|
863 | 863 | },
|
864 | 864 | "ipPreference":{
|
865 | 865 | "shape":"IpPreference",
|
866 |
| - "documentation":"<p>The IP version to use to control traffic within the mesh.</p>" |
| 866 | + "documentation":"<p>The preferred IP version that this virtual node uses. Setting the IP preference on the virtual node only overrides the IP preference set for the mesh on this specific node.</p>" |
867 | 867 | },
|
868 | 868 | "namespaceName":{
|
869 | 869 | "shape":"AwsCloudMapName",
|
|
1922 | 1922 | },
|
1923 | 1923 | "ipPreference":{
|
1924 | 1924 | "shape":"IpPreference",
|
1925 |
| - "documentation":"<p>The IP version to use to control traffic within the mesh.</p>" |
| 1925 | + "documentation":"<p>The preferred IP version that this virtual node uses. Setting the IP preference on the virtual node only overrides the IP preference set for the mesh on this specific node.</p>" |
1926 | 1926 | },
|
1927 | 1927 | "responseType":{
|
1928 | 1928 | "shape":"DnsResponseType",
|
|
1984 | 1984 | "type":"structure",
|
1985 | 1985 | "required":["path"],
|
1986 | 1986 | "members":{
|
| 1987 | + "format":{ |
| 1988 | + "shape":"LoggingFormat", |
| 1989 | + "documentation":"<p>The specified format for the logs. The format is either <code>json_format</code> or <code>text_format</code>.</p>" |
| 1990 | + }, |
1987 | 1991 | "path":{
|
1988 | 1992 | "shape":"FilePath",
|
1989 | 1993 | "documentation":"<p>The file path to write access logs to. You can use <code>/dev/stdout</code> to send access logs to standard out and configure your Envoy container to use a log driver, such as <code>awslogs</code>, to export the access logs to a log storage service such as Amazon CloudWatch Logs. You can also specify a path in the Envoy container's file system to write the files to disk.</p> <pre><code> <note> <p>The Envoy process must have write permissions to the path that you specify here. Otherwise, Envoy fails to bootstrap properly.</p> </note> </code></pre>"
|
|
2175 | 2179 | "type":"structure",
|
2176 | 2180 | "required":["virtualService"],
|
2177 | 2181 | "members":{
|
| 2182 | + "port":{ |
| 2183 | + "shape":"ListenerPort", |
| 2184 | + "documentation":"<p>The port number of the gateway route target.</p>" |
| 2185 | + }, |
2178 | 2186 | "virtualService":{
|
2179 | 2187 | "shape":"GatewayRouteVirtualService",
|
2180 | 2188 | "documentation":"<p>An object that represents a virtual service gateway route target.</p>"
|
|
2237 | 2245 | "shape":"GrpcGatewayRouteMetadataList",
|
2238 | 2246 | "documentation":"<p>The gateway route metadata to be matched on.</p>"
|
2239 | 2247 | },
|
| 2248 | + "port":{ |
| 2249 | + "shape":"ListenerPort", |
| 2250 | + "documentation":"<p>The port number to match from the request.</p>" |
| 2251 | + }, |
2240 | 2252 | "serviceName":{
|
2241 | 2253 | "shape":"ServiceName",
|
2242 | 2254 | "documentation":"<p>The fully qualified domain name for the service to match from the request.</p>"
|
|
2397 | 2409 | "shape":"MethodName",
|
2398 | 2410 | "documentation":"<p>The method name to match from the request. If you specify a name, you must also specify a <code>serviceName</code>.</p>"
|
2399 | 2411 | },
|
| 2412 | + "port":{ |
| 2413 | + "shape":"ListenerPort", |
| 2414 | + "documentation":"<p>The port number to match on.</p>" |
| 2415 | + }, |
2400 | 2416 | "serviceName":{
|
2401 | 2417 | "shape":"ServiceName",
|
2402 | 2418 | "documentation":"<p>The fully qualified domain name for the service to match from the request.</p>"
|
|
2643 | 2659 | "shape":"HttpPathMatch",
|
2644 | 2660 | "documentation":"<p>The path to match on.</p>"
|
2645 | 2661 | },
|
| 2662 | + "port":{ |
| 2663 | + "shape":"ListenerPort", |
