interface TlsValidationContextProperty
Language | Type name |
---|---|
![]() | Amazon.CDK.AWS.AppMesh.CfnVirtualNode.TlsValidationContextProperty |
![]() | github.com/aws/aws-cdk-go/awscdk/v2/awsappmesh#CfnVirtualNode_TlsValidationContextProperty |
![]() | software.amazon.awscdk.services.appmesh.CfnVirtualNode.TlsValidationContextProperty |
![]() | aws_cdk.aws_appmesh.CfnVirtualNode.TlsValidationContextProperty |
![]() | aws-cdk-lib » aws_appmesh » CfnVirtualNode » TlsValidationContextProperty |
An object that represents how the proxy will validate its peer during Transport Layer Security (TLS) negotiation.
Example
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import { aws_appmesh as appmesh } from 'aws-cdk-lib';
const tlsValidationContextProperty: appmesh.CfnVirtualNode.TlsValidationContextProperty = {
trust: {
acm: {
certificateAuthorityArns: ['certificateAuthorityArns'],
},
file: {
certificateChain: 'certificateChain',
},
sds: {
secretName: 'secretName',
},
},
// the properties below are optional
subjectAlternativeNames: {
match: {
exact: ['exact'],
},
},
};
Properties
Name | Type | Description |
---|---|---|
trust | IResolvable | Tls | A reference to where to retrieve the trust chain when validating a peer’s Transport Layer Security (TLS) certificate. |
subject | IResolvable | Subject | A reference to an object that represents the SANs for a Transport Layer Security (TLS) validation context. |
trust
Type:
IResolvable
|
Tls
A reference to where to retrieve the trust chain when validating a peer’s Transport Layer Security (TLS) certificate.
subjectAlternativeNames?
Type:
IResolvable
|
Subject
(optional)
A reference to an object that represents the SANs for a Transport Layer Security (TLS) validation context.
If you don't specify SANs on the terminating mesh endpoint, the Envoy proxy for that node doesn't verify the SAN on a peer client certificate. If you don't specify SANs on the originating mesh endpoint, the SAN on the certificate provided by the terminating endpoint must match the mesh endpoint service discovery configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you must set the SAN since the name doesn't match the service discovery name.