Interface CommonTlsContextOrBuilder
-
- All Superinterfaces:
com.google.protobuf.MessageLiteOrBuilder,com.google.protobuf.MessageOrBuilder
- All Known Implementing Classes:
CommonTlsContext,CommonTlsContext.Builder
public interface CommonTlsContextOrBuilder extends com.google.protobuf.MessageOrBuilder
-
-
Method Summary
All Methods Instance Methods Abstract Methods Deprecated Methods Modifier and Type Method Description StringgetAlpnProtocols(int index)Supplies the list of ALPN protocols that the listener should expose.com.google.protobuf.ByteStringgetAlpnProtocolsBytes(int index)Supplies the list of ALPN protocols that the listener should expose.intgetAlpnProtocolsCount()Supplies the list of ALPN protocols that the listener should expose.List<String>getAlpnProtocolsList()Supplies the list of ALPN protocols that the listener should expose.CommonTlsContext.CombinedCertificateValidationContextgetCombinedValidationContext()Combined certificate validation context holds a default CertificateValidationContext and SDS config.CommonTlsContext.CombinedCertificateValidationContextOrBuildergetCombinedValidationContextOrBuilder()Combined certificate validation context holds a default CertificateValidationContext and SDS config.TypedExtensionConfiggetCustomHandshaker()Custom TLS handshaker.TypedExtensionConfigOrBuildergetCustomHandshakerOrBuilder()Custom TLS handshaker.TlsKeyLoggetKeyLog()TLS key log configurationTlsKeyLogOrBuildergetKeyLogOrBuilder()TLS key log configurationCommonTlsContext.CertificateProvidergetTlsCertificateCertificateProvider()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider is deprecated.CommonTlsContext.CertificateProviderInstancegetTlsCertificateCertificateProviderInstance()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider_instance is deprecated.CommonTlsContext.CertificateProviderInstanceOrBuildergetTlsCertificateCertificateProviderInstanceOrBuilder()Deprecated.CommonTlsContext.CertificateProviderOrBuildergetTlsCertificateCertificateProviderOrBuilder()Deprecated.CertificateProviderPluginInstancegetTlsCertificateProviderInstance()Certificate provider instance for fetching TLS certs.CertificateProviderPluginInstanceOrBuildergetTlsCertificateProviderInstanceOrBuilder()Certificate provider instance for fetching TLS certs.TlsCertificategetTlsCertificates(int index):ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates.intgetTlsCertificatesCount():ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates.SdsSecretConfiggetTlsCertificateSdsSecretConfigs(int index)Configs for fetching TLS certificates via SDS API.intgetTlsCertificateSdsSecretConfigsCount()Configs for fetching TLS certificates via SDS API.List<SdsSecretConfig>getTlsCertificateSdsSecretConfigsList()Configs for fetching TLS certificates via SDS API.SdsSecretConfigOrBuildergetTlsCertificateSdsSecretConfigsOrBuilder(int index)Configs for fetching TLS certificates via SDS API.List<? extends SdsSecretConfigOrBuilder>getTlsCertificateSdsSecretConfigsOrBuilderList()Configs for fetching TLS certificates via SDS API.List<TlsCertificate>getTlsCertificatesList():ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates.TlsCertificateOrBuildergetTlsCertificatesOrBuilder(int index):ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates.List<? extends TlsCertificateOrBuilder>getTlsCertificatesOrBuilderList():ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates.TlsParametersgetTlsParams()TLS protocol versions, cipher suites etc.TlsParametersOrBuildergetTlsParamsOrBuilder()TLS protocol versions, cipher suites etc.CertificateValidationContextgetValidationContext()How to validate peer certificates.CommonTlsContext.CertificateProvidergetValidationContextCertificateProvider()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider is deprecated.CommonTlsContext.CertificateProviderInstancegetValidationContextCertificateProviderInstance()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider_instance is deprecated.CommonTlsContext.CertificateProviderInstanceOrBuildergetValidationContextCertificateProviderInstanceOrBuilder()Deprecated.CommonTlsContext.CertificateProviderOrBuildergetValidationContextCertificateProviderOrBuilder()Deprecated.CertificateValidationContextOrBuildergetValidationContextOrBuilder()How to validate peer certificates.SdsSecretConfiggetValidationContextSdsSecretConfig()Config for fetching validation context via SDS API.SdsSecretConfigOrBuildergetValidationContextSdsSecretConfigOrBuilder()Config for fetching validation context via SDS API.CommonTlsContext.ValidationContextTypeCasegetValidationContextTypeCase()booleanhasCombinedValidationContext()Combined certificate validation context holds a default CertificateValidationContext and SDS config.booleanhasCustomHandshaker()Custom TLS handshaker.booleanhasKeyLog()TLS key log configurationbooleanhasTlsCertificateCertificateProvider()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider is deprecated.booleanhasTlsCertificateCertificateProviderInstance()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider_instance is deprecated.booleanhasTlsCertificateProviderInstance()Certificate provider instance for fetching TLS certs.booleanhasTlsParams()TLS protocol versions, cipher suites etc.booleanhasValidationContext()How to validate peer certificates.booleanhasValidationContextCertificateProvider()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider is deprecated.booleanhasValidationContextCertificateProviderInstance()Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider_instance is deprecated.booleanhasValidationContextSdsSecretConfig()Config for fetching validation context via SDS API.-
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getDefaultInstanceForType, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
-
-
-
Method Detail
-
hasTlsParams
boolean hasTlsParams()
TLS protocol versions, cipher suites etc.
.envoy.extensions.transport_sockets.tls.v3.TlsParameters tls_params = 1;- Returns:
- Whether the tlsParams field is set.
-
getTlsParams
TlsParameters getTlsParams()
TLS protocol versions, cipher suites etc.
.envoy.extensions.transport_sockets.tls.v3.TlsParameters tls_params = 1;- Returns:
- The tlsParams.
-
getTlsParamsOrBuilder
TlsParametersOrBuilder getTlsParamsOrBuilder()
TLS protocol versions, cipher suites etc.
.envoy.extensions.transport_sockets.tls.v3.TlsParameters tls_params = 1;
-
getTlsCertificatesList
List<TlsCertificate> getTlsCertificatesList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.TlsCertificate tls_certificates = 2;
-
getTlsCertificates
TlsCertificate getTlsCertificates(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.TlsCertificate tls_certificates = 2;
-
getTlsCertificatesCount
int getTlsCertificatesCount()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.TlsCertificate tls_certificates = 2;
-
getTlsCertificatesOrBuilderList
List<? extends TlsCertificateOrBuilder> getTlsCertificatesOrBuilderList()
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.TlsCertificate tls_certificates = 2;
-
getTlsCertificatesOrBuilder
TlsCertificateOrBuilder getTlsCertificatesOrBuilder(int index)
:ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the same context to allow both RSA and ECDSA certificates. Only a single TLS certificate is supported in client contexts. In server contexts, the first RSA certificate is used for clients that only support RSA and the first ECDSA certificate is used for clients that support ECDSA. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.TlsCertificate tls_certificates = 2;
-
getTlsCertificateSdsSecretConfigsList
List<SdsSecretConfig> getTlsCertificateSdsSecretConfigsList()
Configs for fetching TLS certificates via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake. The same number and types of certificates as :ref:`tls_certificates <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificates>` are valid in the the certificates fetched through this setting. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }
-
getTlsCertificateSdsSecretConfigs
SdsSecretConfig getTlsCertificateSdsSecretConfigs(int index)
Configs for fetching TLS certificates via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake. The same number and types of certificates as :ref:`tls_certificates <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificates>` are valid in the the certificates fetched through this setting. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }
-
getTlsCertificateSdsSecretConfigsCount
int getTlsCertificateSdsSecretConfigsCount()
Configs for fetching TLS certificates via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake. The same number and types of certificates as :ref:`tls_certificates <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificates>` are valid in the the certificates fetched through this setting. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }
-
getTlsCertificateSdsSecretConfigsOrBuilderList
List<? extends SdsSecretConfigOrBuilder> getTlsCertificateSdsSecretConfigsOrBuilderList()
Configs for fetching TLS certificates via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake. The same number and types of certificates as :ref:`tls_certificates <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificates>` are valid in the the certificates fetched through this setting. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }
-
getTlsCertificateSdsSecretConfigsOrBuilder
SdsSecretConfigOrBuilder getTlsCertificateSdsSecretConfigsOrBuilder(int index)
Configs for fetching TLS certificates via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake. The same number and types of certificates as :ref:`tls_certificates <envoy_v3_api_field_extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificates>` are valid in the the certificates fetched through this setting. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#next-major-version: These mutually exclusive fields should ideally be in a oneof, but it's not legal to put a repeated field in a oneof. In the next major version, we should rework this to avoid this problem.]
repeated .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... }
-
hasTlsCertificateProviderInstance
boolean hasTlsCertificateProviderInstance()
Certificate provider instance for fetching TLS certs. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CertificateProviderPluginInstance tls_certificate_provider_instance = 14;- Returns:
- Whether the tlsCertificateProviderInstance field is set.
-
getTlsCertificateProviderInstance
CertificateProviderPluginInstance getTlsCertificateProviderInstance()
Certificate provider instance for fetching TLS certs. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CertificateProviderPluginInstance tls_certificate_provider_instance = 14;- Returns:
- The tlsCertificateProviderInstance.
-
getTlsCertificateProviderInstanceOrBuilder
CertificateProviderPluginInstanceOrBuilder getTlsCertificateProviderInstanceOrBuilder()
Certificate provider instance for fetching TLS certs. Only one of ``tls_certificates``, ``tls_certificate_sds_secret_configs``, and ``tls_certificate_provider_instance`` may be used. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CertificateProviderPluginInstance tls_certificate_provider_instance = 14;
-
hasTlsCertificateCertificateProvider
@Deprecated boolean hasTlsCertificateCertificateProvider()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=266Certificate provider for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider tls_certificate_certificate_provider = 9 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- Whether the tlsCertificateCertificateProvider field is set.
-
getTlsCertificateCertificateProvider
@Deprecated CommonTlsContext.CertificateProvider getTlsCertificateCertificateProvider()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=266Certificate provider for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider tls_certificate_certificate_provider = 9 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- The tlsCertificateCertificateProvider.
-
getTlsCertificateCertificateProviderOrBuilder
@Deprecated CommonTlsContext.CertificateProviderOrBuilder getTlsCertificateCertificateProviderOrBuilder()
Deprecated.Certificate provider for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider tls_certificate_certificate_provider = 9 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
-
hasTlsCertificateCertificateProviderInstance
@Deprecated boolean hasTlsCertificateCertificateProviderInstance()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider_instance is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=271Certificate provider instance for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance tls_certificate_certificate_provider_instance = 11 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- Whether the tlsCertificateCertificateProviderInstance field is set.
-
getTlsCertificateCertificateProviderInstance
@Deprecated CommonTlsContext.CertificateProviderInstance getTlsCertificateCertificateProviderInstance()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.tls_certificate_certificate_provider_instance is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=271Certificate provider instance for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance tls_certificate_certificate_provider_instance = 11 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- The tlsCertificateCertificateProviderInstance.
-
getTlsCertificateCertificateProviderInstanceOrBuilder
@Deprecated CommonTlsContext.CertificateProviderInstanceOrBuilder getTlsCertificateCertificateProviderInstanceOrBuilder()
Deprecated.Certificate provider instance for fetching TLS certificates. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance tls_certificate_certificate_provider_instance = 11 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
-
hasValidationContext
boolean hasValidationContext()
How to validate peer certificates.
.envoy.extensions.transport_sockets.tls.v3.CertificateValidationContext validation_context = 3;- Returns:
- Whether the validationContext field is set.
-
getValidationContext
CertificateValidationContext getValidationContext()
How to validate peer certificates.
.envoy.extensions.transport_sockets.tls.v3.CertificateValidationContext validation_context = 3;- Returns:
- The validationContext.
-
getValidationContextOrBuilder
CertificateValidationContextOrBuilder getValidationContextOrBuilder()
How to validate peer certificates.
.envoy.extensions.transport_sockets.tls.v3.CertificateValidationContext validation_context = 3;
-
hasValidationContextSdsSecretConfig
boolean hasValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake.
.envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig validation_context_sds_secret_config = 7;- Returns:
- Whether the validationContextSdsSecretConfig field is set.
-
getValidationContextSdsSecretConfig
SdsSecretConfig getValidationContextSdsSecretConfig()
Config for fetching validation context via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake.
.envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig validation_context_sds_secret_config = 7;- Returns:
- The validationContextSdsSecretConfig.
-
getValidationContextSdsSecretConfigOrBuilder
SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder()
Config for fetching validation context via SDS API. Note SDS API allows certificates to be fetched/refreshed over the network asynchronously with respect to the TLS handshake.
.envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig validation_context_sds_secret_config = 7;
-
hasCombinedValidationContext
boolean hasCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;- Returns:
- Whether the combinedValidationContext field is set.
-
getCombinedValidationContext
CommonTlsContext.CombinedCertificateValidationContext getCombinedValidationContext()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;- Returns:
- The combinedValidationContext.
-
getCombinedValidationContextOrBuilder
CommonTlsContext.CombinedCertificateValidationContextOrBuilder getCombinedValidationContextOrBuilder()
Combined certificate validation context holds a default CertificateValidationContext and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic and default CertificateValidationContext are merged into a new CertificateValidationContext for validation. This merge is done by Message::MergeFrom(), so dynamic CertificateValidationContext overwrites singular fields in default CertificateValidationContext, and concatenates repeated fields to default CertificateValidationContext, and logical OR is applied to boolean fields.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8;
-
hasValidationContextCertificateProvider
@Deprecated boolean hasValidationContextCertificateProvider()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=293Certificate provider for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider validation_context_certificate_provider = 10 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- Whether the validationContextCertificateProvider field is set.
