Class Http2ProtocolOptions.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>
com.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
io.envoyproxy.envoy.config.core.v3.Http2ProtocolOptions.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,Http2ProtocolOptionsOrBuilder
,Cloneable
- Enclosing class:
Http2ProtocolOptions
public static final class Http2ProtocolOptions.Builder
extends com.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
implements Http2ProtocolOptionsOrBuilder
[#next-free-field: 17]Protobuf type
envoy.config.core.v3.Http2ProtocolOptions
-
Field Summary
FieldsModifier and TypeFieldDescriptionprivate boolean
private boolean
private int
private KeepaliveSettings
private com.google.protobuf.SingleFieldBuilder
<KeepaliveSettings, KeepaliveSettings.Builder, KeepaliveSettingsOrBuilder> private com.google.protobuf.RepeatedFieldBuilder
<Http2ProtocolOptions.SettingsParameter, Http2ProtocolOptions.SettingsParameter.Builder, Http2ProtocolOptions.SettingsParameterOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.UInt32Value
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> private com.google.protobuf.BoolValue
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> private boolean
private com.google.protobuf.BoolValue
private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionaddAllCustomSettingsParameters
(Iterable<? extends Http2ProtocolOptions.SettingsParameter> values) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.addCustomSettingsParameters
(int index, Http2ProtocolOptions.SettingsParameter value) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.addCustomSettingsParameters
(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.addCustomSettingsParametersBuilder
(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.build()
private void
buildPartial0
(Http2ProtocolOptions result) private void
clear()
Allows proxying Websocket and other upgrades over H2 connect.[#not-implemented-hide:] Hiding until Envoy has full metadata support.Send HTTP/2 PING frames to verify that the connection is still healthy.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.Similar to ``initial_stream_window_size``, but for connection-level flow-control window.`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.Limit the number of inbound PRIORITY frames allowed per each opened stream.Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).Allows invalid HTTP messaging and headers.Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.private void
boolean
Allows proxying Websocket and other upgrades over H2 connect.boolean
[#not-implemented-hide:] Hiding until Envoy has full metadata support.Send HTTP/2 PING frames to verify that the connection is still healthy.Send HTTP/2 PING frames to verify that the connection is still healthy.private com.google.protobuf.SingleFieldBuilder
<KeepaliveSettings, KeepaliveSettings.Builder, KeepaliveSettingsOrBuilder> Send HTTP/2 PING frames to verify that the connection is still healthy.Send HTTP/2 PING frames to verify that the connection is still healthy.getCustomSettingsParameters
(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.getCustomSettingsParametersBuilder
(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.int
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.private com.google.protobuf.RepeatedFieldBuilder
<Http2ProtocolOptions.SettingsParameter, Http2ProtocolOptions.SettingsParameter.Builder, Http2ProtocolOptions.SettingsParameterOrBuilder> [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.getCustomSettingsParametersOrBuilder
(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.UInt32Value
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32Value.Builder
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32ValueOrBuilder
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.com.google.protobuf.UInt32Value
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32Value.Builder
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32ValueOrBuilder
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.com.google.protobuf.UInt32Value
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32Value.Builder
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32ValueOrBuilder
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.com.google.protobuf.UInt32Value
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32Value.Builder
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32ValueOrBuilder
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.com.google.protobuf.UInt32Value
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32Value.Builder
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32ValueOrBuilder
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.com.google.protobuf.UInt32Value
Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32Value.Builder
Limit the number of inbound PRIORITY frames allowed per each opened stream.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32ValueOrBuilder
Limit the number of inbound PRIORITY frames allowed per each opened stream.com.google.protobuf.UInt32Value
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32Value.Builder
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32ValueOrBuilder
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.com.google.protobuf.UInt32Value
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32Value.Builder
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32ValueOrBuilder
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.com.google.protobuf.UInt32Value
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.UInt32Value.Builder
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.UInt32Value, com.google.protobuf.UInt32Value.Builder, com.google.protobuf.UInt32ValueOrBuilder> Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.UInt32ValueOrBuilder
