Class Http2ProtocolOptions.Builder
- java.lang.Object
-
- com.google.protobuf.AbstractMessageLite.Builder
-
- com.google.protobuf.AbstractMessage.Builder<BuilderT>
-
- com.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
- io.envoyproxy.envoy.config.core.v3.Http2ProtocolOptions.Builder
-
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,Http2ProtocolOptionsOrBuilder
,java.lang.Cloneable
- Enclosing class:
- Http2ProtocolOptions
public static final class Http2ProtocolOptions.Builder extends com.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder> implements Http2ProtocolOptionsOrBuilder
[#next-free-field: 17]
Protobuf typeenvoy.config.core.v3.Http2ProtocolOptions
-
-
Field Summary
Fields Modifier and Type Field Description private boolean
allowConnect_
private boolean
allowMetadata_
private int
bitField0_
private KeepaliveSettings
connectionKeepalive_
private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder,KeepaliveSettingsOrBuilder>
connectionKeepaliveBuilder_
private java.util.List<Http2ProtocolOptions.SettingsParameter>
customSettingsParameters_
private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder,Http2ProtocolOptions.SettingsParameterOrBuilder>
customSettingsParametersBuilder_
private com.google.protobuf.UInt32Value
hpackTableSize_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
hpackTableSizeBuilder_
private com.google.protobuf.UInt32Value
initialConnectionWindowSize_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
initialConnectionWindowSizeBuilder_
private com.google.protobuf.UInt32Value
initialStreamWindowSize_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
initialStreamWindowSizeBuilder_
private com.google.protobuf.UInt32Value
maxConcurrentStreams_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxConcurrentStreamsBuilder_
private com.google.protobuf.UInt32Value
maxConsecutiveInboundFramesWithEmptyPayload_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxConsecutiveInboundFramesWithEmptyPayloadBuilder_
private com.google.protobuf.UInt32Value
maxInboundPriorityFramesPerStream_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxInboundPriorityFramesPerStreamBuilder_
private com.google.protobuf.UInt32Value
maxInboundWindowUpdateFramesPerDataFrameSent_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxInboundWindowUpdateFramesPerDataFrameSentBuilder_
private com.google.protobuf.UInt32Value
maxOutboundControlFrames_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxOutboundControlFramesBuilder_
private com.google.protobuf.UInt32Value
maxOutboundFrames_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
maxOutboundFramesBuilder_
private com.google.protobuf.BoolValue
overrideStreamErrorOnInvalidHttpMessage_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder>
overrideStreamErrorOnInvalidHttpMessageBuilder_
private boolean
streamErrorOnInvalidHttpMessaging_
private com.google.protobuf.BoolValue
useOghttp2Codec_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder>
useOghttp2CodecBuilder_
-
Method Summary
All Methods Static Methods Instance Methods Concrete Methods Deprecated Methods Modifier and Type Method Description Http2ProtocolOptions.Builder
addAllCustomSettingsParameters(java.lang.Iterable<? extends Http2ProtocolOptions.SettingsParameter> values)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.SettingsParameter.Builder
addCustomSettingsParametersBuilder()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.SettingsParameter.Builder
addCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions
build()
Http2ProtocolOptions
buildPartial()
private void
buildPartial0(Http2ProtocolOptions result)
private void
buildPartialRepeatedFields(Http2ProtocolOptions result)
Http2ProtocolOptions.Builder
clear()
Http2ProtocolOptions.Builder
clearAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.Http2ProtocolOptions.Builder
clearAllowMetadata()
[#not-implemented-hide:] Hiding until Envoy has full metadata support.Http2ProtocolOptions.Builder
clearConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.Http2ProtocolOptions.Builder
clearCustomSettingsParameters()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
clearHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.Http2ProtocolOptions.Builder
clearInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.Http2ProtocolOptions.Builder
clearInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.Http2ProtocolOptions.Builder
clearMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.Http2ProtocolOptions.Builder
clearMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.Http2ProtocolOptions.Builder
clearMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.Http2ProtocolOptions.Builder
clearMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.Http2ProtocolOptions.Builder
clearMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.Http2ProtocolOptions.Builder
clearMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).Http2ProtocolOptions.Builder
clearOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.Http2ProtocolOptions.Builder
clearStreamErrorOnInvalidHttpMessaging()
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.Http2ProtocolOptions.Builder
clearUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.private void
ensureCustomSettingsParametersIsMutable()
boolean
getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.boolean
getAllowMetadata()
[#not-implemented-hide:] Hiding until Envoy has full metadata support.KeepaliveSettings
getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.KeepaliveSettings.Builder
getConnectionKeepaliveBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder,KeepaliveSettingsOrBuilder>
getConnectionKeepaliveFieldBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.KeepaliveSettingsOrBuilder
getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy.Http2ProtocolOptions.SettingsParameter
getCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.SettingsParameter.Builder
getCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.java.util.List<Http2ProtocolOptions.SettingsParameter.Builder>
getCustomSettingsParametersBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.int
getCustomSettingsParametersCount()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder,Http2ProtocolOptions.SettingsParameterOrBuilder>
getCustomSettingsParametersFieldBuilder()
java.util.List<Http2ProtocolOptions.SettingsParameter>
getCustomSettingsParametersList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.SettingsParameterOrBuilder
getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.java.util.List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder>
getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions
getDefaultInstanceForType()
static com.google.protobuf.Descriptors.Descriptor
getDescriptor()
com.google.protobuf.Descriptors.Descriptor
getDescriptorForType()
com.google.protobuf.UInt32Value
getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32Value.Builder
getHpackTableSizeBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getHpackTableSizeFieldBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32ValueOrBuilder
getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32Value
getInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32Value.Builder
getInitialConnectionWindowSizeBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getInitialConnectionWindowSizeFieldBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32ValueOrBuilder
getInitialConnectionWindowSizeOrBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32Value
getInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32Value.Builder
getInitialStreamWindowSizeBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getInitialStreamWindowSizeFieldBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32ValueOrBuilder
getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32Value
getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32Value.Builder
getMaxConcurrentStreamsBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxConcurrentStreamsFieldBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32ValueOrBuilder
getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32Value
getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32Value.Builder
getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxConsecutiveInboundFramesWithEmptyPayloadFieldBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32ValueOrBuilder
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32Value
getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32Value.Builder
getMaxInboundPriorityFramesPerStreamBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxInboundPriorityFramesPerStreamFieldBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32ValueOrBuilder
getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32Value
getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32Value.Builder
getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxInboundWindowUpdateFramesPerDataFrameSentFieldBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32ValueOrBuilder
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32Value
getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32Value.Builder
getMaxOutboundControlFramesBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxOutboundControlFramesFieldBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32ValueOrBuilder
getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32Value
getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.UInt32Value.Builder
getMaxOutboundFramesBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder>
getMaxOutboundFramesFieldBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.UInt32ValueOrBuilder
getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.BoolValue
getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.com.google.protobuf.BoolValue.Builder
getOverrideStreamErrorOnInvalidHttpMessageBuilder()
Allows invalid HTTP messaging and headers.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder>
getOverrideStreamErrorOnInvalidHttpMessageFieldBuilder()
Allows invalid HTTP messaging and headers.com.google.protobuf.BoolValueOrBuilder
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers.boolean
getStreamErrorOnInvalidHttpMessaging()
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.com.google.protobuf.BoolValue
getUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.com.google.protobuf.BoolValue.Builder
getUseOghttp2CodecBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder>
getUseOghttp2CodecFieldBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.com.google.protobuf.BoolValueOrBuilder
