Class Http2ProtocolOptions

  • All Implemented Interfaces:
    com.google.protobuf.Message, com.google.protobuf.MessageLite, com.google.protobuf.MessageLiteOrBuilder, com.google.protobuf.MessageOrBuilder, Http2ProtocolOptionsOrBuilder, Serializable

    public final class Http2ProtocolOptions
    extends com.google.protobuf.GeneratedMessageV3
    implements Http2ProtocolOptionsOrBuilder
     [#next-free-field: 14]
     
    Protobuf type envoy.api.v2.core.Http2ProtocolOptions
    See Also:
    Serialized Form
    • Field Detail

      • HPACK_TABLE_SIZE_FIELD_NUMBER

        public static final int HPACK_TABLE_SIZE_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_CONCURRENT_STREAMS_FIELD_NUMBER

        public static final int MAX_CONCURRENT_STREAMS_FIELD_NUMBER
        See Also:
        Constant Field Values
      • INITIAL_STREAM_WINDOW_SIZE_FIELD_NUMBER

        public static final int INITIAL_STREAM_WINDOW_SIZE_FIELD_NUMBER
        See Also:
        Constant Field Values
      • INITIAL_CONNECTION_WINDOW_SIZE_FIELD_NUMBER

        public static final int INITIAL_CONNECTION_WINDOW_SIZE_FIELD_NUMBER
        See Also:
        Constant Field Values
      • ALLOW_CONNECT_FIELD_NUMBER

        public static final int ALLOW_CONNECT_FIELD_NUMBER
        See Also:
        Constant Field Values
      • ALLOW_METADATA_FIELD_NUMBER

        public static final int ALLOW_METADATA_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_OUTBOUND_FRAMES_FIELD_NUMBER

        public static final int MAX_OUTBOUND_FRAMES_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_OUTBOUND_CONTROL_FRAMES_FIELD_NUMBER

        public static final int MAX_OUTBOUND_CONTROL_FRAMES_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_CONSECUTIVE_INBOUND_FRAMES_WITH_EMPTY_PAYLOAD_FIELD_NUMBER

        public static final int MAX_CONSECUTIVE_INBOUND_FRAMES_WITH_EMPTY_PAYLOAD_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_INBOUND_PRIORITY_FRAMES_PER_STREAM_FIELD_NUMBER

        public static final int MAX_INBOUND_PRIORITY_FRAMES_PER_STREAM_FIELD_NUMBER
        See Also:
        Constant Field Values
      • MAX_INBOUND_WINDOW_UPDATE_FRAMES_PER_DATA_FRAME_SENT_FIELD_NUMBER

        public static final int MAX_INBOUND_WINDOW_UPDATE_FRAMES_PER_DATA_FRAME_SENT_FIELD_NUMBER
        See Also:
        Constant Field Values
      • STREAM_ERROR_ON_INVALID_HTTP_MESSAGING_FIELD_NUMBER

        public static final int STREAM_ERROR_ON_INVALID_HTTP_MESSAGING_FIELD_NUMBER
        See Also:
        Constant Field Values
      • CUSTOM_SETTINGS_PARAMETERS_FIELD_NUMBER

        public static final int CUSTOM_SETTINGS_PARAMETERS_FIELD_NUMBER
        See Also:
        Constant Field Values
    • Method Detail

      • newInstance

        protected Object newInstance​(com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter unused)
        Overrides:
        newInstance in class com.google.protobuf.GeneratedMessageV3
      • getUnknownFields

        public final com.google.protobuf.UnknownFieldSet getUnknownFields()
        Specified by:
        getUnknownFields in interface com.google.protobuf.MessageOrBuilder
        Overrides:
        getUnknownFields in class com.google.protobuf.GeneratedMessageV3
      • getDescriptor

        public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
      • internalGetFieldAccessorTable

        protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
        Specified by:
        internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3
      • hasHpackTableSize

        public boolean hasHpackTableSize()
         `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
         (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values
         range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header
         compression.
         
        .google.protobuf.UInt32Value hpack_table_size = 1;
        Specified by:
        hasHpackTableSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the hpackTableSize field is set.
      • getHpackTableSize

        public com.google.protobuf.UInt32Value getHpackTableSize()
         `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
         (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values
         range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header
         compression.
         
        .google.protobuf.UInt32Value hpack_table_size = 1;
        Specified by:
        getHpackTableSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The hpackTableSize.
      • getHpackTableSizeOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getHpackTableSizeOrBuilder()
         `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_
         (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values
         range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header
         compression.
         