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).com.google.protobuf.BoolValue
Allows invalid HTTP messaging and headers.com.google.protobuf.BoolValue.Builder
Allows invalid HTTP messaging and headers.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> Allows invalid HTTP messaging and headers.com.google.protobuf.BoolValueOrBuilder
Allows invalid HTTP messaging and headers.boolean
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.com.google.protobuf.BoolValue
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.com.google.protobuf.BoolValue.Builder
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.private com.google.protobuf.SingleFieldBuilder
<com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.com.google.protobuf.BoolValueOrBuilder
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.boolean
Send HTTP/2 PING frames to verify that the connection is still healthy.boolean
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.boolean
Similar to ``initial_stream_window_size``, but for connection-level flow-control window.boolean
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.boolean
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.boolean
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.boolean
Limit the number of inbound PRIORITY frames allowed per each opened stream.boolean
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.boolean
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.boolean
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).boolean
Allows invalid HTTP messaging and headers.boolean
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
final boolean
private void
Send HTTP/2 PING frames to verify that the connection is still healthy.mergeFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom
(com.google.protobuf.Message other) mergeFrom
(Http2ProtocolOptions other) mergeHpackTableSize
(com.google.protobuf.UInt32Value value) `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.mergeInitialConnectionWindowSize
(com.google.protobuf.UInt32Value value) Similar to ``initial_stream_window_size``, but for connection-level flow-control window.mergeInitialStreamWindowSize
(com.google.protobuf.UInt32Value value) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.mergeMaxConcurrentStreams
(com.google.protobuf.UInt32Value value) `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.mergeMaxConsecutiveInboundFramesWithEmptyPayload
(com.google.protobuf.UInt32Value value) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.mergeMaxInboundPriorityFramesPerStream
(com.google.protobuf.UInt32Value value) Limit the number of inbound PRIORITY frames allowed per each opened stream.mergeMaxInboundWindowUpdateFramesPerDataFrameSent
(com.google.protobuf.UInt32Value value) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.mergeMaxOutboundControlFrames
(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.mergeMaxOutboundFrames
(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).mergeOverrideStreamErrorOnInvalidHttpMessage
(com.google.protobuf.BoolValue value) Allows invalid HTTP messaging and headers.mergeUseOghttp2Codec
(com.google.protobuf.BoolValue value) [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.removeCustomSettingsParameters
(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.setAllowConnect
(boolean value) Allows proxying Websocket and other upgrades over H2 connect.setAllowMetadata
(boolean value) [#not-implemented-hide:] Hiding until Envoy has full metadata support.Send HTTP/2 PING frames to verify that the connection is still healthy.setConnectionKeepalive
(KeepaliveSettings.Builder builderForValue) Send HTTP/2 PING frames to verify that the connection is still healthy.setCustomSettingsParameters
(int index, Http2ProtocolOptions.SettingsParameter value) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.setCustomSettingsParameters
(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1.setHpackTableSize
(com.google.protobuf.UInt32Value value) `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.setHpackTableSize
(com.google.protobuf.UInt32Value.Builder builderForValue) `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table.setInitialConnectionWindowSize
(com.google.protobuf.UInt32Value value) Similar to ``initial_stream_window_size``, but for connection-level flow-control window.setInitialConnectionWindowSize
(com.google.protobuf.UInt32Value.Builder builderForValue) Similar to ``initial_stream_window_size``, but for connection-level flow-control window.setInitialStreamWindowSize
(com.google.protobuf.UInt32Value value) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.setInitialStreamWindowSize
(com.google.protobuf.UInt32Value.Builder builderForValue) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size.setMaxConcurrentStreams
(com.google.protobuf.UInt32Value value) `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.setMaxConcurrentStreams
(com.google.protobuf.UInt32Value.Builder builderForValue) `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection.setMaxConsecutiveInboundFramesWithEmptyPayload
(com.google.protobuf.UInt32Value value) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.setMaxConsecutiveInboundFramesWithEmptyPayload
(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag.setMaxInboundPriorityFramesPerStream
(com.google.protobuf.UInt32Value value) Limit the number of inbound PRIORITY frames allowed per each opened stream.setMaxInboundPriorityFramesPerStream
(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of inbound PRIORITY frames allowed per each opened stream.setMaxInboundWindowUpdateFramesPerDataFrameSent
(com.google.protobuf.UInt32Value value) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.setMaxInboundWindowUpdateFramesPerDataFrameSent
(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent.setMaxOutboundControlFrames