getUseOghttp2CodecOrBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.boolean
hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy.boolean
hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.boolean
hasInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.boolean
hasInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.boolean
hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.boolean
hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.boolean
hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream.boolean
hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.boolean
hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.boolean
hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).boolean
hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers.boolean
hasUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
internalGetFieldAccessorTable()
boolean
isInitialized()
private void
maybeForceBuilderInitialization()
Http2ProtocolOptions.Builder
mergeConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy.Http2ProtocolOptions.Builder
mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
Http2ProtocolOptions.Builder
mergeFrom(com.google.protobuf.Message other)
Http2ProtocolOptions.Builder
mergeFrom(Http2ProtocolOptions other)
Http2ProtocolOptions.Builder
mergeHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.Http2ProtocolOptions.Builder
mergeInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.Http2ProtocolOptions.Builder
mergeInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.Http2ProtocolOptions.Builder
mergeMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.Http2ProtocolOptions.Builder
mergeMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.Http2ProtocolOptions.Builder
mergeMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream.Http2ProtocolOptions.Builder
mergeMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.Http2ProtocolOptions.Builder
mergeMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.Http2ProtocolOptions.Builder
mergeMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).Http2ProtocolOptions.Builder
mergeOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers.Http2ProtocolOptions.Builder
mergeUseOghttp2Codec(com.google.protobuf.BoolValue value)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.Http2ProtocolOptions.Builder
removeCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
setAllowConnect(boolean value)
Allows proxying Websocket and other upgrades over H2 connect.Http2ProtocolOptions.Builder
setAllowMetadata(boolean value)
[#not-implemented-hide:] Hiding until Envoy has full metadata support.Http2ProtocolOptions.Builder
setConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy.Http2ProtocolOptions.Builder
setConnectionKeepalive(KeepaliveSettings.Builder builderForValue)
Send HTTP/2 PING frames to verify that the connection is still healthy.Http2ProtocolOptions.Builder
setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.Http2ProtocolOptions.Builder
setHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.Http2ProtocolOptions.Builder
setHpackTableSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.Http2ProtocolOptions.Builder
setInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.Http2ProtocolOptions.Builder
setInitialConnectionWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.Http2ProtocolOptions.Builder
setInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.Http2ProtocolOptions.Builder
setInitialStreamWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.Http2ProtocolOptions.Builder
setMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.Http2ProtocolOptions.Builder
setMaxConcurrentStreams(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.Http2ProtocolOptions.Builder
setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.Http2ProtocolOptions.Builder
setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.Http2ProtocolOptions.Builder
setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream.Http2ProtocolOptions.Builder
setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound PRIORITY frames allowed per each opened stream.Http2ProtocolOptions.Builder
setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.Http2ProtocolOptions.Builder
setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.Http2ProtocolOptions.Builder
setMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.Http2ProtocolOptions.Builder
setMaxOutboundControlFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.Http2ProtocolOptions.Builder
setMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).Http2ProtocolOptions.Builder
setMaxOutboundFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).Http2ProtocolOptions.Builder
setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers.Http2ProtocolOptions.Builder
setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue.Builder builderForValue)
Allows invalid HTTP messaging and headers.Http2ProtocolOptions.Builder
setStreamErrorOnInvalidHttpMessaging(boolean value)
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.Http2ProtocolOptions.Builder
setUseOghttp2Codec(com.google.protobuf.BoolValue value)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.Http2ProtocolOptions.Builder
setUseOghttp2Codec(com.google.protobuf.BoolValue.Builder builderForValue)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.-
