public static final class FilterChainMatch.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder> implements FilterChainMatchOrBuilder
Specifies the match criteria for selecting a specific filter chain for a listener. In order for a filter chain to be selected, *ALL* of its criteria must be fulfilled by the incoming connection, properties of which are set by the networking stack and/or listener filters. The following order applies: 1. Destination port. 2. Destination IP address. 3. Server name (e.g. SNI for TLS protocol), 4. Transport protocol. 5. Application protocols (e.g. ALPN for TLS protocol). 6. Source type (e.g. any, local or external network). 7. Source IP address. 8. Source port. For criteria that allow ranges or wildcards, the most specific value in any of the configured filter chains that matches the incoming connection is going to be used (e.g. for SNI ``www.example.com`` the most specific match would be ``www.example.com``, then ``*.example.com``, then ``*.com``, then any filter chain without ``server_names`` requirements). A different way to reason about the filter chain matches: Suppose there exists N filter chains. Prune the filter chain set using the above 8 steps. In each step, filter chains which most specifically matches the attributes continue to the next step. The listener guarantees at most 1 filter chain is left after all of the steps. Example: For destination port, filter chains specifying the destination port of incoming traffic are the most specific match. If none of the filter chains specifies the exact destination port, the filter chains which do not specify ports are the most specific match. Filter chains specifying the wrong port can never be the most specific match. [#comment: Implemented rules are kept in the preference order, with deprecated fields listed at the end, because that's how we want to list them in the docs. [#comment:TODO(PiotrSikora): Add support for configurable precedence of the rules] [#next-free-field: 13]Protobuf type
envoy.config.listener.v3.FilterChainMatch| Modifier and Type | Method and Description |
|---|---|
FilterChainMatch.Builder |
addAllApplicationProtocols(Iterable<String> values)
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch.Builder |
addAllPrefixRanges(Iterable<? extends CidrRange> values)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
addAllServerNames(Iterable<String> values)
If non-empty, a list of server names (e.g.
|
FilterChainMatch.Builder |
addAllSourcePorts(Iterable<? extends Integer> values)
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
FilterChainMatch.Builder |
addAllSourcePrefixRanges(Iterable<? extends CidrRange> values)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
addApplicationProtocols(String value)
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch.Builder |
addApplicationProtocolsBytes(com.google.protobuf.ByteString value)
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch.Builder |
addPrefixRanges(CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
addPrefixRanges(CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
addPrefixRanges(int index,
CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
addPrefixRanges(int index,
CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
CidrRange.Builder |
addPrefixRangesBuilder()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
CidrRange.Builder |
addPrefixRangesBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
FilterChainMatch.Builder |
addServerNames(String value)
If non-empty, a list of server names (e.g.
|
FilterChainMatch.Builder |
addServerNamesBytes(com.google.protobuf.ByteString value)
If non-empty, a list of server names (e.g.
|
FilterChainMatch.Builder |
addSourcePorts(int value)
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
FilterChainMatch.Builder |
addSourcePrefixRanges(CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
addSourcePrefixRanges(CidrRange value)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
addSourcePrefixRanges(int index,
CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
addSourcePrefixRanges(int index,
CidrRange value)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
CidrRange.Builder |
addSourcePrefixRangesBuilder()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
CidrRange.Builder |
addSourcePrefixRangesBuilder(int index)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch |
build() |
FilterChainMatch |
buildPartial() |
FilterChainMatch.Builder |
clear() |
FilterChainMatch.Builder |
clearAddressSuffix()
If non-empty, an IP address and suffix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
clearApplicationProtocols()
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch.Builder |
clearDestinationPort()
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
FilterChainMatch.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
FilterChainMatch.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
FilterChainMatch.Builder |
clearPrefixRanges()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
clearServerNames()
If non-empty, a list of server names (e.g.
|
FilterChainMatch.Builder |
clearSourcePorts()
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
FilterChainMatch.Builder |
clearSourcePrefixRanges()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
clearSourceType()
Specifies the connection source IP match type.
|
FilterChainMatch.Builder |
clearSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
FilterChainMatch.Builder |
clearTransportProtocol()
If non-empty, a transport protocol to consider when determining a filter chain match.
|
FilterChainMatch.Builder |
clone() |
String |
getAddressSuffix()
If non-empty, an IP address and suffix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
com.google.protobuf.ByteString |
getAddressSuffixBytes()
If non-empty, an IP address and suffix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
String |
getApplicationProtocols(int index)
If non-empty, a list of application protocols (e.g.
|
com.google.protobuf.ByteString |
getApplicationProtocolsBytes(int index)
If non-empty, a list of application protocols (e.g.
