/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include An object that represents how the proxy will validate its peer during
* Transport Layer Security (TLS) negotiation.See Also:
AWS
* API Reference
A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline const SubjectAlternativeNames& GetSubjectAlternativeNames() const{ return m_subjectAlternativeNames; } /** *A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline bool SubjectAlternativeNamesHasBeenSet() const { return m_subjectAlternativeNamesHasBeenSet; } /** *A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline void SetSubjectAlternativeNames(const SubjectAlternativeNames& value) { m_subjectAlternativeNamesHasBeenSet = true; m_subjectAlternativeNames = value; } /** *A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline void SetSubjectAlternativeNames(SubjectAlternativeNames&& value) { m_subjectAlternativeNamesHasBeenSet = true; m_subjectAlternativeNames = std::move(value); } /** *A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline TlsValidationContext& WithSubjectAlternativeNames(const SubjectAlternativeNames& value) { SetSubjectAlternativeNames(value); return *this;} /** *A reference to an object that represents the SANs for a Transport Layer * Security (TLS) validation context. If you don't specify SANs on the * terminating mesh endpoint, the Envoy proxy for that node doesn't verify * the SAN on a peer client certificate. If you don't specify SANs on the * originating mesh endpoint, the SAN on the certificate provided by the * terminating endpoint must match the mesh endpoint service discovery * configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you * must set the SAN since the name doesn't match the service discovery name.
*/ inline TlsValidationContext& WithSubjectAlternativeNames(SubjectAlternativeNames&& value) { SetSubjectAlternativeNames(std::move(value)); return *this;} /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline const TlsValidationContextTrust& GetTrust() const{ return m_trust; } /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline bool TrustHasBeenSet() const { return m_trustHasBeenSet; } /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline void SetTrust(const TlsValidationContextTrust& value) { m_trustHasBeenSet = true; m_trust = value; } /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline void SetTrust(TlsValidationContextTrust&& value) { m_trustHasBeenSet = true; m_trust = std::move(value); } /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline TlsValidationContext& WithTrust(const TlsValidationContextTrust& value) { SetTrust(value); return *this;} /** *A reference to where to retrieve the trust chain when validating a peer’s * Transport Layer Security (TLS) certificate.
*/ inline TlsValidationContext& WithTrust(TlsValidationContextTrust&& value) { SetTrust(std::move(value)); return *this;} private: SubjectAlternativeNames m_subjectAlternativeNames; bool m_subjectAlternativeNamesHasBeenSet = false; TlsValidationContextTrust m_trust; bool m_trustHasBeenSet = false; }; } // namespace Model } // namespace AppMesh } // namespace Aws