Methods inherited from class com.google.protobuf.GeneratedMessage.Builder
addRepeatedField, clearField, clearOneof, clone, getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMapFieldReflection, internalGetMutableMapField, internalGetMutableMapFieldReflection, isClean, markClean, mergeUnknownFields, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setField, setRepeatedField, setUnknownFields, setUnknownFieldSetBuilder, setUnknownFieldsProto3
-
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
-
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
-
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
-
-
-
-
Field Detail
-
bitField0_
private int bitField0_
-
hpackTableSize_
private com.google.protobuf.UInt32Value hpackTableSize_
-
hpackTableSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> hpackTableSizeBuilder_
-
maxConcurrentStreams_
private com.google.protobuf.UInt32Value maxConcurrentStreams_
-
maxConcurrentStreamsBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxConcurrentStreamsBuilder_
-
initialStreamWindowSize_
private com.google.protobuf.UInt32Value initialStreamWindowSize_
-
initialStreamWindowSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> initialStreamWindowSizeBuilder_
-
initialConnectionWindowSize_
private com.google.protobuf.UInt32Value initialConnectionWindowSize_
-
initialConnectionWindowSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> initialConnectionWindowSizeBuilder_
-
allowConnect_
private boolean allowConnect_
-
allowMetadata_
private boolean allowMetadata_
-
maxOutboundFrames_
private com.google.protobuf.UInt32Value maxOutboundFrames_
-
maxOutboundFramesBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxOutboundFramesBuilder_
-
maxOutboundControlFrames_
private com.google.protobuf.UInt32Value maxOutboundControlFrames_
-
maxOutboundControlFramesBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxOutboundControlFramesBuilder_
-
maxConsecutiveInboundFramesWithEmptyPayload_
private com.google.protobuf.UInt32Value maxConsecutiveInboundFramesWithEmptyPayload_
-
maxConsecutiveInboundFramesWithEmptyPayloadBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxConsecutiveInboundFramesWithEmptyPayloadBuilder_
-
maxInboundPriorityFramesPerStream_
private com.google.protobuf.UInt32Value maxInboundPriorityFramesPerStream_
-
maxInboundPriorityFramesPerStreamBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxInboundPriorityFramesPerStreamBuilder_
-
maxInboundWindowUpdateFramesPerDataFrameSent_
private com.google.protobuf.UInt32Value maxInboundWindowUpdateFramesPerDataFrameSent_
-
maxInboundWindowUpdateFramesPerDataFrameSentBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> maxInboundWindowUpdateFramesPerDataFrameSentBuilder_
-
streamErrorOnInvalidHttpMessaging_
private boolean streamErrorOnInvalidHttpMessaging_
-
overrideStreamErrorOnInvalidHttpMessage_
private com.google.protobuf.BoolValue overrideStreamErrorOnInvalidHttpMessage_
-
overrideStreamErrorOnInvalidHttpMessageBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder> overrideStreamErrorOnInvalidHttpMessageBuilder_
-
customSettingsParameters_
private java.util.List<Http2ProtocolOptions.SettingsParameter> customSettingsParameters_
-
customSettingsParametersBuilder_
private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder,Http2ProtocolOptions.SettingsParameterOrBuilder> customSettingsParametersBuilder_
-
connectionKeepalive_
private KeepaliveSettings connectionKeepalive_
-
connectionKeepaliveBuilder_
private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder,KeepaliveSettingsOrBuilder> connectionKeepaliveBuilder_
-
useOghttp2Codec_
private com.google.protobuf.BoolValue useOghttp2Codec_
-
useOghttp2CodecBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder> useOghttp2CodecBuilder_
-
-
Method Detail
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
-
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()
- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
maybeForceBuilderInitialization
private void maybeForceBuilderInitialization()
-
clear
public Http2ProtocolOptions.Builder clear()
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
getDefaultInstanceForType
public Http2ProtocolOptions getDefaultInstanceForType()
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
public Http2ProtocolOptions build()
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
public Http2ProtocolOptions buildPartial()
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartialRepeatedFields
private void buildPartialRepeatedFields(Http2ProtocolOptions result)
-
buildPartial0
private void buildPartial0(Http2ProtocolOptions result)
-
mergeFrom
public Http2ProtocolOptions.Builder mergeFrom(com.google.protobuf.Message other)
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>
-
mergeFrom
public Http2ProtocolOptions.Builder mergeFrom(Http2ProtocolOptions other)
-
isInitialized
public final boolean isInitialized()
- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
mergeFrom
public Http2ProtocolOptions.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>
- Throws:
java.io.IOException
-
hasHpackTableSize
public boolean hasHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
hasHpackTableSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the hpackTableSize field is set.
-
getHpackTableSize
public com.google.protobuf.UInt32Value getHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
getHpackTableSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The hpackTableSize.
-
setHpackTableSize
public Http2ProtocolOptions.Builder setHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
setHpackTableSize
public Http2ProtocolOptions.Builder setHpackTableSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
mergeHpackTableSize
public Http2ProtocolOptions.Builder mergeHpackTableSize(com.google.protobuf.UInt32Value value)
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
clearHpackTableSize
public Http2ProtocolOptions.Builder clearHpackTableSize()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
getHpackTableSizeBuilder
public com.google.protobuf.UInt32Value.Builder getHpackTableSizeBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
getHpackTableSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getHpackTableSizeOrBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
getHpackTableSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getHpackTableSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getHpackTableSizeFieldBuilder()
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
hasMaxConcurrentStreams
public boolean hasMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
hasMaxConcurrentStreams
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxConcurrentStreams field is set.
-
getMaxConcurrentStreams
public com.google.protobuf.UInt32Value getMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
getMaxConcurrentStreams
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxConcurrentStreams.
-
setMaxConcurrentStreams
public Http2ProtocolOptions.Builder setMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
setMaxConcurrentStreams
public Http2ProtocolOptions.Builder setMaxConcurrentStreams(com.google.protobuf.UInt32Value.Builder builderForValue)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
mergeMaxConcurrentStreams
public Http2ProtocolOptions.Builder mergeMaxConcurrentStreams(com.google.protobuf.UInt32Value value)
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
clearMaxConcurrentStreams
public Http2ProtocolOptions.Builder clearMaxConcurrentStreams()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
getMaxConcurrentStreamsBuilder
public com.google.protobuf.UInt32Value.Builder getMaxConcurrentStreamsBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
getMaxConcurrentStreamsOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxConcurrentStreamsOrBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
getMaxConcurrentStreamsOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxConcurrentStreamsFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxConcurrentStreamsFieldBuilder()
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
hasInitialStreamWindowSize
public boolean hasInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
hasInitialStreamWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the initialStreamWindowSize field is set.
-
getInitialStreamWindowSize
public com.google.protobuf.UInt32Value getInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
getInitialStreamWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The initialStreamWindowSize.
-
setInitialStreamWindowSize
public Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
setInitialStreamWindowSize
public Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
mergeInitialStreamWindowSize
public Http2ProtocolOptions.Builder mergeInitialStreamWindowSize(com.google.protobuf.UInt32Value value)
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
clearInitialStreamWindowSize
public Http2ProtocolOptions.Builder clearInitialStreamWindowSize()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
getInitialStreamWindowSizeBuilder
public com.google.protobuf.UInt32Value.Builder getInitialStreamWindowSizeBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
getInitialStreamWindowSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getInitialStreamWindowSizeOrBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
getInitialStreamWindowSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getInitialStreamWindowSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getInitialStreamWindowSizeFieldBuilder()
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
hasInitialConnectionWindowSize
public boolean hasInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
hasInitialConnectionWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the initialConnectionWindowSize field is set.
-
getInitialConnectionWindowSize
public com.google.protobuf.UInt32Value getInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
getInitialConnectionWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The initialConnectionWindowSize.
-
setInitialConnectionWindowSize
public Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
setInitialConnectionWindowSize
public Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
mergeInitialConnectionWindowSize
public Http2ProtocolOptions.Builder mergeInitialConnectionWindowSize(com.google.protobuf.UInt32Value value)
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
clearInitialConnectionWindowSize
public Http2ProtocolOptions.Builder clearInitialConnectionWindowSize()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getInitialConnectionWindowSizeBuilder
public com.google.protobuf.UInt32Value.Builder getInitialConnectionWindowSizeBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getInitialConnectionWindowSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getInitialConnectionWindowSizeOrBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
getInitialConnectionWindowSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getInitialConnectionWindowSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getInitialConnectionWindowSizeFieldBuilder()
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getAllowConnect
public boolean getAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Specified by:
getAllowConnect
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The allowConnect.
-
setAllowConnect
public Http2ProtocolOptions.Builder setAllowConnect(boolean value)
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Parameters:
value
- The allowConnect to set.- Returns:
- This builder for chaining.
-
clearAllowConnect
public Http2ProtocolOptions.Builder clearAllowConnect()
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Returns:
- This builder for chaining.
-
getAllowMetadata
public boolean getAllowMetadata()
[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Specified by:
getAllowMetadata
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The allowMetadata.
-
setAllowMetadata
public Http2ProtocolOptions.Builder setAllowMetadata(boolean value)
[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Parameters:
value
- The allowMetadata to set.- Returns:
- This builder for chaining.
-
clearAllowMetadata
public Http2ProtocolOptions.Builder clearAllowMetadata()
[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Returns:
- This builder for chaining.
-
hasMaxOutboundFrames
public boolean hasMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
hasMaxOutboundFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxOutboundFrames field is set.
-
getMaxOutboundFrames
public com.google.protobuf.UInt32Value getMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxOutboundFrames.
-
setMaxOutboundFrames
public Http2ProtocolOptions.Builder setMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
setMaxOutboundFrames
public Http2ProtocolOptions.Builder setMaxOutboundFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
mergeMaxOutboundFrames
public Http2ProtocolOptions.Builder mergeMaxOutboundFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
clearMaxOutboundFrames
public Http2ProtocolOptions.Builder clearMaxOutboundFrames()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
getMaxOutboundFramesBuilder
public com.google.protobuf.UInt32Value.Builder getMaxOutboundFramesBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
getMaxOutboundFramesOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundFramesOrBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundFramesOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxOutboundFramesFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxOutboundFramesFieldBuilder()
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
hasMaxOutboundControlFrames
public boolean hasMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
hasMaxOutboundControlFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxOutboundControlFrames field is set.
-
getMaxOutboundControlFrames
public com.google.protobuf.UInt32Value getMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundControlFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxOutboundControlFrames.
-
setMaxOutboundControlFrames
public Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
setMaxOutboundControlFrames
public Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
mergeMaxOutboundControlFrames
public Http2ProtocolOptions.Builder mergeMaxOutboundControlFrames(com.google.protobuf.UInt32Value value)
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
clearMaxOutboundControlFrames
public Http2ProtocolOptions.Builder clearMaxOutboundControlFrames()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
getMaxOutboundControlFramesBuilder
public com.google.protobuf.UInt32Value.Builder getMaxOutboundControlFramesBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
getMaxOutboundControlFramesOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundControlFramesOrBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundControlFramesOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxOutboundControlFramesFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxOutboundControlFramesFieldBuilder()
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
hasMaxConsecutiveInboundFramesWithEmptyPayload
public boolean hasMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
hasMaxConsecutiveInboundFramesWithEmptyPayload
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxConsecutiveInboundFramesWithEmptyPayload field is set.
-
getMaxConsecutiveInboundFramesWithEmptyPayload
public com.google.protobuf.UInt32Value getMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
getMaxConsecutiveInboundFramesWithEmptyPayload
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxConsecutiveInboundFramesWithEmptyPayload.
-
setMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
setMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
mergeMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder mergeMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value)
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
clearMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder clearMaxConsecutiveInboundFramesWithEmptyPayload()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder
public com.google.protobuf.UInt32Value.Builder getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxConsecutiveInboundFramesWithEmptyPayloadFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxConsecutiveInboundFramesWithEmptyPayloadFieldBuilder()
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
hasMaxInboundPriorityFramesPerStream
public boolean hasMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
hasMaxInboundPriorityFramesPerStream
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxInboundPriorityFramesPerStream field is set.
-
getMaxInboundPriorityFramesPerStream
public com.google.protobuf.UInt32Value getMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
getMaxInboundPriorityFramesPerStream
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxInboundPriorityFramesPerStream.
-
setMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
setMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
mergeMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder mergeMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value)
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
clearMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder clearMaxInboundPriorityFramesPerStream()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
getMaxInboundPriorityFramesPerStreamBuilder
public com.google.protobuf.UInt32Value.Builder getMaxInboundPriorityFramesPerStreamBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
getMaxInboundPriorityFramesPerStreamOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundPriorityFramesPerStreamOrBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
getMaxInboundPriorityFramesPerStreamOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxInboundPriorityFramesPerStreamFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxInboundPriorityFramesPerStreamFieldBuilder()
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
hasMaxInboundWindowUpdateFramesPerDataFrameSent
public boolean hasMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
hasMaxInboundWindowUpdateFramesPerDataFrameSent
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxInboundWindowUpdateFramesPerDataFrameSent field is set.
-
getMaxInboundWindowUpdateFramesPerDataFrameSent
public com.google.protobuf.UInt32Value getMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
getMaxInboundWindowUpdateFramesPerDataFrameSent
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxInboundWindowUpdateFramesPerDataFrameSent.
-
setMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
setMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value.Builder builderForValue)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
mergeMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder mergeMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value)
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
clearMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder clearMaxInboundWindowUpdateFramesPerDataFrameSent()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder
public com.google.protobuf.UInt32Value.Builder getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxInboundWindowUpdateFramesPerDataFrameSentFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder,com.google.protobuf.UInt32ValueOrBuilder> getMaxInboundWindowUpdateFramesPerDataFrameSentFieldBuilder()
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getStreamErrorOnInvalidHttpMessaging
@Deprecated public boolean getStreamErrorOnInvalidHttpMessaging()
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Specified by:
getStreamErrorOnInvalidHttpMessaging
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The streamErrorOnInvalidHttpMessaging.
-
setStreamErrorOnInvalidHttpMessaging
@Deprecated public Http2ProtocolOptions.Builder setStreamErrorOnInvalidHttpMessaging(boolean value)
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Parameters:
value
- The streamErrorOnInvalidHttpMessaging to set.- Returns:
- This builder for chaining.
-
clearStreamErrorOnInvalidHttpMessaging
@Deprecated public Http2ProtocolOptions.Builder clearStreamErrorOnInvalidHttpMessaging()
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Returns:
- This builder for chaining.
-
hasOverrideStreamErrorOnInvalidHttpMessage
public boolean hasOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
hasOverrideStreamErrorOnInvalidHttpMessage
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the overrideStreamErrorOnInvalidHttpMessage field is set.
-
getOverrideStreamErrorOnInvalidHttpMessage
public com.google.protobuf.BoolValue getOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
getOverrideStreamErrorOnInvalidHttpMessage
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The overrideStreamErrorOnInvalidHttpMessage.
-
setOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
setOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue.Builder builderForValue)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
mergeOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder mergeOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value)
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
clearOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder clearOverrideStreamErrorOnInvalidHttpMessage()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
getOverrideStreamErrorOnInvalidHttpMessageBuilder
public com.google.protobuf.BoolValue.Builder getOverrideStreamErrorOnInvalidHttpMessageBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder
public com.google.protobuf.BoolValueOrBuilder getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getOverrideStreamErrorOnInvalidHttpMessageFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder> getOverrideStreamErrorOnInvalidHttpMessageFieldBuilder()
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
ensureCustomSettingsParametersIsMutable
private void ensureCustomSettingsParametersIsMutable()
-
getCustomSettingsParametersList
public java.util.List<Http2ProtocolOptions.SettingsParameter> getCustomSettingsParametersList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersList
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParametersCount
public int getCustomSettingsParametersCount()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersCount
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParameters
public Http2ProtocolOptions.SettingsParameter getCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParameters
in interfaceHttp2ProtocolOptionsOrBuilder
-
setCustomSettingsParameters
public Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
setCustomSettingsParameters
public Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addAllCustomSettingsParameters
public Http2ProtocolOptions.Builder addAllCustomSettingsParameters(java.lang.Iterable<? extends Http2ProtocolOptions.SettingsParameter> values)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
clearCustomSettingsParameters
public Http2ProtocolOptions.Builder clearCustomSettingsParameters()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
removeCustomSettingsParameters
public Http2ProtocolOptions.Builder removeCustomSettingsParameters(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersBuilder
public Http2ProtocolOptions.SettingsParameter.Builder getCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersOrBuilder
public Http2ProtocolOptions.SettingsParameterOrBuilder getCustomSettingsParametersOrBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParametersOrBuilderList
public java.util.List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersOrBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersOrBuilderList
in interfaceHttp2ProtocolOptionsOrBuilder
-
addCustomSettingsParametersBuilder
public Http2ProtocolOptions.SettingsParameter.Builder addCustomSettingsParametersBuilder()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParametersBuilder
public Http2ProtocolOptions.SettingsParameter.Builder addCustomSettingsParametersBuilder(int index)
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersBuilderList
public java.util.List<Http2ProtocolOptions.SettingsParameter.Builder> getCustomSettingsParametersBuilderList()
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersFieldBuilder
private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder,Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersFieldBuilder()
-
hasConnectionKeepalive
public boolean hasConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
hasConnectionKeepalive
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the connectionKeepalive field is set.
-
getConnectionKeepalive
public KeepaliveSettings getConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
getConnectionKeepalive
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The connectionKeepalive.
-
setConnectionKeepalive
public Http2ProtocolOptions.Builder setConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
setConnectionKeepalive
public Http2ProtocolOptions.Builder setConnectionKeepalive(KeepaliveSettings.Builder builderForValue)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
mergeConnectionKeepalive
public Http2ProtocolOptions.Builder mergeConnectionKeepalive(KeepaliveSettings value)
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
clearConnectionKeepalive
public Http2ProtocolOptions.Builder clearConnectionKeepalive()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
getConnectionKeepaliveBuilder
public KeepaliveSettings.Builder getConnectionKeepaliveBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
getConnectionKeepaliveOrBuilder
public KeepaliveSettingsOrBuilder getConnectionKeepaliveOrBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
getConnectionKeepaliveOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getConnectionKeepaliveFieldBuilder
private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder,KeepaliveSettingsOrBuilder> getConnectionKeepaliveFieldBuilder()
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
hasUseOghttp2Codec
public boolean hasUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
hasUseOghttp2Codec
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the useOghttp2Codec field is set.
-
getUseOghttp2Codec
public com.google.protobuf.BoolValue getUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
getUseOghttp2Codec
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The useOghttp2Codec.
-
setUseOghttp2Codec
public Http2ProtocolOptions.Builder setUseOghttp2Codec(com.google.protobuf.BoolValue value)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
setUseOghttp2Codec
public Http2ProtocolOptions.Builder setUseOghttp2Codec(com.google.protobuf.BoolValue.Builder builderForValue)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
mergeUseOghttp2Codec
public Http2ProtocolOptions.Builder mergeUseOghttp2Codec(com.google.protobuf.BoolValue value)
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
clearUseOghttp2Codec
public Http2ProtocolOptions.Builder clearUseOghttp2Codec()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
getUseOghttp2CodecBuilder
public com.google.protobuf.BoolValue.Builder getUseOghttp2CodecBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
getUseOghttp2CodecOrBuilder
public com.google.protobuf.BoolValueOrBuilder getUseOghttp2CodecOrBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
getUseOghttp2CodecOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getUseOghttp2CodecFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder,com.google.protobuf.BoolValueOrBuilder> getUseOghttp2CodecFieldBuilder()
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
-