Skip to content

Commit 01f3d6a

Browse files
author
awstools
committed
docs(client-api-gateway): Documentation updates for Amazon API Gateway
1 parent 6acfe4a commit 01f3d6a

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

clients/client-api-gateway/src/models/models_0.ts

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1571,6 +1571,10 @@ export interface TlsConfig {
15711571
* validation, which includes checking the certificate's expiration date, hostname, and
15721572
* presence of a root certificate authority. Supported only for <code>HTTP</code> and
15731573
* <code>HTTP_PROXY</code> integrations.</p>
1574+
* <important>
1575+
* <p>Enabling <code>insecureSkipVerification</code> isn't recommended, especially for integrations with public
1576+
* HTTPS endpoints. If you enable <code>insecureSkipVerification</code>, you increase the risk of man-in-the-middle attacks.</p>
1577+
* </important>
15741578
*/
15751579
insecureSkipVerification?: boolean;
15761580
}

codegen/sdk-codegen/aws-models/api-gateway.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9865,7 +9865,7 @@
98659865
"insecureSkipVerification": {
98669866
"target": "com.amazonaws.apigateway#Boolean",
98679867
"traits": {
9868-
"smithy.api#documentation": "<p>Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is\n issued by a supported certificate authority. This isn’t recommended, but it enables you to\n use certificates that are signed by private certificate authorities, or certificates\n that are self-signed. If enabled, API Gateway still performs basic certificate\n validation, which includes checking the certificate's expiration date, hostname, and\n presence of a root certificate authority. Supported only for <code>HTTP</code> and\n <code>HTTP_PROXY</code> integrations.</p>"
9868+
"smithy.api#documentation": "<p>Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is\n issued by a supported certificate authority. This isn’t recommended, but it enables you to\n use certificates that are signed by private certificate authorities, or certificates\n that are self-signed. If enabled, API Gateway still performs basic certificate\n validation, which includes checking the certificate's expiration date, hostname, and\n presence of a root certificate authority. Supported only for <code>HTTP</code> and\n <code>HTTP_PROXY</code> integrations.</p>\n <important>\n <p>Enabling <code>insecureSkipVerification</code> isn't recommended, especially for integrations with public\n HTTPS endpoints. If you enable <code>insecureSkipVerification</code>, you increase the risk of man-in-the-middle attacks.</p>\n </important>"
98699869
}
98709870
}
98719871
},

0 commit comments

Comments
 (0)