        .google.protobuf.UInt32Value hpack_table_size = 1;
        Specified by:
        getHpackTableSizeOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasMaxConcurrentStreams

        public boolean hasMaxConcurrentStreams()
         `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
         allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1)
         and defaults to 2147483647.
         For upstream connections, this also limits how many streams Envoy will initiate concurrently
         on a single connection. If the limit is reached, Envoy may queue requests or establish
         additional connections (as allowed per circuit breaker limits).
         
        .google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
        Specified by:
        hasMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxConcurrentStreams field is set.
      • getMaxConcurrentStreams

        public com.google.protobuf.UInt32Value getMaxConcurrentStreams()
         `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
         allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1)
         and defaults to 2147483647.
         For upstream connections, this also limits how many streams Envoy will initiate concurrently
         on a single connection. If the limit is reached, Envoy may queue requests or establish
         additional connections (as allowed per circuit breaker limits).
         
        .google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
        Specified by:
        getMaxConcurrentStreams in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxConcurrentStreams.
      • getMaxConcurrentStreamsOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxConcurrentStreamsOrBuilder()
         `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_
         allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1)
         and defaults to 2147483647.
         For upstream connections, this also limits how many streams Envoy will initiate concurrently
         on a single connection. If the limit is reached, Envoy may queue requests or establish
         additional connections (as allowed per circuit breaker limits).
         
        .google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
        Specified by:
        getMaxConcurrentStreamsOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasInitialStreamWindowSize

        public boolean hasInitialStreamWindowSize()
         `Initial stream-level flow-control window
         <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535
         (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456
         (256 * 1024 * 1024).
         NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default
         window size now, so it's also the minimum.
         This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the
         HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to
         stop the flow of data to the codec buffers.
         
        .google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
        Specified by:
        hasInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the initialStreamWindowSize field is set.
      • getInitialStreamWindowSize

        public com.google.protobuf.UInt32Value getInitialStreamWindowSize()
         `Initial stream-level flow-control window
         <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535
         (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456
         (256 * 1024 * 1024).
         NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default
         window size now, so it's also the minimum.
         This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the
         HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to
         stop the flow of data to the codec buffers.
         
        .google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
        Specified by:
        getInitialStreamWindowSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The initialStreamWindowSize.
      • getInitialStreamWindowSizeOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getInitialStreamWindowSizeOrBuilder()
         `Initial stream-level flow-control window
         <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535
         (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456
         (256 * 1024 * 1024).
         NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default
         window size now, so it's also the minimum.
         This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the
         HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to
         stop the flow of data to the codec buffers.
         
        .google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
        Specified by:
        getInitialStreamWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasInitialConnectionWindowSize

        public boolean hasInitialConnectionWindowSize()
         Similar to *initial_stream_window_size*, but for connection-level flow-control
         window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
         
        .google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
        Specified by:
        hasInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the initialConnectionWindowSize field is set.
      • getInitialConnectionWindowSize

        public com.google.protobuf.UInt32Value getInitialConnectionWindowSize()
         Similar to *initial_stream_window_size*, but for connection-level flow-control
         window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
         
        .google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
        Specified by:
        getInitialConnectionWindowSize in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The initialConnectionWindowSize.
      • getInitialConnectionWindowSizeOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getInitialConnectionWindowSizeOrBuilder()
         Similar to *initial_stream_window_size*, but for connection-level flow-control
         window. Currently, this has the same minimum/maximum/default as *initial_stream_window_size*.
         
        .google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
        Specified by:
        getInitialConnectionWindowSizeOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • getAllowConnect

        public boolean getAllowConnect()
         Allows proxying Websocket and other upgrades over H2 connect.
         
        bool allow_connect = 5;
        Specified by:
        getAllowConnect in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The allowConnect.
      • getAllowMetadata

        public boolean getAllowMetadata()
         [#not-implemented-hide:] Hiding until envoy has full metadata support.
         Still under implementation. DO NOT USE.
         Allows metadata. See [metadata
         docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more
         information.
         