|
int |
getApplicationProtocolsCount()
If non-empty, a list of application protocols (e.g.
|
com.google.protobuf.ProtocolStringList |
getApplicationProtocolsList()
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
com.google.protobuf.UInt32Value |
getDestinationPort()
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
com.google.protobuf.UInt32Value.Builder |
getDestinationPortBuilder()
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
com.google.protobuf.UInt32ValueOrBuilder |
getDestinationPortOrBuilder()
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
CidrRange |
getPrefixRanges(int index)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
CidrRange.Builder |
getPrefixRangesBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
List<CidrRange.Builder> |
getPrefixRangesBuilderList()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
int |
getPrefixRangesCount()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
List<CidrRange> |
getPrefixRangesList()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
CidrRangeOrBuilder |
getPrefixRangesOrBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
List<? extends CidrRangeOrBuilder> |
getPrefixRangesOrBuilderList()
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
String |
getServerNames(int index)
If non-empty, a list of server names (e.g.
|
com.google.protobuf.ByteString |
getServerNamesBytes(int index)
If non-empty, a list of server names (e.g.
|
int |
getServerNamesCount()
If non-empty, a list of server names (e.g.
|
com.google.protobuf.ProtocolStringList |
getServerNamesList()
If non-empty, a list of server names (e.g.
|
int |
getSourcePorts(int index)
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
int |
getSourcePortsCount()
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
List<Integer> |
getSourcePortsList()
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
CidrRange |
getSourcePrefixRanges(int index)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
CidrRange.Builder |
getSourcePrefixRangesBuilder(int index)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
List<CidrRange.Builder> |
getSourcePrefixRangesBuilderList()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
int |
getSourcePrefixRangesCount()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
List<CidrRange> |
getSourcePrefixRangesList()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
CidrRangeOrBuilder |
getSourcePrefixRangesOrBuilder(int index)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
List<? extends CidrRangeOrBuilder> |
getSourcePrefixRangesOrBuilderList()
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.ConnectionSourceType |
getSourceType()
Specifies the connection source IP match type.
|
int |
getSourceTypeValue()
Specifies the connection source IP match type.
|
com.google.protobuf.UInt32Value |
getSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
com.google.protobuf.UInt32Value.Builder |
getSuffixLenBuilder()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
com.google.protobuf.UInt32ValueOrBuilder |
getSuffixLenOrBuilder()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
String |
getTransportProtocol()
If non-empty, a transport protocol to consider when determining a filter chain match.
|
com.google.protobuf.ByteString |
getTransportProtocolBytes()
If non-empty, a transport protocol to consider when determining a filter chain match.
|
boolean |
hasDestinationPort()
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
boolean |
hasSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
FilterChainMatch.Builder |
mergeDestinationPort(com.google.protobuf.UInt32Value value)
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
FilterChainMatch.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
FilterChainMatch.Builder |
mergeFrom(FilterChainMatch other) |
FilterChainMatch.Builder |
mergeFrom(com.google.protobuf.Message other) |
FilterChainMatch.Builder |
mergeSuffixLen(com.google.protobuf.UInt32Value value)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
FilterChainMatch.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
FilterChainMatch.Builder |
removePrefixRanges(int index)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
removeSourcePrefixRanges(int index)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
setAddressSuffix(String value)
If non-empty, an IP address and suffix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
setAddressSuffixBytes(com.google.protobuf.ByteString value)
If non-empty, an IP address and suffix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
setApplicationProtocols(int index,
String value)
If non-empty, a list of application protocols (e.g.
|
FilterChainMatch.Builder |
setDestinationPort(com.google.protobuf.UInt32Value.Builder builderForValue)
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
FilterChainMatch.Builder |
setDestinationPort(com.google.protobuf.UInt32Value value)
Optional destination port to consider when use_original_dst is set on the
listener in determining a filter chain match.
|
FilterChainMatch.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
FilterChainMatch.Builder |
setPrefixRanges(int index,
CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
setPrefixRanges(int index,
CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the
listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
|
FilterChainMatch.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
FilterChainMatch.Builder |
setServerNames(int index,
String value)
If non-empty, a list of server names (e.g.
|
FilterChainMatch.Builder |
setSourcePorts(int index,
int value)
The criteria is satisfied if the source port of the downstream connection
is contained in at least one of the specified ports.
|
FilterChainMatch.Builder |
setSourcePrefixRanges(int index,
CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
setSourcePrefixRanges(int index,
CidrRange value)
The criteria is satisfied if the source IP address of the downstream
connection is contained in at least one of the specified subnets.