(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.setMaxOutboundControlFrames
(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames.setMaxOutboundFrames
(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).setMaxOutboundFrames
(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket).setOverrideStreamErrorOnInvalidHttpMessage
(com.google.protobuf.BoolValue value) Allows invalid HTTP messaging and headers.setOverrideStreamErrorOnInvalidHttpMessage
(com.google.protobuf.BoolValue.Builder builderForValue) Allows invalid HTTP messaging and headers.setStreamErrorOnInvalidHttpMessaging
(boolean value) Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated.setUseOghttp2Codec
(com.google.protobuf.BoolValue value) [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.setUseOghttp2Codec
(com.google.protobuf.BoolValue.Builder builderForValue) [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out.Methods inherited from class com.google.protobuf.GeneratedMessage.Builder
addRepeatedField, clearField, clearOneof, clone, getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMapFieldReflection, internalGetMutableMapField, internalGetMutableMapFieldReflection, isClean, markClean, mergeUnknownFields, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setField, setRepeatedField, setUnknownFields, setUnknownFieldSetBuilder, setUnknownFieldsProto3
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFrom
Methods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFrom
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Field Details
-
bitField0_
private int bitField0_ -
hpackTableSize_
private com.google.protobuf.UInt32Value hpackTableSize_ -
hpackTableSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, hpackTableSizeBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
maxConcurrentStreams_
private com.google.protobuf.UInt32Value maxConcurrentStreams_ -
maxConcurrentStreamsBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxConcurrentStreamsBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
initialStreamWindowSize_
private com.google.protobuf.UInt32Value initialStreamWindowSize_ -
initialStreamWindowSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, initialStreamWindowSizeBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
initialConnectionWindowSize_
private com.google.protobuf.UInt32Value initialConnectionWindowSize_ -
initialConnectionWindowSizeBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, initialConnectionWindowSizeBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
allowConnect_
private boolean allowConnect_ -
allowMetadata_
private boolean allowMetadata_ -
maxOutboundFrames_
private com.google.protobuf.UInt32Value maxOutboundFrames_ -
maxOutboundFramesBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxOutboundFramesBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
maxOutboundControlFrames_
private com.google.protobuf.UInt32Value maxOutboundControlFrames_ -
maxOutboundControlFramesBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxOutboundControlFramesBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
maxConsecutiveInboundFramesWithEmptyPayload_
private com.google.protobuf.UInt32Value maxConsecutiveInboundFramesWithEmptyPayload_ -
maxConsecutiveInboundFramesWithEmptyPayloadBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxConsecutiveInboundFramesWithEmptyPayloadBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
maxInboundPriorityFramesPerStream_
private com.google.protobuf.UInt32Value maxInboundPriorityFramesPerStream_ -
maxInboundPriorityFramesPerStreamBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxInboundPriorityFramesPerStreamBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
maxInboundWindowUpdateFramesPerDataFrameSent_
private com.google.protobuf.UInt32Value maxInboundWindowUpdateFramesPerDataFrameSent_ -
maxInboundWindowUpdateFramesPerDataFrameSentBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, maxInboundWindowUpdateFramesPerDataFrameSentBuilder_com.google.protobuf.UInt32ValueOrBuilder> -
streamErrorOnInvalidHttpMessaging_
private boolean streamErrorOnInvalidHttpMessaging_ -
overrideStreamErrorOnInvalidHttpMessage_
private com.google.protobuf.BoolValue overrideStreamErrorOnInvalidHttpMessage_ -
overrideStreamErrorOnInvalidHttpMessageBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder, overrideStreamErrorOnInvalidHttpMessageBuilder_com.google.protobuf.BoolValueOrBuilder> -
customSettingsParameters_
-
customSettingsParametersBuilder_
private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder, customSettingsParametersBuilder_Http2ProtocolOptions.SettingsParameterOrBuilder> -
connectionKeepalive_
-
connectionKeepaliveBuilder_
private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder, connectionKeepaliveBuilder_KeepaliveSettingsOrBuilder> -
useOghttp2Codec_
private com.google.protobuf.BoolValue useOghttp2Codec_ -
useOghttp2CodecBuilder_
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder, useOghttp2CodecBuilder_com.google.protobuf.BoolValueOrBuilder>
-
-
Constructor Details
-
Builder
private Builder() -
Builder
private Builder(com.google.protobuf.AbstractMessage.BuilderParent parent)
-
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
maybeForceBuilderInitialization
private void maybeForceBuilderInitialization() -
clear
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartialRepeatedFields
-
buildPartial0
-
mergeFrom
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessage.Builder<Http2ProtocolOptions.Builder>
-
mergeFrom
public Http2ProtocolOptions.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<Http2ProtocolOptions.Builder>
- Throws:
IOException
-
hasHpackTableSize
public boolean hasHpackTableSize()`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
hasHpackTableSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the hpackTableSize field is set.
