is issued by a <a
* href="https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-supported-certificate-authorities-for-http-endpoints.html">supported
* certificate authority</a>. This isnt recommended, but it enables you to use
* certificates that are signed by private certificate authorities, or certificates
* that are self-signed. If enabled, API Gateway still performs basic certificate
* validation, which includes checking the certificate's expiration date, hostname,
* and presence of a root certificate authority. Supported only for
* <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p>
*/
inline bool GetInsecureSkipVerification() const{ return m_insecureSkipVerification; }
/**
* <p>Specifies whether or not API Gateway skips verification that the certificate
* for an integration endpoint is issued by a <a
* href="https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-supported-certificate-authorities-for-http-endpoints.html">supported
* certificate authority</a>. This isnt recommended, but it enables you to use
* certificates that are signed by private certificate authorities, or certificates
* that are self-signed. If enabled, API Gateway still performs basic certificate
* validation, which includes checking the certificate's expiration date, hostname,
* and presence of a root certificate authority. Supported only for
* <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p>
*/
inline bool InsecureSkipVerificationHasBeenSet() const { return m_insecureSkipVerificationHasBeenSet; }
/**
* <p>Specifies whether or not API Gateway skips verification that the certificate
* for an integration endpoint is issued by a <a
* href="https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-supported-certificate-authorities-for-http-endpoints.html">supported
* certificate authority</a>. This isnt recommended, but it enables you to use
* certificates that are signed by private certificate authorities, or certificates
* that are self-signed. If enabled, API Gateway still performs basic certificate
* validation, which includes checking the certificate's expiration date, hostname,
* and presence of a root certificate authority. Supported only for
* <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p>
*/
inline void SetInsecureSkipVerification(bool value) { m_insecureSkipVerificationHasBeenSet = true; m_insecureSkipVerification = value; }
/**
* <p>Specifies whether or not API Gateway skips verification that the certificate
* for an integration endpoint is issued by a <a
* href="https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-supported-certificate-authorities-for-http-endpoints.html">supported
* certificate authority</a>. This isnt recommended, but it enables you to use
* certificates that are signed by private certificate authorities, or certificates
* that are self-signed. If enabled, API Gateway still performs basic certificate
* validation, which includes checking the certificate's expiration date, hostname,
* and presence of a root certificate authority. Supported only for
* <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p>
*/
inline TlsConfig& WithInsecureSkipVerification(bool value) { SetInsecureSkipVerification(value); return *this;}
private:
bool m_insecureSkipVerification;
bool m_insecureSkipVerificationHasBeenSet;
};
} // namespace Model
} // namespace APIGateway
} // namespace Aws