public static final class Http2ProtocolOptions.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder> implements Http2ProtocolOptionsOrBuilder
[#next-free-field: 16]Protobuf type
envoy.config.core.v4alpha.Http2ProtocolOptions| Modifier and Type | Method and Description |
|---|---|
Http2ProtocolOptions.Builder |
addAllCustomSettingsParameters(Iterable<? extends Http2ProtocolOptions.SettingsParameter> values)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
addCustomSettingsParameters(int index,
Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
addCustomSettingsParameters(int index,
Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.SettingsParameter.Builder |
addCustomSettingsParametersBuilder()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.SettingsParameter.Builder |
addCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
Http2ProtocolOptions |
build() |
Http2ProtocolOptions |
buildPartial() |
Http2ProtocolOptions.Builder |
clear() |
Http2ProtocolOptions.Builder |
clearAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
|
Http2ProtocolOptions.Builder |
clearAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support.
|
Http2ProtocolOptions.Builder |
clearConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.Builder |
clearCustomSettingsParameters()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
Http2ProtocolOptions.Builder |
clearHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
Http2ProtocolOptions.Builder |
clearInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
Http2ProtocolOptions.Builder |
clearInitialStreamWindowSize()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
Http2ProtocolOptions.Builder |
clearMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
Http2ProtocolOptions.Builder |
clearMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
Http2ProtocolOptions.Builder |
clearMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
Http2ProtocolOptions.Builder |
clearMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
Http2ProtocolOptions.Builder |
clearMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
Http2ProtocolOptions.Builder |
clearMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
Http2ProtocolOptions.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
Http2ProtocolOptions.Builder |
clearOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.
|
Http2ProtocolOptions.Builder |
clone() |
boolean |
getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
|
boolean |
getAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support.
|
KeepaliveSettings |
getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
KeepaliveSettings.Builder |
getConnectionKeepaliveBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
KeepaliveSettingsOrBuilder |
getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.SettingsParameter |
getCustomSettingsParameters(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.SettingsParameter.Builder |
getCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
List<Http2ProtocolOptions.SettingsParameter.Builder> |
getCustomSettingsParametersBuilderList()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
int |
getCustomSettingsParametersCount()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
List<Http2ProtocolOptions.SettingsParameter> |
getCustomSettingsParametersList()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.SettingsParameterOrBuilder |
getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> |
getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
com.google.protobuf.UInt32Value |
getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
com.google.protobuf.UInt32Value.Builder |
getHpackTableSizeBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
com.google.protobuf.UInt32ValueOrBuilder |
getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
com.google.protobuf.UInt32Value |
getInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
com.google.protobuf.UInt32Value.Builder |
getInitialConnectionWindowSizeBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
com.google.protobuf.UInt32ValueOrBuilder |
getInitialConnectionWindowSizeOrBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
com.google.protobuf.UInt32Value |
getInitialStreamWindowSize()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
com.google.protobuf.UInt32Value.Builder |
getInitialStreamWindowSizeBuilder()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
com.google.protobuf.UInt32ValueOrBuilder |
getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
com.google.protobuf.UInt32Value |
getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
com.google.protobuf.UInt32Value.Builder |
getMaxConcurrentStreamsBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
com.google.protobuf.UInt32Value |
getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
com.google.protobuf.UInt32Value.Builder |
getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
com.google.protobuf.UInt32Value |
getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
com.google.protobuf.UInt32Value.Builder |
getMaxInboundPriorityFramesPerStreamBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
com.google.protobuf.UInt32Value |
getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
com.google.protobuf.UInt32Value.Builder |
getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
com.google.protobuf.UInt32Value |
getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
com.google.protobuf.UInt32Value.Builder |
getMaxOutboundControlFramesBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
com.google.protobuf.UInt32Value |
getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
com.google.protobuf.UInt32Value.Builder |
getMaxOutboundFramesBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
com.google.protobuf.UInt32ValueOrBuilder |
getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
com.google.protobuf.BoolValue |
getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.
|
com.google.protobuf.BoolValue.Builder |
getOverrideStreamErrorOnInvalidHttpMessageBuilder()
Allows invalid HTTP messaging and headers.
|
com.google.protobuf.BoolValueOrBuilder |
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers.
