public final class Http2ProtocolOptions extends com.google.protobuf.GeneratedMessageV3 implements Http2ProtocolOptionsOrBuilder
[#next-free-field: 16]Protobuf type
envoy.config.core.v3.Http2ProtocolOptions| Modifier and Type | Class and Description |
|---|---|
static class |
Http2ProtocolOptions.Builder
[#next-free-field: 16]
Protobuf type
envoy.config.core.v3.Http2ProtocolOptions |
static class |
Http2ProtocolOptions.SettingsParameter
Defines a parameter to be sent in the SETTINGS frame.
|
static interface |
Http2ProtocolOptions.SettingsParameterOrBuilder |
com.google.protobuf.GeneratedMessageV3.BuilderParent, com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage,BuilderType extends com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageType,BuilderType>>, com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage>, com.google.protobuf.GeneratedMessageV3.ExtendableMessageOrBuilder<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage>, com.google.protobuf.GeneratedMessageV3.FieldAccessorTable, com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter| Modifier and Type | Field and Description |
|---|---|
static int |
ALLOW_CONNECT_FIELD_NUMBER |
static int |
ALLOW_METADATA_FIELD_NUMBER |
static int |
CONNECTION_KEEPALIVE_FIELD_NUMBER |
static int |
CUSTOM_SETTINGS_PARAMETERS_FIELD_NUMBER |
static int |
HPACK_TABLE_SIZE_FIELD_NUMBER |
static int |
INITIAL_CONNECTION_WINDOW_SIZE_FIELD_NUMBER |
static int |
INITIAL_STREAM_WINDOW_SIZE_FIELD_NUMBER |
static int |
MAX_CONCURRENT_STREAMS_FIELD_NUMBER |
static int |
MAX_CONSECUTIVE_INBOUND_FRAMES_WITH_EMPTY_PAYLOAD_FIELD_NUMBER |
static int |
MAX_INBOUND_PRIORITY_FRAMES_PER_STREAM_FIELD_NUMBER |
static int |
MAX_INBOUND_WINDOW_UPDATE_FRAMES_PER_DATA_FRAME_SENT_FIELD_NUMBER |
static int |
MAX_OUTBOUND_CONTROL_FRAMES_FIELD_NUMBER |
static int |
MAX_OUTBOUND_FRAMES_FIELD_NUMBER |
static int |
OVERRIDE_STREAM_ERROR_ON_INVALID_HTTP_MESSAGE_FIELD_NUMBER |
static int |
STREAM_ERROR_ON_INVALID_HTTP_MESSAGING_FIELD_NUMBER |
| Modifier and Type | Method and Description |
|---|---|
boolean |
equals(Object obj) |
boolean |
getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
|
boolean |
getAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support.
|
KeepaliveSettings |
getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
KeepaliveSettingsOrBuilder |
getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.SettingsParameter |
getCustomSettingsParameters(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
int |
getCustomSettingsParametersCount()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
List<Http2ProtocolOptions.SettingsParameter> |
getCustomSettingsParametersList()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.SettingsParameterOrBuilder |
getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> |
getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
static Http2ProtocolOptions |
getDefaultInstance() |
Http2ProtocolOptions |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.UInt32Value |
getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
com.google.protobuf.UInt32ValueOrBuilder |
getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
com.google.protobuf.UInt32Value |
getInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
com.google.protobuf.UInt32ValueOrBuilder |
getInitialConnectionWindowSizeOrBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
com.google.protobuf.UInt32Value |
getInitialStreamWindowSize()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
com.google.protobuf.UInt32ValueOrBuilder |
getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
com.google.protobuf.UInt32Value |
getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
com.google.protobuf.UInt32Value |
getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
com.google.protobuf.UInt32Value |
getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
com.google.protobuf.UInt32Value |
getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
com.google.protobuf.UInt32Value |
getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
com.google.protobuf.UInt32Value |
getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
com.google.protobuf.BoolValue |
getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.
|
com.google.protobuf.BoolValueOrBuilder |
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers.
|
com.google.protobuf.Parser<Http2ProtocolOptions> |
getParserForType() |
int |
getSerializedSize() |
boolean |
getStreamErrorOnInvalidHttpMessaging()
Deprecated.