-
getHpackTableSize
public com.google.protobuf.UInt32Value getHpackTableSize()`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
getHpackTableSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The hpackTableSize.
-
setHpackTableSize
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
setHpackTableSize
public Http2ProtocolOptions.Builder setHpackTableSize(com.google.protobuf.UInt32Value.Builder builderForValue) `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
mergeHpackTableSize
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
clearHpackTableSize
`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
getHpackTableSizeBuilder
public com.google.protobuf.UInt32Value.Builder getHpackTableSizeBuilder()`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
getHpackTableSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getHpackTableSizeOrBuilder()`Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
- Specified by:
getHpackTableSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getHpackTableSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getHpackTableSizeFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> `Maximum table size <https://httpwg.org/specs/rfc7541.html#rfc.section.4.2>`_ (in octets) that the encoder is permitted to use for the dynamic HPACK table. Valid values range from 0 to 4294967295 (2^32 - 1) and defaults to 4096. 0 effectively disables header compression.
.google.protobuf.UInt32Value hpack_table_size = 1;
-
hasMaxConcurrentStreams
public boolean hasMaxConcurrentStreams()`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
hasMaxConcurrentStreams
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxConcurrentStreams field is set.
-
getMaxConcurrentStreams
public com.google.protobuf.UInt32Value getMaxConcurrentStreams()`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
getMaxConcurrentStreams
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxConcurrentStreams.
-
setMaxConcurrentStreams
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
setMaxConcurrentStreams
public Http2ProtocolOptions.Builder setMaxConcurrentStreams(com.google.protobuf.UInt32Value.Builder builderForValue) `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
mergeMaxConcurrentStreams
public Http2ProtocolOptions.Builder mergeMaxConcurrentStreams(com.google.protobuf.UInt32Value value) `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
clearMaxConcurrentStreams
`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
getMaxConcurrentStreamsBuilder
public com.google.protobuf.UInt32Value.Builder getMaxConcurrentStreamsBuilder()`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
getMaxConcurrentStreamsOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxConcurrentStreamsOrBuilder()`Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
- Specified by:
getMaxConcurrentStreamsOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxConcurrentStreamsFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxConcurrentStreamsFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> `Maximum concurrent streams <https://httpwg.org/specs/rfc7540.html#rfc.section.5.1.2>`_ allowed for peer on one HTTP/2 connection. Valid values range from 1 to 2147483647 (2^31 - 1) and defaults to 2147483647. For upstream connections, this also limits how many streams Envoy will initiate concurrently on a single connection. If the limit is reached, Envoy may queue requests or establish additional connections (as allowed per circuit breaker limits). This acts as an upper bound: Envoy will lower the max concurrent streams allowed on a given connection based on upstream settings. Config dumps will reflect the configured upper bound, not the per-connection negotiated limits.
.google.protobuf.UInt32Value max_concurrent_streams = 2 [(.validate.rules) = { ... }
-
hasInitialStreamWindowSize
public boolean hasInitialStreamWindowSize()`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
hasInitialStreamWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the initialStreamWindowSize field is set.
-
getInitialStreamWindowSize
public com.google.protobuf.UInt32Value getInitialStreamWindowSize()`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
getInitialStreamWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The initialStreamWindowSize.
-
setInitialStreamWindowSize
public Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value value) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
setInitialStreamWindowSize
public Http2ProtocolOptions.Builder setInitialStreamWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
mergeInitialStreamWindowSize
public Http2ProtocolOptions.Builder mergeInitialStreamWindowSize(com.google.protobuf.UInt32Value value) `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
clearInitialStreamWindowSize
`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
getInitialStreamWindowSizeBuilder
public com.google.protobuf.UInt32Value.Builder getInitialStreamWindowSizeBuilder()`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
getInitialStreamWindowSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getInitialStreamWindowSizeOrBuilder()`Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
- Specified by:
getInitialStreamWindowSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getInitialStreamWindowSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getInitialStreamWindowSizeFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> `Initial stream-level flow-control window <https://httpwg.org/specs/rfc7540.html#rfc.section.6.9.2>`_ size. Valid values range from 65535 (2^16 - 1, HTTP/2 default) to 2147483647 (2^31 - 1, HTTP/2 maximum) and defaults to 268435456 (256 * 1024 * 1024). NOTE: 65535 is the initial window size from HTTP/2 spec. We only support increasing the default window size now, so it's also the minimum. This field also acts as a soft limit on the number of bytes Envoy will buffer per-stream in the HTTP/2 codec buffers. Once the buffer reaches this pointer, watermark callbacks will fire to stop the flow of data to the codec buffers.
