public static final class CommonTlsContext.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder> implements CommonTlsContextOrBuilder
TLS context shared by both client and server TLS contexts. [#next-free-field: 9]Protobuf type
envoy.api.v2.auth.CommonTlsContext| Modifier and Type | Method and Description |
|---|---|
CommonTlsContext.Builder |
addAllAlpnProtocols(Iterable<String> values)
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.Builder |
addAllTlsCertificates(Iterable<? extends TlsCertificate> values)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
addAllTlsCertificateSdsSecretConfigs(Iterable<? extends SdsSecretConfig> values)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
addAlpnProtocols(String value)
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.Builder |
addAlpnProtocolsBytes(com.google.protobuf.ByteString value)
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
CommonTlsContext.Builder |
addTlsCertificates(int index,
TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
addTlsCertificates(int index,
TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
addTlsCertificates(TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
addTlsCertificates(TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
TlsCertificate.Builder |
addTlsCertificatesBuilder()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
TlsCertificate.Builder |
addTlsCertificatesBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
addTlsCertificateSdsSecretConfigs(int index,
SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
addTlsCertificateSdsSecretConfigs(int index,
SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
addTlsCertificateSdsSecretConfigs(SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
addTlsCertificateSdsSecretConfigs(SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
|
SdsSecretConfig.Builder |
addTlsCertificateSdsSecretConfigsBuilder()
Configs for fetching TLS certificates via SDS API.
|
SdsSecretConfig.Builder |
addTlsCertificateSdsSecretConfigsBuilder(int index)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext |
build() |
CommonTlsContext |
buildPartial() |
CommonTlsContext.Builder |
clear() |
CommonTlsContext.Builder |
clearAlpnProtocols()
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.Builder |
clearCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
CommonTlsContext.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
CommonTlsContext.Builder |
clearTlsCertificates()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
clearTlsCertificateSdsSecretConfigs()
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
clearTlsParams()
TLS protocol versions, cipher suites etc.
|
CommonTlsContext.Builder |
clearValidationContext()
How to validate peer certificates.
|
CommonTlsContext.Builder |
clearValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
|
CommonTlsContext.Builder |
clearValidationContextType() |
CommonTlsContext.Builder |
clone() |
String |
getAlpnProtocols(int index)
Supplies the list of ALPN protocols that the listener should expose.
|
com.google.protobuf.ByteString |
getAlpnProtocolsBytes(int index)
Supplies the list of ALPN protocols that the listener should expose.
|
int |
getAlpnProtocolsCount()
Supplies the list of ALPN protocols that the listener should expose.
|
com.google.protobuf.ProtocolStringList |
getAlpnProtocolsList()
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.CombinedCertificateValidationContext |
getCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.CombinedCertificateValidationContext.Builder |
getCombinedValidationContextBuilder()
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.CombinedCertificateValidationContextOrBuilder |
getCombinedValidationContextOrBuilder()
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
TlsCertificate |
getTlsCertificates(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
TlsCertificate.Builder |
getTlsCertificatesBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
List<TlsCertificate.Builder> |
getTlsCertificatesBuilderList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
int |
getTlsCertificatesCount()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
SdsSecretConfig |
getTlsCertificateSdsSecretConfigs(int index)
Configs for fetching TLS certificates via SDS API.
|
SdsSecretConfig.Builder |
getTlsCertificateSdsSecretConfigsBuilder(int index)
Configs for fetching TLS certificates via SDS API.
|
List<SdsSecretConfig.Builder> |
getTlsCertificateSdsSecretConfigsBuilderList()
Configs for fetching TLS certificates via SDS API.
|
int |
getTlsCertificateSdsSecretConfigsCount()
Configs for fetching TLS certificates via SDS API.
|
List<SdsSecretConfig> |
getTlsCertificateSdsSecretConfigsList()
Configs for fetching TLS certificates via SDS API.
|
SdsSecretConfigOrBuilder |
getTlsCertificateSdsSecretConfigsOrBuilder(int index)
Configs for fetching TLS certificates via SDS API.