|
FilterChainMatch.Builder |
setSourceType(FilterChainMatch.ConnectionSourceType value)
Specifies the connection source IP match type.
|
FilterChainMatch.Builder |
setSourceTypeValue(int value)
Specifies the connection source IP match type.
|
FilterChainMatch.Builder |
setSuffixLen(com.google.protobuf.UInt32Value.Builder builderForValue)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
FilterChainMatch.Builder |
setSuffixLen(com.google.protobuf.UInt32Value value)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5; |
FilterChainMatch.Builder |
setTransportProtocol(String value)
If non-empty, a transport protocol to consider when determining a filter chain match.
|
FilterChainMatch.Builder |
setTransportProtocolBytes(com.google.protobuf.ByteString value)
If non-empty, a transport protocol to consider when determining a filter chain match.
|
FilterChainMatch.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, newBuilderForField, onBuilt, onChanged, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic FilterChainMatch build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic FilterChainMatch buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic FilterChainMatch.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder mergeFrom(FilterChainMatch other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public FilterChainMatch.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<FilterChainMatch.Builder>IOExceptionpublic boolean hasDestinationPort()
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }hasDestinationPort in interface FilterChainMatchOrBuilderpublic com.google.protobuf.UInt32Value getDestinationPort()
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }getDestinationPort in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setDestinationPort(com.google.protobuf.UInt32Value value)
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }public FilterChainMatch.Builder setDestinationPort(com.google.protobuf.UInt32Value.Builder builderForValue)
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }public FilterChainMatch.Builder mergeDestinationPort(com.google.protobuf.UInt32Value value)
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }public FilterChainMatch.Builder clearDestinationPort()
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }public com.google.protobuf.UInt32Value.Builder getDestinationPortBuilder()
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }public com.google.protobuf.UInt32ValueOrBuilder getDestinationPortOrBuilder()
Optional destination port to consider when use_original_dst is set on the listener in determining a filter chain match.
.google.protobuf.UInt32Value destination_port = 8 [(.validate.rules) = { ... }getDestinationPortOrBuilder in interface FilterChainMatchOrBuilderpublic List<CidrRange> getPrefixRangesList()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;getPrefixRangesList in interface FilterChainMatchOrBuilderpublic int getPrefixRangesCount()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;getPrefixRangesCount in interface FilterChainMatchOrBuilderpublic CidrRange getPrefixRanges(int index)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;getPrefixRanges in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setPrefixRanges(int index, CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder setPrefixRanges(int index, CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder addPrefixRanges(CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder addPrefixRanges(int index, CidrRange value)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder addPrefixRanges(CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder addPrefixRanges(int index, CidrRange.Builder builderForValue)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder addAllPrefixRanges(Iterable<? extends CidrRange> values)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder clearPrefixRanges()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public FilterChainMatch.Builder removePrefixRanges(int index)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public CidrRange.Builder getPrefixRangesBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public CidrRangeOrBuilder getPrefixRangesOrBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;getPrefixRangesOrBuilder in interface FilterChainMatchOrBuilderpublic List<? extends CidrRangeOrBuilder> getPrefixRangesOrBuilderList()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;getPrefixRangesOrBuilderList in interface FilterChainMatchOrBuilderpublic CidrRange.Builder addPrefixRangesBuilder()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public CidrRange.Builder addPrefixRangesBuilder(int index)
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public List<CidrRange.Builder> getPrefixRangesBuilderList()
If non-empty, an IP address and prefix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified.
repeated .envoy.config.core.v3.CidrRange prefix_ranges = 3;public String getAddressSuffix()
If non-empty, an IP address and suffix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified. [#not-implemented-hide:]
string address_suffix = 4;getAddressSuffix in interface FilterChainMatchOrBuilderpublic com.google.protobuf.ByteString getAddressSuffixBytes()
If non-empty, an IP address and suffix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified. [#not-implemented-hide:]
string address_suffix = 4;getAddressSuffixBytes in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setAddressSuffix(String value)
If non-empty, an IP address and suffix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified. [#not-implemented-hide:]
string address_suffix = 4;public FilterChainMatch.Builder clearAddressSuffix()
If non-empty, an IP address and suffix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified. [#not-implemented-hide:]
string address_suffix = 4;public FilterChainMatch.Builder setAddressSuffixBytes(com.google.protobuf.ByteString value)
If non-empty, an IP address and suffix length to match addresses when the listener is bound to 0.0.0.0/:: or when use_original_dst is specified. [#not-implemented-hide:]
string address_suffix = 4;public boolean hasSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;hasSuffixLen in interface FilterChainMatchOrBuilderpublic com.google.protobuf.UInt32Value getSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;getSuffixLen in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setSuffixLen(com.google.protobuf.UInt32Value value)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;public FilterChainMatch.Builder setSuffixLen(com.google.protobuf.UInt32Value.Builder builderForValue)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;public FilterChainMatch.Builder mergeSuffixLen(com.google.protobuf.UInt32Value value)
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;public FilterChainMatch.Builder clearSuffixLen()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;public com.google.protobuf.UInt32Value.Builder getSuffixLenBuilder()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;public com.google.protobuf.UInt32ValueOrBuilder getSuffixLenOrBuilder()
[#not-implemented-hide:]
.google.protobuf.UInt32Value suffix_len = 5;getSuffixLenOrBuilder in interface FilterChainMatchOrBuilderpublic int getSourceTypeValue()
Specifies the connection source IP match type. Can be any, local or external network.