        bool allow_metadata = 6;
        Specified by:
        getAllowMetadata in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The allowMetadata.
      • hasMaxOutboundFrames

        public boolean hasMaxOutboundFrames()
         Limit the number of pending outbound downstream frames of all types (frames that are waiting to
         be written into the socket). Exceeding this limit triggers flood mitigation and connection is
         terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due
         to flood mitigation. The default limit is 10000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
        Specified by:
        hasMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxOutboundFrames field is set.
      • getMaxOutboundFrames

        public com.google.protobuf.UInt32Value getMaxOutboundFrames()
         Limit the number of pending outbound downstream frames of all types (frames that are waiting to
         be written into the socket). Exceeding this limit triggers flood mitigation and connection is
         terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due
         to flood mitigation. The default limit is 10000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
        Specified by:
        getMaxOutboundFrames in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxOutboundFrames.
      • getMaxOutboundFramesOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundFramesOrBuilder()
         Limit the number of pending outbound downstream frames of all types (frames that are waiting to
         be written into the socket). Exceeding this limit triggers flood mitigation and connection is
         terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due
         to flood mitigation. The default limit is 10000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
        Specified by:
        getMaxOutboundFramesOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasMaxOutboundControlFrames

        public boolean hasMaxOutboundControlFrames()
         Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
         preventing high memory utilization when receiving continuous stream of these frames. Exceeding
         this limit triggers flood mitigation and connection is terminated. The
         ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood
         mitigation. The default limit is 1000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
        Specified by:
        hasMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxOutboundControlFrames field is set.
      • getMaxOutboundControlFrames

        public com.google.protobuf.UInt32Value getMaxOutboundControlFrames()
         Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
         preventing high memory utilization when receiving continuous stream of these frames. Exceeding
         this limit triggers flood mitigation and connection is terminated. The
         ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood
         mitigation. The default limit is 1000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
        Specified by:
        getMaxOutboundControlFrames in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxOutboundControlFrames.
      • getMaxOutboundControlFramesOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundControlFramesOrBuilder()
         Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM,
         preventing high memory utilization when receiving continuous stream of these frames. Exceeding
         this limit triggers flood mitigation and connection is terminated. The
         ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood
         mitigation. The default limit is 1000.
         [#comment:TODO: implement same limits for upstream outbound frames as well.]
         
        .google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
        Specified by:
        getMaxOutboundControlFramesOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasMaxConsecutiveInboundFramesWithEmptyPayload

        public boolean hasMaxConsecutiveInboundFramesWithEmptyPayload()
         Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
         empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but
         might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood``
         stat tracks the number of connections terminated due to flood mitigation.
         Setting this to 0 will terminate connection upon receiving first frame with an empty payload
         and no end stream flag. The default limit is 1.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
        Specified by:
        hasMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxConsecutiveInboundFramesWithEmptyPayload field is set.
      • getMaxConsecutiveInboundFramesWithEmptyPayload

        public com.google.protobuf.UInt32Value getMaxConsecutiveInboundFramesWithEmptyPayload()
         Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
         empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but
         might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood``
         stat tracks the number of connections terminated due to flood mitigation.
         Setting this to 0 will terminate connection upon receiving first frame with an empty payload
         and no end stream flag. The default limit is 1.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
        Specified by:
        getMaxConsecutiveInboundFramesWithEmptyPayload in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxConsecutiveInboundFramesWithEmptyPayload.
      • getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
         Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an
         empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but
         might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood``
         stat tracks the number of connections terminated due to flood mitigation.
         Setting this to 0 will terminate connection upon receiving first frame with an empty payload
         and no end stream flag. The default limit is 1.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
        Specified by:
        getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasMaxInboundPriorityFramesPerStream

        public boolean hasMaxInboundPriorityFramesPerStream()
         Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
         of PRIORITY frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             max_inbound_priority_frames_per_stream * (1 + inbound_streams)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 100.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
        Specified by:
        hasMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxInboundPriorityFramesPerStream field is set.
      • getMaxInboundPriorityFramesPerStream

        public com.google.protobuf.UInt32Value getMaxInboundPriorityFramesPerStream()
         Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
         of PRIORITY frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             max_inbound_priority_frames_per_stream * (1 + inbound_streams)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 100.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
        Specified by:
        getMaxInboundPriorityFramesPerStream in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxInboundPriorityFramesPerStream.
      • getMaxInboundPriorityFramesPerStreamOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundPriorityFramesPerStreamOrBuilder()
         Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number
         of PRIORITY frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             max_inbound_priority_frames_per_stream * (1 + inbound_streams)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 100.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
        Specified by:
        getMaxInboundPriorityFramesPerStreamOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • hasMaxInboundWindowUpdateFramesPerDataFrameSent

        public boolean hasMaxInboundWindowUpdateFramesPerDataFrameSent()
         Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
         of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             1 + 2 * (inbound_streams +
                      max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 10.
         Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
         but more complex implementations that try to estimate available bandwidth require at least 2.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
        Specified by:
        hasMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilder
        Returns:
        Whether the maxInboundWindowUpdateFramesPerDataFrameSent field is set.
      • getMaxInboundWindowUpdateFramesPerDataFrameSent