|
boolean |
hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
boolean |
hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
boolean |
hasInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
boolean |
hasInitialStreamWindowSize()
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
boolean |
hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
boolean |
hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
boolean |
hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
boolean |
hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
boolean |
hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
boolean |
hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
boolean |
hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
Http2ProtocolOptions.Builder |
mergeConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
Http2ProtocolOptions.Builder |
mergeFrom(Http2ProtocolOptions other) |
Http2ProtocolOptions.Builder |
mergeFrom(com.google.protobuf.Message other) |
Http2ProtocolOptions.Builder |
mergeHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
Http2ProtocolOptions.Builder |
mergeInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
Http2ProtocolOptions.Builder |
mergeInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
Http2ProtocolOptions.Builder |
mergeMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
Http2ProtocolOptions.Builder |
mergeMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
Http2ProtocolOptions.Builder |
mergeMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
Http2ProtocolOptions.Builder |
mergeMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
Http2ProtocolOptions.Builder |
mergeMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
Http2ProtocolOptions.Builder |
mergeMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
Http2ProtocolOptions.Builder |
mergeOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers.
|
Http2ProtocolOptions.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
Http2ProtocolOptions.Builder |
removeCustomSettingsParameters(int index)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
setAllowConnect(boolean value)
Allows proxying Websocket and other upgrades over H2 connect.
|
Http2ProtocolOptions.Builder |
setAllowMetadata(boolean value)
[#not-implemented-hide:] Hiding until envoy has full metadata support.
|
Http2ProtocolOptions.Builder |
setConnectionKeepalive(KeepaliveSettings.Builder builderForValue)
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.Builder |
setConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy.
|
Http2ProtocolOptions.Builder |
setCustomSettingsParameters(int index,
Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
setCustomSettingsParameters(int index,
Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:]
Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
1.
|
Http2ProtocolOptions.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
Http2ProtocolOptions.Builder |
setHpackTableSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
Http2ProtocolOptions.Builder |
setHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
(in octets) that the encoder is permitted to use for the dynamic HPACK table.
|
Http2ProtocolOptions.Builder |
setInitialConnectionWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
Http2ProtocolOptions.Builder |
setInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to *initial_stream_window_size*, but for connection-level flow-control
window.
|
Http2ProtocolOptions.Builder |
setInitialStreamWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
Http2ProtocolOptions.Builder |
setInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window
<https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.
|
Http2ProtocolOptions.Builder |
setMaxConcurrentStreams(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
Http2ProtocolOptions.Builder |
setMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
allowed for peer on one HTTP/2 connection.
|
Http2ProtocolOptions.Builder |
setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
Http2ProtocolOptions.Builder |
setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
empty payload and no end stream flag.
|
Http2ProtocolOptions.Builder |
setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
Http2ProtocolOptions.Builder |
setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream.
|
Http2ProtocolOptions.Builder |
setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
Http2ProtocolOptions.Builder |
setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.
|
Http2ProtocolOptions.Builder |
setMaxOutboundControlFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
Http2ProtocolOptions.Builder |
setMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
preventing high memory utilization when receiving continuous stream of these frames.
|
Http2ProtocolOptions.Builder |
setMaxOutboundFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
Http2ProtocolOptions.Builder |
setMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to
be written into the socket).
|
Http2ProtocolOptions.Builder |
setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue.Builder builderForValue)
Allows invalid HTTP messaging and headers.
|
Http2ProtocolOptions.Builder |
setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers.
|
Http2ProtocolOptions.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
Http2ProtocolOptions.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, newBuilderForField, onBuilt, onChanged, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic Http2ProtocolOptions build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic Http2ProtocolOptions buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic Http2ProtocolOptions.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder mergeFrom(Http2ProtocolOptions other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public Http2ProtocolOptions.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>IOExceptionpublic boolean hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;hasHpackTableSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;getHpackTableSize in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;public Http2ProtocolOptions.Builder setHpackTableSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;public Http2ProtocolOptions.Builder mergeHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;public Http2ProtocolOptions.Builder clearHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;public com.google.protobuf.UInt32Value.Builder getHpackTableSizeBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;public com.google.protobuf.UInt32ValueOrBuilder getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;getHpackTableSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }hasMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }getMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setMaxConcurrentStreams(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getMaxConcurrentStreamsBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits).