.envoy.config.listener.v3.FilterChainMatch.ConnectionSourceType source_type = 12 [(.validate.rules) = { ... }getSourceTypeValue in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setSourceTypeValue(int value)
Specifies the connection source IP match type. Can be any, local or external network.
.envoy.config.listener.v3.FilterChainMatch.ConnectionSourceType source_type = 12 [(.validate.rules) = { ... }public FilterChainMatch.ConnectionSourceType getSourceType()
Specifies the connection source IP match type. Can be any, local or external network.
.envoy.config.listener.v3.FilterChainMatch.ConnectionSourceType source_type = 12 [(.validate.rules) = { ... }getSourceType in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setSourceType(FilterChainMatch.ConnectionSourceType value)
Specifies the connection source IP match type. Can be any, local or external network.
.envoy.config.listener.v3.FilterChainMatch.ConnectionSourceType source_type = 12 [(.validate.rules) = { ... }public FilterChainMatch.Builder clearSourceType()
Specifies the connection source IP match type. Can be any, local or external network.
.envoy.config.listener.v3.FilterChainMatch.ConnectionSourceType source_type = 12 [(.validate.rules) = { ... }public List<CidrRange> getSourcePrefixRangesList()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;getSourcePrefixRangesList in interface FilterChainMatchOrBuilderpublic int getSourcePrefixRangesCount()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;getSourcePrefixRangesCount in interface FilterChainMatchOrBuilderpublic CidrRange getSourcePrefixRanges(int index)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;getSourcePrefixRanges in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setSourcePrefixRanges(int index, CidrRange value)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder setSourcePrefixRanges(int index, CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder addSourcePrefixRanges(CidrRange value)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder addSourcePrefixRanges(int index, CidrRange value)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder addSourcePrefixRanges(CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder addSourcePrefixRanges(int index, CidrRange.Builder builderForValue)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder addAllSourcePrefixRanges(Iterable<? extends CidrRange> values)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder clearSourcePrefixRanges()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public FilterChainMatch.Builder removeSourcePrefixRanges(int index)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public CidrRange.Builder getSourcePrefixRangesBuilder(int index)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public CidrRangeOrBuilder getSourcePrefixRangesOrBuilder(int index)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;getSourcePrefixRangesOrBuilder in interface FilterChainMatchOrBuilderpublic List<? extends CidrRangeOrBuilder> getSourcePrefixRangesOrBuilderList()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;getSourcePrefixRangesOrBuilderList in interface FilterChainMatchOrBuilderpublic CidrRange.Builder addSourcePrefixRangesBuilder()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public CidrRange.Builder addSourcePrefixRangesBuilder(int index)
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public List<CidrRange.Builder> getSourcePrefixRangesBuilderList()
The criteria is satisfied if the source IP address of the downstream connection is contained in at least one of the specified subnets. If the parameter is not specified or the list is empty, the source IP address is ignored.
repeated .envoy.config.core.v3.CidrRange source_prefix_ranges = 6;public List<Integer> getSourcePortsList()
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }getSourcePortsList in interface FilterChainMatchOrBuilderpublic int getSourcePortsCount()
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }getSourcePortsCount in interface FilterChainMatchOrBuilderpublic int getSourcePorts(int index)
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }getSourcePorts in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setSourcePorts(int index, int value)
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }public FilterChainMatch.Builder addSourcePorts(int value)
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }public FilterChainMatch.Builder addAllSourcePorts(Iterable<? extends Integer> values)
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }public FilterChainMatch.Builder clearSourcePorts()
The criteria is satisfied if the source port of the downstream connection is contained in at least one of the specified ports. If the parameter is not specified, the source port is ignored.
