Interface NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy
-
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy.Jsii$Proxy
@Generated(value="jsii-pacmak/1.102.0 (build e354887)", date="2024-08-31T03:59:22.145Z") @Stability(Stable) public interface NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy extends software.amazon.jsii.JsiiSerializable
-
-
Nested Class Summary
Nested Classes Modifier and Type Interface Description static classNetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy.Builderstatic classNetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy.Jsii$ProxyAn implementation forNetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy
-
Method Summary
All Methods Static Methods Instance Methods Default Methods Modifier and Type Method Description static NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy.Builderbuilder()default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicyAddSignaturesgetAddSignatures()add_signatures block.default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicyCacheKeyPolicygetCacheKeyPolicy()cache_key_policy block.default StringgetCacheMode()Cache modes allow users to control the behaviour of the cache, what content it should cache automatically, whether to respect origin headers, or whether to unconditionally cache all responses.default StringgetClientTtl()Specifies a separate client (e.g.default StringgetDefaultTtl()Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age).default StringgetMaxTtl()Specifies the maximum allowed TTL for cached content served by this origin.default ObjectgetNegativeCaching()Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects.default Map<String,String>getNegativeCachingPolicy()Sets a cache TTL for the specified HTTP status code.default StringgetSignedRequestKeyset()The EdgeCacheKeyset containing the set of public keys used to validate signed requests at the edge.default StringgetSignedRequestMaximumExpirationTtl()Limit how far into the future the expiration time of a signed request may be.default StringgetSignedRequestMode()Whether to enforce signed requests.default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicySignedTokenOptionsgetSignedTokenOptions()signed_token_options block.
-
-
-
Method Detail
-
getAddSignatures
@Stability(Stable) @Nullable default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicyAddSignatures getAddSignatures()
add_signatures block.Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#add_signatures NetworkServicesEdgeCacheService#add_signatures}
-
getCacheKeyPolicy
@Stability(Stable) @Nullable default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicyCacheKeyPolicy getCacheKeyPolicy()
cache_key_policy block.Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#cache_key_policy NetworkServicesEdgeCacheService#cache_key_policy}
-
getCacheMode
@Stability(Stable) @Nullable default String getCacheMode()
Cache modes allow users to control the behaviour of the cache, what content it should cache automatically, whether to respect origin headers, or whether to unconditionally cache all responses.For all cache modes, Cache-Control headers will be passed to the client. Use clientTtl to override what is sent to the client. Possible values: ["CACHE_ALL_STATIC", "USE_ORIGIN_HEADERS", "FORCE_CACHE_ALL", "BYPASS_CACHE"] Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#cache_mode NetworkServicesEdgeCacheService#cache_mode}
-
getClientTtl
@Stability(Stable) @Nullable default String getClientTtl()
Specifies a separate client (e.g. browser client) TTL, separate from the TTL used by the edge caches. Leaving this empty will use the same cache TTL for both the CDN and the client-facing response.* The TTL must be > 0 and <= 86400s (1 day) * The clientTtl cannot be larger than the defaultTtl (if set) * Fractions of a second are not allowed. Omit this field to use the defaultTtl, or the max-age set by the origin, as the client-facing TTL. When the cache mode is set to "USE_ORIGIN_HEADERS" or "BYPASS_CACHE", you must omit this field. A duration in seconds terminated by 's'. Example: "3s". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#client_ttl NetworkServicesEdgeCacheService#client_ttl}
-
getDefaultTtl
@Stability(Stable) @Nullable default String getDefaultTtl()
Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age).Defaults to 3600s (1 hour). * The TTL must be >= 0 and <= 31,536,000 seconds (1 year) * Setting a TTL of "0" means "always revalidate" (equivalent to must-revalidate) * The value of defaultTTL cannot be set to a value greater than that of maxTTL. * Fractions of a second are not allowed. * When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. Note that infrequently accessed objects may be evicted from the cache before the defined TTL. Objects that expire will be revalidated with the origin. When the cache mode is set to "USE_ORIGIN_HEADERS" or "BYPASS_CACHE", you must omit this field. A duration in seconds terminated by 's'. Example: "3s". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#default_ttl NetworkServicesEdgeCacheService#default_ttl}