.google.protobuf.UInt32Value initial_stream_window_size = 3 [(.validate.rules) = { ... }
-
hasInitialConnectionWindowSize
public boolean hasInitialConnectionWindowSize()Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
hasInitialConnectionWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the initialConnectionWindowSize field is set.
-
getInitialConnectionWindowSize
public com.google.protobuf.UInt32Value getInitialConnectionWindowSize()Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
getInitialConnectionWindowSize
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The initialConnectionWindowSize.
-
setInitialConnectionWindowSize
public Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value value) Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
setInitialConnectionWindowSize
public Http2ProtocolOptions.Builder setInitialConnectionWindowSize(com.google.protobuf.UInt32Value.Builder builderForValue) Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
mergeInitialConnectionWindowSize
public Http2ProtocolOptions.Builder mergeInitialConnectionWindowSize(com.google.protobuf.UInt32Value value) Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
clearInitialConnectionWindowSize
Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getInitialConnectionWindowSizeBuilder
public com.google.protobuf.UInt32Value.Builder getInitialConnectionWindowSizeBuilder()Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getInitialConnectionWindowSizeOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getInitialConnectionWindowSizeOrBuilder()Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
- Specified by:
getInitialConnectionWindowSizeOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getInitialConnectionWindowSizeFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getInitialConnectionWindowSizeFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Similar to ``initial_stream_window_size``, but for connection-level flow-control window. Currently, this has the same minimum/maximum/default as ``initial_stream_window_size``.
.google.protobuf.UInt32Value initial_connection_window_size = 4 [(.validate.rules) = { ... }
-
getAllowConnect
public boolean getAllowConnect()Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Specified by:
getAllowConnect
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The allowConnect.
-
setAllowConnect
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Parameters:
value
- The allowConnect to set.- Returns:
- This builder for chaining.
-
clearAllowConnect
Allows proxying Websocket and other upgrades over H2 connect.
bool allow_connect = 5;
- Returns:
- This builder for chaining.
-
getAllowMetadata
public boolean getAllowMetadata()[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Specified by:
getAllowMetadata
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The allowMetadata.
-
setAllowMetadata
[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Parameters:
value
- The allowMetadata to set.- Returns:
- This builder for chaining.
-
clearAllowMetadata
[#not-implemented-hide:] Hiding until Envoy has full metadata support. Still under implementation. DO NOT USE. Allows sending and receiving HTTP/2 METADATA frames. See [metadata docs](https://github.com/envoyproxy/envoy/blob/main/source/docs/h2_metadata.md) for more information.
bool allow_metadata = 6;
- Returns:
- This builder for chaining.
-
hasMaxOutboundFrames
public boolean hasMaxOutboundFrames()Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
hasMaxOutboundFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxOutboundFrames field is set.
-
getMaxOutboundFrames
public com.google.protobuf.UInt32Value getMaxOutboundFrames()Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxOutboundFrames.
-
setMaxOutboundFrames
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
setMaxOutboundFrames
public Http2ProtocolOptions.Builder setMaxOutboundFrames(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
mergeMaxOutboundFrames
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
clearMaxOutboundFrames
Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
getMaxOutboundFramesBuilder
public com.google.protobuf.UInt32Value.Builder getMaxOutboundFramesBuilder()Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
getMaxOutboundFramesOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundFramesOrBuilder()Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundFramesOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxOutboundFramesFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxOutboundFramesFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Limit the number of pending outbound downstream frames of all types (frames that are waiting to be written into the socket). Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 10000.
.google.protobuf.UInt32Value max_outbound_frames = 7 [(.validate.rules) = { ... }
-
hasMaxOutboundControlFrames
public boolean hasMaxOutboundControlFrames()Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
hasMaxOutboundControlFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxOutboundControlFrames field is set.
