/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace APIGateway { namespace Model { /** *

Specifies the TLS configuration for an integration.

See Also:

* AWS * API Reference

*/ class TlsConfig { public: AWS_APIGATEWAY_API TlsConfig(); AWS_APIGATEWAY_API TlsConfig(Aws::Utils::Json::JsonView jsonValue); AWS_APIGATEWAY_API TlsConfig& operator=(Aws::Utils::Json::JsonView jsonValue); AWS_APIGATEWAY_API Aws::Utils::Json::JsonValue Jsonize() const; /** *

Specifies whether or not API Gateway skips verification that the certificate * for an integration endpoint is issued by a supported certificate authority. This * isn’t recommended, but it enables you to use certificates that are signed by * private certificate authorities, or certificates that are self-signed. If * enabled, API Gateway still performs basic certificate validation, which includes * checking the certificate's expiration date, hostname, and presence of a root * certificate authority. Supported only for HTTP and * HTTP_PROXY integrations.

Enabling * insecureSkipVerification isn't recommended, especially for * integrations with public HTTPS endpoints. If you enable * insecureSkipVerification, you increase the risk of * man-in-the-middle attacks.

*/ inline bool GetInsecureSkipVerification() const{ return m_insecureSkipVerification; } /** *

Specifies whether or not API Gateway skips verification that the certificate * for an integration endpoint is issued by a supported certificate authority. This * isn’t recommended, but it enables you to use certificates that are signed by * private certificate authorities, or certificates that are self-signed. If * enabled, API Gateway still performs basic certificate validation, which includes * checking the certificate's expiration date, hostname, and presence of a root * certificate authority. Supported only for HTTP and * HTTP_PROXY integrations.

Enabling * insecureSkipVerification isn't recommended, especially for * integrations with public HTTPS endpoints. If you enable * insecureSkipVerification, you increase the risk of * man-in-the-middle attacks.

*/ inline bool InsecureSkipVerificationHasBeenSet() const { return m_insecureSkipVerificationHasBeenSet; } /** *

Specifies whether or not API Gateway skips verification that the certificate * for an integration endpoint is issued by a supported certificate authority. This * isn’t recommended, but it enables you to use certificates that are signed by * private certificate authorities, or certificates that are self-signed. If * enabled, API Gateway still performs basic certificate validation, which includes * checking the certificate's expiration date, hostname, and presence of a root * certificate authority. Supported only for HTTP and * HTTP_PROXY integrations.

Enabling * insecureSkipVerification isn't recommended, especially for * integrations with public HTTPS endpoints. If you enable * insecureSkipVerification, you increase the risk of * man-in-the-middle attacks.

*/ inline void SetInsecureSkipVerification(bool value) { m_insecureSkipVerificationHasBeenSet = true; m_insecureSkipVerification = value; } /** *

Specifies whether or not API Gateway skips verification that the certificate * for an integration endpoint is issued by a supported certificate authority. This * isn’t recommended, but it enables you to use certificates that are signed by * private certificate authorities, or certificates that are self-signed. If * enabled, API Gateway still performs basic certificate validation, which includes * checking the certificate's expiration date, hostname, and presence of a root * certificate authority. Supported only for HTTP and * HTTP_PROXY integrations.

Enabling * insecureSkipVerification isn't recommended, especially for * integrations with public HTTPS endpoints. If you enable * insecureSkipVerification, you increase the risk of * man-in-the-middle attacks.

*/ inline TlsConfig& WithInsecureSkipVerification(bool value) { SetInsecureSkipVerification(value); return *this;} private: bool m_insecureSkipVerification; bool m_insecureSkipVerificationHasBeenSet = false; }; } // namespace Model } // namespace APIGateway } // namespace Aws