        public com.google.protobuf.UInt32Value getMaxInboundWindowUpdateFramesPerDataFrameSent()
         Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
         of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             1 + 2 * (inbound_streams +
                      max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 10.
         Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
         but more complex implementations that try to estimate available bandwidth require at least 2.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
        Specified by:
        getMaxInboundWindowUpdateFramesPerDataFrameSent in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The maxInboundWindowUpdateFramesPerDataFrameSent.
      • getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder

        public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
         Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number
         of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated
         using this formula::
             1 + 2 * (inbound_streams +
                      max_inbound_window_update_frames_per_data_frame_sent * outbound_data_frames)
         the connection is terminated. The ``http2.inbound_priority_frames_flood`` stat tracks
         the number of connections terminated due to flood mitigation. The default limit is 10.
         Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control,
         but more complex implementations that try to estimate available bandwidth require at least 2.
         [#comment:TODO: implement same limits for upstream inbound frames as well.]
         
        .google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
        Specified by:
        getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • getStreamErrorOnInvalidHttpMessaging

        public boolean getStreamErrorOnInvalidHttpMessaging()
         Allows invalid HTTP messaging and headers. When this option is disabled (default), then
         the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However,
         when this option is enabled, only the offending stream is terminated.
         See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
         
        bool stream_error_on_invalid_http_messaging = 12;
        Specified by:
        getStreamErrorOnInvalidHttpMessaging in interface Http2ProtocolOptionsOrBuilder
        Returns:
        The streamErrorOnInvalidHttpMessaging.
      • getCustomSettingsParametersList

        public List<Http2ProtocolOptions.SettingsParameter> getCustomSettingsParametersList()
         [#not-implemented-hide:]
         Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
         1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by
         Envoy.
         2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field
         'allow_connect'.
         Note that custom parameters specified through this field can not also be set in the
         corresponding named parameters:
         .. code-block:: text
           ID    Field Name
           ----------------
           0x1   hpack_table_size
           0x3   max_concurrent_streams
           0x4   initial_stream_window_size
         Collisions will trigger config validation failure on load/update. Likewise, inconsistencies
         between custom parameters with the same identifier will trigger a failure.
         See `IANA HTTP/2 Settings
         <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for
         standardized identifiers.
         
        repeated .envoy.api.v2.core.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
        Specified by:
        getCustomSettingsParametersList in interface Http2ProtocolOptionsOrBuilder
      • getCustomSettingsParametersOrBuilderList

        public List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersOrBuilderList()
         [#not-implemented-hide:]
         Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
         1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by
         Envoy.
         2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field
         'allow_connect'.
         Note that custom parameters specified through this field can not also be set in the
         corresponding named parameters:
         .. code-block:: text
           ID    Field Name
           ----------------
           0x1   hpack_table_size
           0x3   max_concurrent_streams
           0x4   initial_stream_window_size
         Collisions will trigger config validation failure on load/update. Likewise, inconsistencies
         between custom parameters with the same identifier will trigger a failure.
         See `IANA HTTP/2 Settings
         <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for
         standardized identifiers.
         
        repeated .envoy.api.v2.core.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
        Specified by:
        getCustomSettingsParametersOrBuilderList in interface Http2ProtocolOptionsOrBuilder
      • getCustomSettingsParametersCount

        public int getCustomSettingsParametersCount()
         [#not-implemented-hide:]
         Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
         1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by
         Envoy.
         2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field
         'allow_connect'.
         Note that custom parameters specified through this field can not also be set in the
         corresponding named parameters:
         .. code-block:: text
           ID    Field Name
           ----------------
           0x1   hpack_table_size
           0x3   max_concurrent_streams
           0x4   initial_stream_window_size
         Collisions will trigger config validation failure on load/update. Likewise, inconsistencies
         between custom parameters with the same identifier will trigger a failure.
         See `IANA HTTP/2 Settings
         <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for
         standardized identifiers.
         
        repeated .envoy.api.v2.core.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
        Specified by:
        getCustomSettingsParametersCount in interface Http2ProtocolOptionsOrBuilder
      • getCustomSettingsParameters

        public Http2ProtocolOptions.SettingsParameter getCustomSettingsParameters​(int index)
         [#not-implemented-hide:]
         Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
         1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by
         Envoy.
         2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field
         'allow_connect'.
         Note that custom parameters specified through this field can not also be set in the
         corresponding named parameters:
         .. code-block:: text
           ID    Field Name
           ----------------
           0x1   hpack_table_size
           0x3   max_concurrent_streams
           0x4   initial_stream_window_size
         Collisions will trigger config validation failure on load/update. Likewise, inconsistencies
         between custom parameters with the same identifier will trigger a failure.
         See `IANA HTTP/2 Settings
         <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for
         standardized identifiers.
         