repeated uint32 source_ports = 7 [(.validate.rules) = { ... }public com.google.protobuf.ProtocolStringList getServerNamesList()
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;getServerNamesList in interface FilterChainMatchOrBuilderpublic int getServerNamesCount()
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;getServerNamesCount in interface FilterChainMatchOrBuilderpublic String getServerNames(int index)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;getServerNames in interface FilterChainMatchOrBuilderpublic com.google.protobuf.ByteString getServerNamesBytes(int index)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;getServerNamesBytes in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setServerNames(int index, String value)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;public FilterChainMatch.Builder addServerNames(String value)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;public FilterChainMatch.Builder addAllServerNames(Iterable<String> values)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;public FilterChainMatch.Builder clearServerNames()
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;public FilterChainMatch.Builder addServerNamesBytes(com.google.protobuf.ByteString value)
If non-empty, a list of server names (e.g. SNI for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the server names of a new connection, when detected by one of the listener filters. The server name will be matched against all wildcard domains, i.e. ``www.example.com`` will be first matched against ``www.example.com``, then ``*.example.com``, then ``*.com``. Note that partial wildcards are not supported, and values like ``*w.example.com`` are invalid. .. attention:: See the :ref:`FAQ entry <faq_how_to_setup_sni>` on how to configure SNI for more information.
repeated string server_names = 11;public String getTransportProtocol()
If non-empty, a transport protocol to consider when determining a filter chain match. This value will be compared against the transport protocol of a new connection, when it's detected by one of the listener filters. Suggested values include: * ``raw_buffer`` - default, used when no transport protocol is detected, * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` when TLS protocol is detected.
string transport_protocol = 9;getTransportProtocol in interface FilterChainMatchOrBuilderpublic com.google.protobuf.ByteString getTransportProtocolBytes()
If non-empty, a transport protocol to consider when determining a filter chain match. This value will be compared against the transport protocol of a new connection, when it's detected by one of the listener filters. Suggested values include: * ``raw_buffer`` - default, used when no transport protocol is detected, * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` when TLS protocol is detected.
string transport_protocol = 9;getTransportProtocolBytes in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setTransportProtocol(String value)
If non-empty, a transport protocol to consider when determining a filter chain match. This value will be compared against the transport protocol of a new connection, when it's detected by one of the listener filters. Suggested values include: * ``raw_buffer`` - default, used when no transport protocol is detected, * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` when TLS protocol is detected.
string transport_protocol = 9;public FilterChainMatch.Builder clearTransportProtocol()
If non-empty, a transport protocol to consider when determining a filter chain match. This value will be compared against the transport protocol of a new connection, when it's detected by one of the listener filters. Suggested values include: * ``raw_buffer`` - default, used when no transport protocol is detected, * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` when TLS protocol is detected.
string transport_protocol = 9;public FilterChainMatch.Builder setTransportProtocolBytes(com.google.protobuf.ByteString value)
If non-empty, a transport protocol to consider when determining a filter chain match. This value will be compared against the transport protocol of a new connection, when it's detected by one of the listener filters. Suggested values include: * ``raw_buffer`` - default, used when no transport protocol is detected, * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` when TLS protocol is detected.
string transport_protocol = 9;public com.google.protobuf.ProtocolStringList getApplicationProtocolsList()
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;getApplicationProtocolsList in interface FilterChainMatchOrBuilderpublic int getApplicationProtocolsCount()
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;getApplicationProtocolsCount in interface FilterChainMatchOrBuilderpublic String getApplicationProtocols(int index)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;getApplicationProtocols in interface FilterChainMatchOrBuilderpublic com.google.protobuf.ByteString getApplicationProtocolsBytes(int index)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;getApplicationProtocolsBytes in interface FilterChainMatchOrBuilderpublic FilterChainMatch.Builder setApplicationProtocols(int index, String value)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;public FilterChainMatch.Builder addApplicationProtocols(String value)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;public FilterChainMatch.Builder addAllApplicationProtocols(Iterable<String> values)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;public FilterChainMatch.Builder clearApplicationProtocols()
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;public FilterChainMatch.Builder addApplicationProtocolsBytes(com.google.protobuf.ByteString value)
If non-empty, a list of application protocols (e.g. ALPN for TLS protocol) to consider when determining a filter chain match. Those values will be compared against the application protocols of a new connection, when detected by one of the listener filters. Suggested values include: * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`, * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>` .. attention:: Currently, only :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides application protocol detection based on the requested `ALPN <https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_ values. However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet, and matching on values other than ``h2`` is going to lead to a lot of false negatives, unless all connecting clients are known to use ALPN.
repeated string application_protocols = 10;public final FilterChainMatch.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>public final FilterChainMatch.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<FilterChainMatch.Builder>Copyright © 2018–2021 The Envoy Project. All rights reserved.