Skip to content

Commit

Permalink
feat(client-cloudfront): Adds Http 3 support to distributions
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Aug 15, 2022
1 parent 6ab9ba7 commit 0f250fe
Show file tree
Hide file tree
Showing 2 changed files with 20 additions and 10 deletions.
20 changes: 11 additions & 9 deletions clients/client-cloudfront/src/models/models_0.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2173,7 +2173,7 @@ export interface DefaultCacheBehavior {
MaxTTL?: number;
}

export type HttpVersion = "http1.1" | "http2";
export type HttpVersion = "http1.1" | "http2" | "http2and3" | "http3";

/**
* <p>A complex type that controls whether access logs are written for the
Expand Down Expand Up @@ -3060,14 +3060,16 @@ export interface DistributionConfig {
WebACLId?: string;

/**
* <p>(Optional) Specify the maximum HTTP version that you want viewers to use to communicate
* with CloudFront. The default value for new web distributions is http2. Viewers that don't support
* HTTP/2 automatically use an earlier HTTP version.</p>
* <p>For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must
* support Server Name Identification (SNI).</p>
* <p>In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency.
* You can improve performance by optimizing for HTTP/2. For more information, do an Internet
* search for "http/2 optimization." </p>
* <p>(Optional) Specify the maximum HTTP version(s) that you want viewers to use to communicate
* with CloudFront. The default value for new web distributions is <code>http2</code>. Viewers
* that don't support HTTP/2 automatically use an earlier HTTP version.</p>
* <p>For viewers and CloudFront to use HTTP/2, viewers must support TLSv1.2 or later, and must
* support Server Name Indication (SNI).</p>
* <p>For viewers and CloudFront to use HTTP/3, viewers must support TLSv1.3 and Server Name
* Indication (SNI). CloudFront supports HTTP/3 connection migration to allow the
* viewer to switch networks without losing connection. For more information
* about connection migration, see <a href="https://www.rfc-editor.org/rfc/rfc9000.html#name-connection-migration">Connection Migration</a> at RFC 9000. For more information about
* supported TLSv1.3 ciphers, see <a href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html">Supported protocols and ciphers between viewers and CloudFront</a>.</p>
*/
HttpVersion?: HttpVersion | string;

Expand Down
10 changes: 9 additions & 1 deletion codegen/sdk-codegen/aws-models/cloudfront.json
Original file line number Diff line number Diff line change
Expand Up @@ -4321,7 +4321,7 @@
"HttpVersion": {
"target": "com.amazonaws.cloudfront#HttpVersion",
"traits": {
"smithy.api#documentation": "<p>(Optional) Specify the maximum HTTP version that you want viewers to use to communicate \n\t\t\twith CloudFront. The default value for new web distributions is http2. Viewers that don't support \n\t\t\tHTTP/2 automatically use an earlier HTTP version.</p> \n\t\t <p>For viewers and CloudFront to use HTTP/2, viewers must support TLS 1.2 or later, and must \n\t\t\tsupport Server Name Identification (SNI).</p> \n\t\t <p>In general, configuring CloudFront to communicate with viewers using HTTP/2 reduces latency. \n\t\t\tYou can improve performance by optimizing for HTTP/2. For more information, do an Internet \n\t\t\tsearch for \"http/2 optimization.\" </p>"
"smithy.api#documentation": "<p>(Optional) Specify the maximum HTTP version(s) that you want viewers to use to communicate\n\t\t\twith CloudFront. The default value for new web distributions is <code>http2</code>. Viewers\n\t\t\tthat don't support HTTP/2 automatically use an earlier HTTP version.</p> \n\t\t <p>For viewers and CloudFront to use HTTP/2, viewers must support TLSv1.2 or later, and must \n\t\t\tsupport Server Name Indication (SNI).</p>\n\t\t <p>For viewers and CloudFront to use HTTP/3, viewers must support TLSv1.3 and Server Name\n\t\t\tIndication (SNI). CloudFront supports HTTP/3 connection migration to allow the\n\t\t\tviewer to switch networks without losing connection. For more information\n\t\t\tabout connection migration, see <a href=\"https://www.rfc-editor.org/rfc/rfc9000.html#name-connection-migration\">Connection Migration</a> at RFC 9000. For more information about\n\t\t\tsupported TLSv1.3 ciphers, see <a href=\"https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html\">Supported protocols and ciphers between viewers and CloudFront</a>.</p>"
}
},
"IsIPV6Enabled": {
Expand Down Expand Up @@ -7056,6 +7056,14 @@
{
"value": "http2",
"name": "http2"
},
{
"value": "http3",
"name": "http3"
},
{
"value": "http2and3",
"name": "http2and3"
}
]
}
Expand Down

0 comments on commit 0f250fe

Please sign in to comment.