Skip to content

Commit 5094735

Browse files
author
AWS
committed
Amazon API Gateway Update: Documentation updates for Amazon API Gateway
1 parent 78d7540 commit 5094735

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon API Gateway",
4+
"contributor": "",
5+
"description": "Documentation updates for Amazon API Gateway"
6+
}

services/apigateway/src/main/resources/codegen-resources/service-2.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6536,7 +6536,7 @@
65366536
"members":{
65376537
"insecureSkipVerification":{
65386538
"shape":"Boolean",
6539-
"documentation":"<p>Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway still performs basic certificate validation, which includes checking the certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p>"
6539+
"documentation":"<p>Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway still performs basic certificate validation, which includes checking the certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for <code>HTTP</code> and <code>HTTP_PROXY</code> integrations.</p> <important> <p>Enabling <code>insecureSkipVerification</code> isn't recommended, especially for integrations with public HTTPS endpoints. If you enable <code>insecureSkipVerification</code>, you increase the risk of man-in-the-middle attacks.</p> </important>"
65406540
}
65416541
},
65426542
"documentation":"<p>Specifies the TLS configuration for an integration.</p>"

0 commit comments

Comments
 (0)