| 2664 | + "documentation":"<p>The port number to match on.</p>" |
| 2665 | + }, |
2646 | 2666 | "prefix":{
|
2647 | 2667 | "shape":"String",
|
2648 | 2668 | "documentation":"<p>Specifies the path to match requests with. This parameter must always start with <code>/</code>, which by itself matches all requests to the virtual service name. You can also match for path-based routing of requests. For example, if your virtual service name is <code>my-service.local</code> and you want the route to match requests to <code>my-service.local/metrics</code>, your prefix should be <code>/metrics</code>.</p>"
|
|
2874 | 2894 | "shape":"HttpPathMatch",
|
2875 | 2895 | "documentation":"<p>The client request path to match on.</p>"
|
2876 | 2896 | },
|
| 2897 | + "port":{ |
| 2898 | + "shape":"ListenerPort", |
| 2899 | + "documentation":"<p>The port number to match on.</p>" |
| 2900 | + }, |
2877 | 2901 | "prefix":{
|
2878 | 2902 | "shape":"String",
|
2879 | 2903 | "documentation":"<p>Specifies the path to match requests with. This parameter must always start with <code>/</code>, which by itself matches all requests to the virtual service name. You can also match for path-based routing of requests. For example, if your virtual service name is <code>my-service.local</code> and you want the route to match requests to <code>my-service.local/metrics</code>, your prefix should be <code>/metrics</code>.</p>"
|
|
2930 | 2954 | "IPv6_ONLY"
|
2931 | 2955 | ]
|
2932 | 2956 | },
|
| 2957 | + "JsonFormat":{ |
| 2958 | + "type":"list", |
| 2959 | + "member":{"shape":"JsonFormatRef"} |
| 2960 | + }, |
| 2961 | + "JsonFormatRef":{ |
| 2962 | + "type":"structure", |
| 2963 | + "required":[ |
| 2964 | + "key", |
| 2965 | + "value" |
| 2966 | + ], |
| 2967 | + "members":{ |
| 2968 | + "key":{ |
| 2969 | + "shape":"JsonKey", |
| 2970 | + "documentation":"<p>The specified key for the JSON.</p>" |
| 2971 | + }, |
| 2972 | + "value":{ |
| 2973 | + "shape":"JsonValue", |
| 2974 | + "documentation":"<p>The specified value for the JSON.</p>" |
| 2975 | + } |
| 2976 | + }, |
| 2977 | + "documentation":"<p>An object that represents the key value pairs for the JSON.</p>" |
| 2978 | + }, |
| 2979 | + "JsonKey":{ |
| 2980 | + "type":"string", |
| 2981 | + "max":100, |
| 2982 | + "min":1 |
| 2983 | + }, |
| 2984 | + "JsonValue":{ |
| 2985 | + "type":"string", |
| 2986 | + "max":100, |
| 2987 | + "min":1 |
| 2988 | + }, |
2933 | 2989 | "LimitExceededException":{
|
2934 | 2990 | "type":"structure",
|
2935 | 2991 | "members":{
|
|
3378 | 3434 | },
|
3379 | 3435 | "documentation":"<p>An object that represents a listener for a virtual node.</p>"
|
3380 | 3436 | },
|
| 3437 | + "ListenerPort":{ |
| 3438 | + "type":"integer", |
| 3439 | + "box":true, |
| 3440 | + "max":65535, |
| 3441 | + "min":1 |
| 3442 | + }, |
3381 | 3443 | "ListenerTimeout":{
|
3382 | 3444 | "type":"structure",
|
3383 | 3445 | "members":{
|
|
3534 | 3596 | },
|
3535 | 3597 | "documentation":"<p>An object that represents the logging information for a virtual node.</p>"
|
3536 | 3598 | },
|
| 3599 | + "LoggingFormat":{ |
| 3600 | + "type":"structure", |
| 3601 | + "members":{ |
| 3602 | + "json":{ |
| 3603 | + "shape":"JsonFormat", |
| 3604 | + "documentation":"<p/>" |
| 3605 | + }, |
| 3606 | + "text":{ |
| 3607 | + "shape":"TextFormat", |
| 3608 | + "documentation":"<p/>" |
| 3609 | + } |
| 3610 | + }, |
| 3611 | + "documentation":"<p>An object that represents the format for the logs.</p>", |
| 3612 | + "union":true |
| 3613 | + }, |
3537 | 3614 | "Long":{
|
3538 | 3615 | "type":"long",
|
3539 | 3616 | "box":true
|
|
4156 | 4233 | "shape":"TcpRouteAction",
|