        repeated .envoy.api.v2.core.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
        Specified by:
        getCustomSettingsParameters in interface Http2ProtocolOptionsOrBuilder
      • getCustomSettingsParametersOrBuilder

        public Http2ProtocolOptions.SettingsParameterOrBuilder getCustomSettingsParametersOrBuilder​(int index)
         [#not-implemented-hide:]
         Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions:
         1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by
         Envoy.
         2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field
         'allow_connect'.
         Note that custom parameters specified through this field can not also be set in the
         corresponding named parameters:
         .. code-block:: text
           ID    Field Name
           ----------------
           0x1   hpack_table_size
           0x3   max_concurrent_streams
           0x4   initial_stream_window_size
         Collisions will trigger config validation failure on load/update. Likewise, inconsistencies
         between custom parameters with the same identifier will trigger a failure.
         See `IANA HTTP/2 Settings
         <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for
         standardized identifiers.
         
        repeated .envoy.api.v2.core.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
        Specified by:
        getCustomSettingsParametersOrBuilder in interface Http2ProtocolOptionsOrBuilder
      • isInitialized

        public final boolean isInitialized()
        Specified by:
        isInitialized in interface com.google.protobuf.MessageLiteOrBuilder
        Overrides:
        isInitialized in class com.google.protobuf.GeneratedMessageV3
      • writeTo

        public void writeTo​(com.google.protobuf.CodedOutputStream output)
                     throws IOException
        Specified by:
        writeTo in interface com.google.protobuf.MessageLite
        Overrides:
        writeTo in class com.google.protobuf.GeneratedMessageV3
        Throws:
        IOException
      • getSerializedSize

        public int getSerializedSize()
        Specified by:
        getSerializedSize in interface com.google.protobuf.MessageLite
        Overrides:
        getSerializedSize in class com.google.protobuf.GeneratedMessageV3
      • equals

        public boolean equals​(Object obj)
        Specified by:
        equals in interface com.google.protobuf.Message
        Overrides:
        equals in class com.google.protobuf.AbstractMessage
      • hashCode

        public int hashCode()
        Specified by:
        hashCode in interface com.google.protobuf.Message
        Overrides:
        hashCode in class com.google.protobuf.AbstractMessage
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(ByteBuffer data)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(ByteBuffer data,
                                                     com.google.protobuf.ExtensionRegistryLite extensionRegistry)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(com.google.protobuf.ByteString data)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(com.google.protobuf.ByteString data,
                                                     com.google.protobuf.ExtensionRegistryLite extensionRegistry)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(byte[] data)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • parseFrom

        public static Http2ProtocolOptions parseFrom​(byte[] data,
                                                     com.google.protobuf.ExtensionRegistryLite extensionRegistry)
                                              throws com.google.protobuf.InvalidProtocolBufferException
        Throws:
        com.google.protobuf.InvalidProtocolBufferException
      • newBuilderForType

        public Http2ProtocolOptions.Builder newBuilderForType()
        Specified by:
        newBuilderForType in interface com.google.protobuf.Message
        Specified by:
        newBuilderForType in interface com.google.protobuf.MessageLite
      • toBuilder

        public Http2ProtocolOptions.Builder toBuilder()
        Specified by:
        toBuilder in interface com.google.protobuf.Message
        Specified by:
        toBuilder in interface com.google.protobuf.MessageLite
      • newBuilderForType

        protected Http2ProtocolOptions.Builder newBuilderForType​(com.google.protobuf.GeneratedMessageV3.BuilderParent parent)
        Specified by:
        newBuilderForType in class com.google.protobuf.GeneratedMessageV3
      • getParserForType

        public com.google.protobuf.Parser<Http2ProtocolOptions> getParserForType()
        Specified by:
        getParserForType in interface com.google.protobuf.Message
        Specified by:
        getParserForType in interface com.google.protobuf.MessageLite
        Overrides:
        getParserForType in class com.google.protobuf.GeneratedMessageV3
      • getDefaultInstanceForType

        public Http2ProtocolOptions getDefaultInstanceForType()
        Specified by:
        getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuilder
        Specified by:
        getDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilder