public interface JwtAuthenticationOrBuilder
extends com.google.protobuf.MessageOrBuilder
| Modifier and Type | Method and Description |
|---|---|
boolean |
containsProviders(String key)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1; |
boolean |
getBypassCorsPreflight()
When set to true, bypass the `CORS preflight request
<http://www.w3.org/TR/cors/#cross-origin-request-with-preflight>`_ regardless of JWT
requirements specified in the rules.
|
FilterStateRule |
getFilterStateRules()
This message specifies Jwt requirements based on stream_info.filterState.
|
FilterStateRuleOrBuilder |
getFilterStateRulesOrBuilder()
This message specifies Jwt requirements based on stream_info.filterState.
|
Map<String,JwtProvider> |
getProviders()
Deprecated.
|
int |
getProvidersCount()
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1; |
Map<String,JwtProvider> |
getProvidersMap()
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1; |
JwtProvider |
getProvidersOrDefault(String key,
JwtProvider defaultValue)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1; |
JwtProvider |
getProvidersOrThrow(String key)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1; |
RequirementRule |
getRules(int index)
Specifies requirements based on the route matches.
|
int |
getRulesCount()
Specifies requirements based on the route matches.
|
List<RequirementRule> |
getRulesList()
Specifies requirements based on the route matches.
|
RequirementRuleOrBuilder |
getRulesOrBuilder(int index)
Specifies requirements based on the route matches.
|
List<? extends RequirementRuleOrBuilder> |
getRulesOrBuilderList()
Specifies requirements based on the route matches.
|
boolean |
hasFilterStateRules()
This message specifies Jwt requirements based on stream_info.filterState.
|
findInitializationErrors, getAllFields, getDefaultInstanceForType, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneofint getProvidersCount()
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1;boolean containsProviders(String key)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1;@Deprecated Map<String,JwtProvider> getProviders()
getProvidersMap() instead.Map<String,JwtProvider> getProvidersMap()
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1;JwtProvider getProvidersOrDefault(String key, JwtProvider defaultValue)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1;JwtProvider getProvidersOrThrow(String key)
Map of provider names to JwtProviders.
.. code-block:: yaml
providers:
provider1:
issuer: issuer1
audiences:
- audience1
- audience2
remote_jwks:
http_uri:
uri: https://example.com/.well-known/jwks.json
cluster: example_jwks_cluster
provider2:
issuer: provider2
local_jwks:
inline_string: jwks_string
map<string, .envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider> providers = 1;List<RequirementRule> getRulesList()
Specifies requirements based on the route matches. The first matched requirement will be
applied. If there are overlapped match conditions, please put the most specific match first.
Examples
.. code-block:: yaml
rules:
- match:
prefix: /healthz
- match:
prefix: /baz
requires:
provider_name: provider1
- match:
prefix: /foo
requires:
requires_any:
requirements:
- provider_name: provider1
- provider_name: provider2
- match:
prefix: /bar
requires:
requires_all:
requirements:
- provider_name: provider1
- provider_name: provider2
repeated .envoy.config.filter.http.jwt_authn.v2alpha.RequirementRule rules = 2;RequirementRule getRules(int index)
Specifies requirements based on the route matches. The first matched requirement will be
applied. If there are overlapped match conditions, please put the most specific match first.
Examples
.. code-block:: yaml
rules:
- match:
prefix: /healthz
- match:
prefix: /baz
requires:
provider_name: provider1
- match:
prefix: /foo
requires:
requires_any:
requirements:
- provider_name: provider1
- provider_name: provider2
- match:
prefix: /bar
requires:
requires_all:
requirements:
- provider_name: provider1
- provider_name: provider2
repeated .envoy.config.filter.http.jwt_authn.v2alpha.RequirementRule rules = 2;int getRulesCount()
Specifies requirements based on the route matches. The first matched requirement will be
applied. If there are overlapped match conditions, please put the most specific match first.
Examples
.. code-block:: yaml
rules:
- match:
prefix: /healthz
- match:
prefix: /baz
requires:
provider_name: provider1
- match:
prefix: /foo
requires:
requires_any:
requirements:
- provider_name: provider1
- provider_name: provider2
- match:
prefix: /bar
requires:
requires_all:
requirements:
- provider_name: provider1
- provider_name: provider2
repeated .envoy.config.filter.http.jwt_authn.v2alpha.RequirementRule rules = 2;List<? extends RequirementRuleOrBuilder> getRulesOrBuilderList()
Specifies requirements based on the route matches. The first matched requirement will be
applied. If there are overlapped match conditions, please put the most specific match first.
Examples
.. code-block:: yaml
rules:
- match:
prefix: /healthz
- match:
prefix: /baz
requires:
provider_name: provider1
- match:
prefix: /foo
requires:
requires_any:
requirements:
- provider_name: provider1
- provider_name: provider2
- match:
prefix: /bar
requires:
requires_all:
requirements:
- provider_name: provider1
- provider_name: provider2
repeated .envoy.config.filter.http.jwt_authn.v2alpha.RequirementRule rules = 2;RequirementRuleOrBuilder getRulesOrBuilder(int index)
Specifies requirements based on the route matches. The first matched requirement will be
applied. If there are overlapped match conditions, please put the most specific match first.
Examples
.. code-block:: yaml
rules:
- match:
prefix: /healthz
- match:
prefix: /baz
requires:
provider_name: provider1
- match:
prefix: /foo
requires:
requires_any:
requirements:
- provider_name: provider1
- provider_name: provider2
- match:
prefix: /bar
requires:
requires_all:
requirements:
- provider_name: provider1
- provider_name: provider2
repeated .envoy.config.filter.http.jwt_authn.v2alpha.RequirementRule rules = 2;boolean hasFilterStateRules()
This message specifies Jwt requirements based on stream_info.filterState. Other HTTP filters can use it to specify Jwt requirements dynamically. The *rules* field above is checked first, if it could not find any matches, check this one.
.envoy.config.filter.http.jwt_authn.v2alpha.FilterStateRule filter_state_rules = 3;FilterStateRule getFilterStateRules()
This message specifies Jwt requirements based on stream_info.filterState. Other HTTP filters can use it to specify Jwt requirements dynamically. The *rules* field above is checked first, if it could not find any matches, check this one.
.envoy.config.filter.http.jwt_authn.v2alpha.FilterStateRule filter_state_rules = 3;FilterStateRuleOrBuilder getFilterStateRulesOrBuilder()
This message specifies Jwt requirements based on stream_info.filterState. Other HTTP filters can use it to specify Jwt requirements dynamically. The *rules* field above is checked first, if it could not find any matches, check this one.
.envoy.config.filter.http.jwt_authn.v2alpha.FilterStateRule filter_state_rules = 3;boolean getBypassCorsPreflight()
When set to true, bypass the `CORS preflight request <http://www.w3.org/TR/cors/#cross-origin-request-with-preflight>`_ regardless of JWT requirements specified in the rules.
bool bypass_cors_preflight = 4;Copyright © 2018–2021 The Envoy Project. All rights reserved.