4157 | 4234 | "documentation":"<p>The action to take if a match is determined.</p>"
|
4158 | 4235 | },
|
| 4236 | + "match":{ |
| 4237 | + "shape":"TcpRouteMatch", |
| 4238 | + "documentation":"<p>An object that represents the criteria for determining a request match.</p>" |
| 4239 | + }, |
4159 | 4240 | "timeout":{
|
4160 | 4241 | "shape":"TcpTimeout",
|
4161 | 4242 | "documentation":"<p>An object that represents types of timeouts. </p>"
|
|
4174 | 4255 | },
|
4175 | 4256 | "documentation":"<p>An object that represents the action to take if a match is determined.</p>"
|
4176 | 4257 | },
|
| 4258 | + "TcpRouteMatch":{ |
| 4259 | + "type":"structure", |
| 4260 | + "members":{ |
| 4261 | + "port":{ |
| 4262 | + "shape":"ListenerPort", |
| 4263 | + "documentation":"<p>The port number to match on.</p>" |
| 4264 | + } |
| 4265 | + }, |
| 4266 | + "documentation":"<p>An object representing the TCP route to match.</p>" |
| 4267 | + }, |
4177 | 4268 | "TcpTimeout":{
|
4178 | 4269 | "type":"structure",
|
4179 | 4270 | "members":{
|
|
4184 | 4275 | },
|
4185 | 4276 | "documentation":"<p>An object that represents types of timeouts. </p>"
|
4186 | 4277 | },
|
| 4278 | + "TextFormat":{ |
| 4279 | + "type":"string", |
| 4280 | + "max":1000, |
| 4281 | + "min":1 |
| 4282 | + }, |
4187 | 4283 | "Timestamp":{"type":"timestamp"},
|
4188 | 4284 | "TlsValidationContext":{
|
4189 | 4285 | "type":"structure",
|
4190 | 4286 | "required":["trust"],
|
4191 | 4287 | "members":{
|
4192 | 4288 | "subjectAlternativeNames":{
|
4193 | 4289 | "shape":"SubjectAlternativeNames",
|
4194 |
| - "documentation":"<p>A reference to an object that represents the SANs for a Transport Layer Security (TLS) validation context.</p>" |
| 4290 | + "documentation":"<p>A reference to an object that represents the SANs for a Transport Layer Security (TLS) validation context. If you don't specify SANs on the <i>terminating</i> mesh endpoint, the Envoy proxy for that node doesn't verify the SAN on a peer client certificate. If you don't specify SANs on the <i>originating</i> mesh endpoint, the SAN on the certificate provided by the terminating endpoint must match the mesh endpoint service discovery configuration. Since SPIRE vended certificates have a SPIFFE ID as a name, you must set the SAN since the name doesn't match the service discovery name.</p>" |
4195 | 4291 | },
|
4196 | 4292 | "trust":{
|
4197 | 4293 | "shape":"TlsValidationContextTrust",
|
|
4773 | 4869 | "type":"structure",
|
4774 | 4870 | "required":["path"],
|
4775 | 4871 | "members":{
|
| 4872 | + "format":{ |
| 4873 | + "shape":"LoggingFormat", |
| 4874 | + "documentation":"<p>The specified format for the virtual gateway access logs. It can be either <code>json_format</code> or <code>text_format</code>.</p>" |
| 4875 | + }, |
4776 | 4876 | "path":{
|
4777 | 4877 | "shape":"FilePath",
|
4778 | 4878 | "documentation":"<p>The file path to write access logs to. You can use <code>/dev/stdout</code> to send access logs to standard out and configure your Envoy container to use a log driver, such as <code>awslogs</code>, to export the access logs to a log storage service such as Amazon CloudWatch Logs. You can also specify a path in the Envoy container's file system to write the files to disk.</p>"
|
|
5711 | 5811 | "weight"
|
5712 | 5812 | ],
|
5713 | 5813 | "members":{
|
| 5814 | + "port":{ |
| 5815 | + "shape":"ListenerPort", |
| 5816 | + "documentation":"<p>The targeted port of the weighted object.</p>" |
| 5817 | + }, |
5714 | 5818 | "virtualNode":{
|
5715 | 5819 | "shape":"ResourceName",
|
5716 | 5820 | "documentation":"<p>The virtual node to associate with the weighted target.</p>"
|
|
0 commit comments