|
List<? extends SdsSecretConfigOrBuilder> |
getTlsCertificateSdsSecretConfigsOrBuilderList()
Configs for fetching TLS certificates via SDS API.
|
List<TlsCertificate> |
getTlsCertificatesList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
TlsCertificateOrBuilder |
getTlsCertificatesOrBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
List<? extends TlsCertificateOrBuilder> |
getTlsCertificatesOrBuilderList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
TlsParameters |
getTlsParams()
TLS protocol versions, cipher suites etc.
|
TlsParameters.Builder |
getTlsParamsBuilder()
TLS protocol versions, cipher suites etc.
|
TlsParametersOrBuilder |
getTlsParamsOrBuilder()
TLS protocol versions, cipher suites etc.
|
CertificateValidationContext |
getValidationContext()
How to validate peer certificates.
|
CertificateValidationContext.Builder |
getValidationContextBuilder()
How to validate peer certificates.
|
CertificateValidationContextOrBuilder |
getValidationContextOrBuilder()
How to validate peer certificates.
|
SdsSecretConfig |
getValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
|
SdsSecretConfig.Builder |
getValidationContextSdsSecretConfigBuilder()
Config for fetching validation context via SDS API.
|
SdsSecretConfigOrBuilder |
getValidationContextSdsSecretConfigOrBuilder()
Config for fetching validation context via SDS API.
|
CommonTlsContext.ValidationContextTypeCase |
getValidationContextTypeCase() |
boolean |
hasCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
boolean |
hasTlsParams()
TLS protocol versions, cipher suites etc.
|
boolean |
hasValidationContext()
How to validate peer certificates.
|
boolean |
hasValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
CommonTlsContext.Builder |
mergeCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext value)
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
CommonTlsContext.Builder |
mergeFrom(CommonTlsContext other) |
CommonTlsContext.Builder |
mergeFrom(com.google.protobuf.Message other) |
CommonTlsContext.Builder |
mergeTlsParams(TlsParameters value)
TLS protocol versions, cipher suites etc.
|
CommonTlsContext.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
CommonTlsContext.Builder |
mergeValidationContext(CertificateValidationContext value)
How to validate peer certificates.
|
CommonTlsContext.Builder |
mergeValidationContextSdsSecretConfig(SdsSecretConfig value)
Config for fetching validation context via SDS API.
|
CommonTlsContext.Builder |
removeTlsCertificates(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
removeTlsCertificateSdsSecretConfigs(int index)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
setAlpnProtocols(int index,
String value)
Supplies the list of ALPN protocols that the listener should expose.
|
CommonTlsContext.Builder |
setCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext.Builder builderForValue)
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.Builder |
setCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext value)
Combined certificate validation context holds a default CertificateValidationContext
and SDS config.
|
CommonTlsContext.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
CommonTlsContext.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
CommonTlsContext.Builder |
setTlsCertificates(int index,
TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
setTlsCertificates(int index,
TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
same context to allow both RSA and ECDSA certificates.
|
CommonTlsContext.Builder |
setTlsCertificateSdsSecretConfigs(int index,
SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
setTlsCertificateSdsSecretConfigs(int index,
SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
|
CommonTlsContext.Builder |
setTlsParams(TlsParameters.Builder builderForValue)
TLS protocol versions, cipher suites etc.
|
CommonTlsContext.Builder |
setTlsParams(TlsParameters value)
TLS protocol versions, cipher suites etc.
|
CommonTlsContext.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
CommonTlsContext.Builder |
setValidationContext(CertificateValidationContext.Builder builderForValue)
How to validate peer certificates.
|
CommonTlsContext.Builder |
setValidationContext(CertificateValidationContext value)
How to validate peer certificates.
|
CommonTlsContext.Builder |
setValidationContextSdsSecretConfig(SdsSecretConfig.Builder builderForValue)
Config for fetching validation context via SDS API.
|
CommonTlsContext.Builder |
setValidationContextSdsSecretConfig(SdsSecretConfig value)
Config for fetching validation context via SDS API.