|
com.google.protobuf.UnknownFieldSet |
getUnknownFields() |
boolean |
hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
int |
hashCode() |
boolean |
hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
boolean |
hasInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
boolean |
hasInitialStreamWindowSize()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
boolean |
hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
boolean |
hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
boolean |
hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
boolean |
hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
boolean |
hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
boolean |
hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
boolean |
hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
static Http2ProtocolOptions.Builder |
newBuilder() |
static Http2ProtocolOptions.Builder |
newBuilder(Http2ProtocolOptions prototype) |
Http2ProtocolOptions.Builder |
newBuilderForType() |
protected Http2ProtocolOptions.Builder |
newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) |
protected Object |
newInstance(com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter unused) |
static Http2ProtocolOptions |
parseDelimitedFrom(InputStream input) |
static Http2ProtocolOptions |
parseDelimitedFrom(InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static Http2ProtocolOptions |
parseFrom(byte[] data) |
static Http2ProtocolOptions |
parseFrom(byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static Http2ProtocolOptions |
parseFrom(ByteBuffer data) |
static Http2ProtocolOptions |
parseFrom(ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static Http2ProtocolOptions |
parseFrom(com.google.protobuf.ByteString data) |
static Http2ProtocolOptions |
parseFrom(com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static Http2ProtocolOptions |
parseFrom(com.google.protobuf.CodedInputStream input) |
static Http2ProtocolOptions |
parseFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static Http2ProtocolOptions |
parseFrom(InputStream input) |
static Http2ProtocolOptions |
parseFrom(InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
static com.google.protobuf.Parser<Http2ProtocolOptions> |
parser() |
Http2ProtocolOptions.Builder |
toBuilder() |
void |
writeTo(com.google.protobuf.CodedOutputStream output) |
canUseUnsafe, computeStringSize, computeStringSizeNoTag, emptyBooleanList, emptyDoubleList, emptyFloatList, emptyIntList, emptyLongList, getAllFields, getDescriptorForType, getField, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, hasField, hasOneof, internalGetMapField, makeExtensionsImmutable, mergeFromAndMakeImmutableInternal, mutableCopy, mutableCopy, mutableCopy, mutableCopy, mutableCopy, newBooleanList, newBuilderForType, newDoubleList, newFloatList, newIntList, newLongList, parseDelimitedWithIOException, parseDelimitedWithIOException, parseUnknownField, parseUnknownFieldProto3, parseWithIOException, parseWithIOException, parseWithIOException, parseWithIOException, serializeBooleanMapTo, serializeIntegerMapTo, serializeLongMapTo, serializeStringMapTo, writeReplace, writeString, writeStringNoTagfindInitializationErrors, getInitializationErrorString, hashBoolean, hashEnum, hashEnumList, hashFields, hashLong, toStringaddAll, addAll, checkByteStringIsUtf8, toByteArray, toByteString, writeDelimitedTo, writeToclone, finalize, getClass, notify, notifyAll, wait, wait, waitpublic static final int HPACK_TABLE_SIZE_FIELD_NUMBER
public static final int MAX_CONCURRENT_STREAMS_FIELD_NUMBER
public static final int INITIAL_STREAM_WINDOW_SIZE_FIELD_NUMBER
public static final int INITIAL_CONNECTION_WINDOW_SIZE_FIELD_NUMBER
public static final int ALLOW_CONNECT_FIELD_NUMBER
public static final int ALLOW_METADATA_FIELD_NUMBER
public static final int MAX_OUTBOUND_FRAMES_FIELD_NUMBER
public static final int MAX_OUTBOUND_CONTROL_FRAMES_FIELD_NUMBER
public static final int MAX_CONSECUTIVE_INBOUND_FRAMES_WITH_EMPTY_PAYLOAD_FIELD_NUMBER
public static final int MAX_INBOUND_PRIORITY_FRAMES_PER_STREAM_FIELD_NUMBER
public static final int MAX_INBOUND_WINDOW_UPDATE_FRAMES_PER_DATA_FRAME_SENT_FIELD_NUMBER
public static final int STREAM_ERROR_ON_INVALID_HTTP_MESSAGING_FIELD_NUMBER
public static final int OVERRIDE_STREAM_ERROR_ON_INVALID_HTTP_MESSAGE_FIELD_NUMBER
public static final int CUSTOM_SETTINGS_PARAMETERS_FIELD_NUMBER
public static final int CONNECTION_KEEPALIVE_FIELD_NUMBER
protected Object newInstance(com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter unused)
newInstance in class com.google.protobuf.GeneratedMessageV3public final com.google.protobuf.UnknownFieldSet getUnknownFields()
getUnknownFields in interface com.google.protobuf.MessageOrBuildergetUnknownFields in class com.google.protobuf.GeneratedMessageV3public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3public boolean hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;hasHpackTableSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;getHpackTableSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;getHpackTableSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }hasMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }getMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }getMaxConcurrentStreamsOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }hasInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }getInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }getInitialStreamWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }hasInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }getInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getInitialConnectionWindowSizeOrBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }getInitialConnectionWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;getAllowConnect