-
getMaxTtl
@Stability(Stable) @Nullable default String getMaxTtl()
Specifies the maximum allowed TTL for cached content served by this origin.Defaults to 86400s (1 day). Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTtl seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. * The TTL must be >= 0 and <= 31,536,000 seconds (1 year) * Setting a TTL of "0" means "always revalidate" * The value of maxTtl must be equal to or greater than defaultTtl. * Fractions of a second are not allowed. When the cache mode is set to "USE_ORIGIN_HEADERS", "FORCE_CACHE_ALL", or "BYPASS_CACHE", you must omit this field. A duration in seconds terminated by 's'. Example: "3s". Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#max_ttl NetworkServicesEdgeCacheService#max_ttl}
-
getNegativeCaching
@Stability(Stable) @Nullable default Object getNegativeCaching()
Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects.This can reduce the load on your origin and improve end-user experience by reducing response latency. By default, the CDNPolicy will apply the following default TTLs to these status codes: * HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m * HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s * HTTP 405 (Method Not Found), 414 (URI Too Long), 501 (Not Implemented): 60s These defaults can be overridden in negativeCachingPolicy Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#negative_caching NetworkServicesEdgeCacheService#negative_caching}
-
getNegativeCachingPolicy
@Stability(Stable) @Nullable default Map<String,String> getNegativeCachingPolicy()
Sets a cache TTL for the specified HTTP status code. negativeCaching must be enabled to configure negativeCachingPolicy.* Omitting the policy and leaving negativeCaching enabled will use the default TTLs for each status code, defined in negativeCaching. * TTLs must be >= 0 (where 0 is "always revalidate") and <= 86400s (1 day) Note that when specifying an explicit negativeCachingPolicy, you should take care to specify a cache TTL for all response codes that you wish to cache. The CDNPolicy will not apply any default negative caching when a policy exists. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#negative_caching_policy NetworkServicesEdgeCacheService#negative_caching_policy}
-
getSignedRequestKeyset
@Stability(Stable) @Nullable default String getSignedRequestKeyset()
The EdgeCacheKeyset containing the set of public keys used to validate signed requests at the edge.Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#signed_request_keyset NetworkServicesEdgeCacheService#signed_request_keyset}
-
getSignedRequestMaximumExpirationTtl
@Stability(Stable) @Nullable default String getSignedRequestMaximumExpirationTtl()
Limit how far into the future the expiration time of a signed request may be.When set, a signed request is rejected if its expiration time is later than now + signedRequestMaximumExpirationTtl, where now is the time at which the signed request is first handled by the CDN. * The TTL must be > 0. * Fractions of a second are not allowed. By default, signedRequestMaximumExpirationTtl is not set and the expiration time of a signed request may be arbitrarily far into future. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#signed_request_maximum_expiration_ttl NetworkServicesEdgeCacheService#signed_request_maximum_expiration_ttl}
-
getSignedRequestMode
@Stability(Stable) @Nullable default String getSignedRequestMode()
Whether to enforce signed requests.The default value is DISABLED, which means all content is public, and does not authorize access. You must also set a signedRequestKeyset to enable signed requests. When set to REQUIRE_SIGNATURES, all matching requests will have their signature validated. Requests that were not signed with the corresponding private key, or that are otherwise invalid (expired, do not match the signature, IP address, or header) will be rejected with a HTTP 403 and (if enabled) logged. Possible values: ["DISABLED", "REQUIRE_SIGNATURES", "REQUIRE_TOKENS"] Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#signed_request_mode NetworkServicesEdgeCacheService#signed_request_mode}
-
getSignedTokenOptions
@Stability(Stable) @Nullable default NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicySignedTokenOptions getSignedTokenOptions()
signed_token_options block.Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/network_services_edge_cache_service#signed_token_options NetworkServicesEdgeCacheService#signed_token_options}
-
builder
@Stability(Stable) static NetworkServicesEdgeCacheServiceRoutingPathMatcherRouteRuleRouteActionCdnPolicy.Builder builder()
-
-