|
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, newBuilderForField, onBuilt, onChanged, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic CommonTlsContext build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic CommonTlsContext buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic CommonTlsContext.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder mergeFrom(CommonTlsContext other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public CommonTlsContext.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<CommonTlsContext.Builder>IOExceptionpublic CommonTlsContext.ValidationContextTypeCase getValidationContextTypeCase()
getValidationContextTypeCase in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder clearValidationContextType()
public boolean hasTlsParams()
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;hasTlsParams in interface CommonTlsContextOrBuilderpublic TlsParameters getTlsParams()
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;getTlsParams in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setTlsParams(TlsParameters value)
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;public CommonTlsContext.Builder setTlsParams(TlsParameters.Builder builderForValue)
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;public CommonTlsContext.Builder mergeTlsParams(TlsParameters value)
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;public CommonTlsContext.Builder clearTlsParams()
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;public TlsParameters.Builder getTlsParamsBuilder()
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;public TlsParametersOrBuilder getTlsParamsOrBuilder()
TLS protocol versions, cipher suites etc.
.envoy.api.v2.auth.TlsParameters tls_params = 1;getTlsParamsOrBuilder in interface CommonTlsContextOrBuilderpublic List<TlsCertificate> getTlsCertificatesList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;getTlsCertificatesList in interface CommonTlsContextOrBuilderpublic int getTlsCertificatesCount()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;getTlsCertificatesCount in interface CommonTlsContextOrBuilderpublic TlsCertificate getTlsCertificates(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;getTlsCertificates in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setTlsCertificates(int index, TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder setTlsCertificates(int index, TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder addTlsCertificates(TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder addTlsCertificates(int index, TlsCertificate value)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder addTlsCertificates(TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder addTlsCertificates(int index, TlsCertificate.Builder builderForValue)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder addAllTlsCertificates(Iterable<? extends TlsCertificate> values)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder clearTlsCertificates()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public CommonTlsContext.Builder removeTlsCertificates(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public TlsCertificate.Builder getTlsCertificatesBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public TlsCertificateOrBuilder getTlsCertificatesOrBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;getTlsCertificatesOrBuilder in interface CommonTlsContextOrBuilderpublic List<? extends TlsCertificateOrBuilder> getTlsCertificatesOrBuilderList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;getTlsCertificatesOrBuilderList in interface CommonTlsContextOrBuilderpublic TlsCertificate.Builder addTlsCertificatesBuilder()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public TlsCertificate.Builder addTlsCertificatesBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public List<TlsCertificate.Builder> getTlsCertificatesBuilderList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA.
repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2;public List<SdsSecretConfig> getTlsCertificateSdsSecretConfigsList()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }getTlsCertificateSdsSecretConfigsList in interface CommonTlsContextOrBuilderpublic int getTlsCertificateSdsSecretConfigsCount()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }getTlsCertificateSdsSecretConfigsCount in interface CommonTlsContextOrBuilderpublic SdsSecretConfig getTlsCertificateSdsSecretConfigs(int index)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }getTlsCertificateSdsSecretConfigs in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setTlsCertificateSdsSecretConfigs(int index, SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder setTlsCertificateSdsSecretConfigs(int index, SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder addTlsCertificateSdsSecretConfigs(SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder addTlsCertificateSdsSecretConfigs(int index, SdsSecretConfig value)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder addTlsCertificateSdsSecretConfigs(SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder addTlsCertificateSdsSecretConfigs(int index, SdsSecretConfig.Builder builderForValue)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder addAllTlsCertificateSdsSecretConfigs(Iterable<? extends SdsSecretConfig> values)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder clearTlsCertificateSdsSecretConfigs()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public CommonTlsContext.Builder removeTlsCertificateSdsSecretConfigs(int index)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public SdsSecretConfig.Builder getTlsCertificateSdsSecretConfigsBuilder(int index)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public SdsSecretConfigOrBuilder getTlsCertificateSdsSecretConfigsOrBuilder(int index)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }getTlsCertificateSdsSecretConfigsOrBuilder in interface CommonTlsContextOrBuilderpublic List<? extends SdsSecretConfigOrBuilder> getTlsCertificateSdsSecretConfigsOrBuilderList()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }getTlsCertificateSdsSecretConfigsOrBuilderList in interface CommonTlsContextOrBuilderpublic SdsSecretConfig.Builder addTlsCertificateSdsSecretConfigsBuilder()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public SdsSecretConfig.Builder addTlsCertificateSdsSecretConfigsBuilder(int index)
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public List<SdsSecretConfig.Builder> getTlsCertificateSdsSecretConfigsBuilderList()
Configs for fetching TLS certificates via SDS API.
repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }public boolean hasValidationContext()
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;hasValidationContext in interface CommonTlsContextOrBuilderpublic CertificateValidationContext getValidationContext()
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;getValidationContext in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setValidationContext(CertificateValidationContext value)
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;public CommonTlsContext.Builder setValidationContext(CertificateValidationContext.Builder builderForValue)
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;public CommonTlsContext.Builder mergeValidationContext(CertificateValidationContext value)
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;public CommonTlsContext.Builder clearValidationContext()
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;public CertificateValidationContext.Builder getValidationContextBuilder()
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;public CertificateValidationContextOrBuilder getValidationContextOrBuilder()
How to validate peer certificates.
.envoy.api.v2.auth.CertificateValidationContext validation_context = 3;getValidationContextOrBuilder in interface CommonTlsContextOrBuilderpublic boolean hasValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;hasValidationContextSdsSecretConfig in interface CommonTlsContextOrBuilderpublic SdsSecretConfig getValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;getValidationContextSdsSecretConfig in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setValidationContextSdsSecretConfig(SdsSecretConfig value)
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;public CommonTlsContext.Builder setValidationContextSdsSecretConfig(SdsSecretConfig.Builder builderForValue)
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;public CommonTlsContext.Builder mergeValidationContextSdsSecretConfig(SdsSecretConfig value)
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;public CommonTlsContext.Builder clearValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;public SdsSecretConfig.Builder getValidationContextSdsSecretConfigBuilder()
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;public SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder()
Config for fetching validation context via SDS API.
.envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7;getValidationContextSdsSecretConfigOrBuilder in interface CommonTlsContextOrBuilderpublic boolean hasCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;hasCombinedValidationContext in interface CommonTlsContextOrBuilderpublic CommonTlsContext.CombinedCertificateValidationContext getCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;getCombinedValidationContext in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext value)
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;public CommonTlsContext.Builder setCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext.Builder builderForValue)
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;public CommonTlsContext.Builder mergeCombinedValidationContext(CommonTlsContext.CombinedCertificateValidationContext value)
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;public CommonTlsContext.Builder clearCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;public CommonTlsContext.CombinedCertificateValidationContext.Builder getCombinedValidationContextBuilder()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;public CommonTlsContext.CombinedCertificateValidationContextOrBuilder getCombinedValidationContextOrBuilder()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;getCombinedValidationContextOrBuilder in interface CommonTlsContextOrBuilderpublic com.google.protobuf.ProtocolStringList getAlpnProtocolsList()
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;getAlpnProtocolsList in interface CommonTlsContextOrBuilderpublic int getAlpnProtocolsCount()
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;getAlpnProtocolsCount in interface CommonTlsContextOrBuilderpublic String getAlpnProtocols(int index)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;getAlpnProtocols in interface CommonTlsContextOrBuilderpublic com.google.protobuf.ByteString getAlpnProtocolsBytes(int index)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;getAlpnProtocolsBytes in interface CommonTlsContextOrBuilderpublic CommonTlsContext.Builder setAlpnProtocols(int index, String value)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;public CommonTlsContext.Builder addAlpnProtocols(String value)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;public CommonTlsContext.Builder addAllAlpnProtocols(Iterable<String> values)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;public CommonTlsContext.Builder clearAlpnProtocols()
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;public CommonTlsContext.Builder addAlpnProtocolsBytes(com.google.protobuf.ByteString value)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;public final CommonTlsContext.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>public final CommonTlsContext.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<CommonTlsContext.Builder>Copyright © 2018–2021 The Envoy Project. All rights reserved.