in interface Http2ProtocolOptionsOrBuilderpublic boolean getAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support. Still under implementation. DO NOT USE. Allows metadata. See [metadata docs](https://github.com/envoyproxy/envoy/blob/master/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;getAllowMetadata in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }hasMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }getMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }getMaxOutboundFramesOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }hasMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }getMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }getMaxOutboundControlFramesOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;hasMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;getMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;hasMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;getMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;getMaxInboundPriorityFramesPerStreamOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }hasMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }getMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32ValueOrBuilder getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder in interface Http2ProtocolOptionsOrBuilder@Deprecated public boolean getStreamErrorOnInvalidHttpMessaging()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true];getStreamErrorOnInvalidHttpMessaging in interface Http2ProtocolOptionsOrBuilderpublic boolean hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;hasOverrideStreamErrorOnInvalidHttpMessage in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.BoolValue getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;getOverrideStreamErrorOnInvalidHttpMessage in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.BoolValueOrBuilder getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;getOverrideStreamErrorOnInvalidHttpMessageOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic List<Http2ProtocolOptions.SettingsParameter> getCustomSettingsParametersList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersList in interface Http2ProtocolOptionsOrBuilderpublic List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersOrBuilderList in interface Http2ProtocolOptionsOrBuilderpublic int getCustomSettingsParametersCount()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersCount in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.SettingsParameter getCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParameters in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.SettingsParameterOrBuilder getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;hasConnectionKeepalive in interface Http2ProtocolOptionsOrBuilderpublic KeepaliveSettings getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;getConnectionKeepalive in interface Http2ProtocolOptionsOrBuilderpublic KeepaliveSettingsOrBuilder getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;getConnectionKeepaliveOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3public void writeTo(com.google.protobuf.CodedOutputStream output)
throws IOException
writeTo in interface com.google.protobuf.MessageLitewriteTo in class com.google.protobuf.GeneratedMessageV3IOExceptionpublic int getSerializedSize()
getSerializedSize in interface com.google.protobuf.MessageLitegetSerializedSize in class com.google.protobuf.GeneratedMessageV3public boolean equals(Object obj)
equals in interface com.google.protobuf.Messageequals in class com.google.protobuf.AbstractMessagepublic int hashCode()
hashCode in interface com.google.protobuf.MessagehashCode in class com.google.protobuf.AbstractMessagepublic static Http2ProtocolOptions parseFrom(ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException
com.google.protobuf.InvalidProtocolBufferExceptionpublic static Http2ProtocolOptions parseFrom(InputStream input) throws IOException
IOExceptionpublic static Http2ProtocolOptions parseFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
IOExceptionpublic static Http2ProtocolOptions parseDelimitedFrom(InputStream input) throws IOException
IOExceptionpublic static Http2ProtocolOptions parseDelimitedFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
IOExceptionpublic static Http2ProtocolOptions parseFrom(com.google.protobuf.CodedInputStream input) throws IOException
IOExceptionpublic static Http2ProtocolOptions parseFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
IOExceptionpublic Http2ProtocolOptions.Builder newBuilderForType()
newBuilderForType in interface com.google.protobuf.MessagenewBuilderForType in interface com.google.protobuf.MessageLitepublic static Http2ProtocolOptions.Builder newBuilder()
public static Http2ProtocolOptions.Builder newBuilder(Http2ProtocolOptions prototype)
public Http2ProtocolOptions.Builder toBuilder()
toBuilder in interface com.google.protobuf.MessagetoBuilder in interface com.google.protobuf.MessageLiteprotected Http2ProtocolOptions.Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)
newBuilderForType in class com.google.protobuf.GeneratedMessageV3public static Http2ProtocolOptions getDefaultInstance()
public static com.google.protobuf.Parser<Http2ProtocolOptions> parser()
public com.google.protobuf.Parser<Http2ProtocolOptions> getParserForType()
getParserForType in interface com.google.protobuf.MessagegetParserForType in interface com.google.protobuf.MessageLitegetParserForType in class com.google.protobuf.GeneratedMessageV3public Http2ProtocolOptions getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderCopyright © 2018–2021 The Envoy Project. All rights reserved.