-
getValidationContextCertificateProvider
@Deprecated CommonTlsContext.CertificateProvider getValidationContextCertificateProvider()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=293Certificate provider for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider validation_context_certificate_provider = 10 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- The validationContextCertificateProvider.
-
getValidationContextCertificateProviderOrBuilder
@Deprecated CommonTlsContext.CertificateProviderOrBuilder getValidationContextCertificateProviderOrBuilder()
Deprecated.Certificate provider for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProvider validation_context_certificate_provider = 10 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
-
hasValidationContextCertificateProviderInstance
@Deprecated boolean hasValidationContextCertificateProviderInstance()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider_instance is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=298Certificate provider instance for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance validation_context_certificate_provider_instance = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- Whether the validationContextCertificateProviderInstance field is set.
-
getValidationContextCertificateProviderInstance
@Deprecated CommonTlsContext.CertificateProviderInstance getValidationContextCertificateProviderInstance()
Deprecated.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.validation_context_certificate_provider_instance is deprecated. See envoy/extensions/transport_sockets/tls/v3/tls.proto;l=298Certificate provider instance for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance validation_context_certificate_provider_instance = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];- Returns:
- The validationContextCertificateProviderInstance.
-
getValidationContextCertificateProviderInstanceOrBuilder
@Deprecated CommonTlsContext.CertificateProviderInstanceOrBuilder getValidationContextCertificateProviderInstanceOrBuilder()
Deprecated.Certificate provider instance for fetching validation context. [#not-implemented-hide:]
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext.CertificateProviderInstance validation_context_certificate_provider_instance = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
-
getAlpnProtocolsList
List<String> getAlpnProtocolsList()
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;- Returns:
- A list containing the alpnProtocols.
-
getAlpnProtocolsCount
int getAlpnProtocolsCount()
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;- Returns:
- The count of alpnProtocols.
-
getAlpnProtocols
String getAlpnProtocols(int index)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;- Parameters:
index- The index of the element to return.- Returns:
- The alpnProtocols at the given index.
-
getAlpnProtocolsBytes
com.google.protobuf.ByteString getAlpnProtocolsBytes(int index)
Supplies the list of ALPN protocols that the listener should expose. In practice this is likely to be set to one of two values (see the :ref:`codec_type <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.codec_type>` parameter in the HTTP connection manager for more information): * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. * "http/1.1" If the listener is only going to support HTTP/1.1. There is no default for this parameter. If empty, Envoy will not expose ALPN.
repeated string alpn_protocols = 4;- Parameters:
index- The index of the value to return.- Returns:
- The bytes of the alpnProtocols at the given index.
-
hasCustomHandshaker
boolean hasCustomHandshaker()
Custom TLS handshaker. If empty, defaults to native TLS handshaking behavior.
.envoy.config.core.v3.TypedExtensionConfig custom_handshaker = 13;- Returns:
- Whether the customHandshaker field is set.
-
getCustomHandshaker
TypedExtensionConfig getCustomHandshaker()
Custom TLS handshaker. If empty, defaults to native TLS handshaking behavior.
.envoy.config.core.v3.TypedExtensionConfig custom_handshaker = 13;- Returns:
- The customHandshaker.
-
getCustomHandshakerOrBuilder
TypedExtensionConfigOrBuilder getCustomHandshakerOrBuilder()
Custom TLS handshaker. If empty, defaults to native TLS handshaking behavior.
.envoy.config.core.v3.TypedExtensionConfig custom_handshaker = 13;
-
hasKeyLog
boolean hasKeyLog()
TLS key log configuration
.envoy.extensions.transport_sockets.tls.v3.TlsKeyLog key_log = 15;- Returns:
- Whether the keyLog field is set.
-
getKeyLog
TlsKeyLog getKeyLog()
TLS key log configuration
.envoy.extensions.transport_sockets.tls.v3.TlsKeyLog key_log = 15;- Returns:
- The keyLog.
-
getKeyLogOrBuilder
TlsKeyLogOrBuilder getKeyLogOrBuilder()
TLS key log configuration
.envoy.extensions.transport_sockets.tls.v3.TlsKeyLog key_log = 15;
-
getValidationContextTypeCase
CommonTlsContext.ValidationContextTypeCase getValidationContextTypeCase()
-
-