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }getMaxConcurrentStreamsOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }hasInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }getInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getInitialStreamWindowSizeBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }getInitialStreamWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }hasInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }getInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearInitialConnectionWindowSize()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getInitialConnectionWindowSizeBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getInitialConnectionWindowSizeOrBuilder()
Similar to *initial_stream_window_size*, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }getInitialConnectionWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;getAllowConnect in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setAllowConnect(boolean value)
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;public Http2ProtocolOptions.Builder clearAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;public boolean getAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support. Still under implementation. DO NOT USE. Allows metadata. See [metadata docs](https://github.com/envoyproxy/envoy/blob/master/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;getAllowMetadata in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setAllowMetadata(boolean value)
[#not-implemented-hide:] Hiding until envoy has full metadata support. Still under implementation. DO NOT USE. Allows metadata. See [metadata docs](https://github.com/envoyproxy/envoy/blob/master/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;public Http2ProtocolOptions.Builder clearAllowMetadata()
[#not-implemented-hide:] Hiding until envoy has full metadata support. Still under implementation. DO NOT USE. Allows metadata. See [metadata docs](https://github.com/envoyproxy/envoy/blob/master/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;public boolean hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }hasMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }getMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setMaxOutboundFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getMaxOutboundFramesBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }getMaxOutboundFramesOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }hasMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }getMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getMaxOutboundControlFramesBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }getMaxOutboundControlFramesOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;hasMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;getMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;public Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;public Http2ProtocolOptions.Builder mergeMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;public Http2ProtocolOptions.Builder clearMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;public com.google.protobuf.UInt32Value.Builder getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;public com.google.protobuf.UInt32ValueOrBuilder getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1. NOTE: flood and abuse mitigation for upstream connections is presently enabled by the `envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;hasMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;getMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;public Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;public Http2ProtocolOptions.Builder mergeMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;public Http2ProtocolOptions.Builder clearMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;public com.google.protobuf.UInt32Value.Builder getMaxInboundPriorityFramesPerStreamBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
of PRIORITY frames received over the lifetime of connection exceeds the value calculated
using this formula::
max_inbound_priority_frames_per_stream * (1 + inbound_streams)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 100.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;getMaxInboundPriorityFramesPerStreamOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }hasMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.UInt32Value getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }getMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder mergeMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }public Http2ProtocolOptions.Builder clearMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
using this formula::
1 + 2 * (inbound_streams +
max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
the number of connections terminated due to flood mitigation. The default limit is 10.
Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
but more complex implementations that try to estimate available bandwidth require at least 2.
NOTE: flood and abuse mitigation for upstream connections is presently enabled by the
`envoy.reloadable_features.upstream_http2_flood_checks` flag.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic boolean hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;hasOverrideStreamErrorOnInvalidHttpMessage in interface Http2ProtocolOptionsOrBuilderpublic com.google.protobuf.BoolValue getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;getOverrideStreamErrorOnInvalidHttpMessage in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;public Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue.Builder builderForValue)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;public Http2ProtocolOptions.Builder mergeOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;public Http2ProtocolOptions.Builder clearOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;public com.google.protobuf.BoolValue.Builder getOverrideStreamErrorOnInvalidHttpMessageBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;public com.google.protobuf.BoolValueOrBuilder getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;getOverrideStreamErrorOnInvalidHttpMessageOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic List<Http2ProtocolOptions.SettingsParameter> getCustomSettingsParametersList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersList in interface Http2ProtocolOptionsOrBuilderpublic int getCustomSettingsParametersCount()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersCount in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.SettingsParameter getCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParameters in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder addAllCustomSettingsParameters(Iterable<? extends Http2ProtocolOptions.SettingsParameter> values)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder clearCustomSettingsParameters()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.Builder removeCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.SettingsParameter.Builder getCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.SettingsParameterOrBuilder getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;getCustomSettingsParametersOrBuilderList in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.SettingsParameter.Builder addCustomSettingsParametersBuilder()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public Http2ProtocolOptions.SettingsParameter.Builder addCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public List<Http2ProtocolOptions.SettingsParameter.Builder> getCustomSettingsParametersBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v4alpha.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;public boolean hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;hasConnectionKeepalive in interface Http2ProtocolOptionsOrBuilderpublic KeepaliveSettings getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;getConnectionKeepalive in interface Http2ProtocolOptionsOrBuilderpublic Http2ProtocolOptions.Builder setConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;public Http2ProtocolOptions.Builder setConnectionKeepalive(KeepaliveSettings.Builder builderForValue)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;public Http2ProtocolOptions.Builder mergeConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;public Http2ProtocolOptions.Builder clearConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;public KeepaliveSettings.Builder getConnectionKeepaliveBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;public KeepaliveSettingsOrBuilder getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v4alpha.KeepaliveSettings connection_keepalive = 15;getConnectionKeepaliveOrBuilder in interface Http2ProtocolOptionsOrBuilderpublic final Http2ProtocolOptions.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>public final Http2ProtocolOptions.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<Http2ProtocolOptions.Builder>Copyright © 2018–2021 The Envoy Project. All rights reserved.