-
getMaxOutboundControlFrames
public com.google.protobuf.UInt32Value getMaxOutboundControlFrames()Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundControlFrames
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxOutboundControlFrames.
-
setMaxOutboundControlFrames
public Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
setMaxOutboundControlFrames
public Http2ProtocolOptions.Builder setMaxOutboundControlFrames(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
mergeMaxOutboundControlFrames
public Http2ProtocolOptions.Builder mergeMaxOutboundControlFrames(com.google.protobuf.UInt32Value value) Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
clearMaxOutboundControlFrames
Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
getMaxOutboundControlFramesBuilder
public com.google.protobuf.UInt32Value.Builder getMaxOutboundControlFramesBuilder()Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
getMaxOutboundControlFramesOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxOutboundControlFramesOrBuilder()Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
- Specified by:
getMaxOutboundControlFramesOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxOutboundControlFramesFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxOutboundControlFramesFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Limit the number of pending outbound downstream frames of types PING, SETTINGS and RST_STREAM, preventing high memory utilization when receiving continuous stream of these frames. Exceeding this limit triggers flood mitigation and connection is terminated. The ``http2.outbound_control_flood`` stat tracks the number of terminated connections due to flood mitigation. The default limit is 1000.
.google.protobuf.UInt32Value max_outbound_control_frames = 8 [(.validate.rules) = { ... }
-
hasMaxConsecutiveInboundFramesWithEmptyPayload
public boolean hasMaxConsecutiveInboundFramesWithEmptyPayload()Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
hasMaxConsecutiveInboundFramesWithEmptyPayload
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxConsecutiveInboundFramesWithEmptyPayload field is set.
-
getMaxConsecutiveInboundFramesWithEmptyPayload
public com.google.protobuf.UInt32Value getMaxConsecutiveInboundFramesWithEmptyPayload()Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
getMaxConsecutiveInboundFramesWithEmptyPayload
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxConsecutiveInboundFramesWithEmptyPayload.
-
setMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
setMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder setMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
mergeMaxConsecutiveInboundFramesWithEmptyPayload
public Http2ProtocolOptions.Builder mergeMaxConsecutiveInboundFramesWithEmptyPayload(com.google.protobuf.UInt32Value value) Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
clearMaxConsecutiveInboundFramesWithEmptyPayload
Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder
public com.google.protobuf.UInt32Value.Builder getMaxConsecutiveInboundFramesWithEmptyPayloadBuilder()Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder()Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
- Specified by:
getMaxConsecutiveInboundFramesWithEmptyPayloadOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxConsecutiveInboundFramesWithEmptyPayloadFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxConsecutiveInboundFramesWithEmptyPayloadFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Limit the number of consecutive inbound frames of types HEADERS, CONTINUATION and DATA with an empty payload and no end stream flag. Those frames have no legitimate use and are abusive, but might be a result of a broken HTTP/2 implementation. The `http2.inbound_empty_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. Setting this to 0 will terminate connection upon receiving first frame with an empty payload and no end stream flag. The default limit is 1.
.google.protobuf.UInt32Value max_consecutive_inbound_frames_with_empty_payload = 9;
-
hasMaxInboundPriorityFramesPerStream
public boolean hasMaxInboundPriorityFramesPerStream()Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
hasMaxInboundPriorityFramesPerStream
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxInboundPriorityFramesPerStream field is set.
-
getMaxInboundPriorityFramesPerStream
public com.google.protobuf.UInt32Value getMaxInboundPriorityFramesPerStream()Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
getMaxInboundPriorityFramesPerStream
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxInboundPriorityFramesPerStream.
-
setMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value) Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
setMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder setMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
mergeMaxInboundPriorityFramesPerStream
public Http2ProtocolOptions.Builder mergeMaxInboundPriorityFramesPerStream(com.google.protobuf.UInt32Value value) Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
clearMaxInboundPriorityFramesPerStream
Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
getMaxInboundPriorityFramesPerStreamBuilder
public com.google.protobuf.UInt32Value.Builder getMaxInboundPriorityFramesPerStreamBuilder()Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
getMaxInboundPriorityFramesPerStreamOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundPriorityFramesPerStreamOrBuilder()Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
- Specified by:
getMaxInboundPriorityFramesPerStreamOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxInboundPriorityFramesPerStreamFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxInboundPriorityFramesPerStreamFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Limit the number of inbound PRIORITY frames allowed per each opened stream. If the number of PRIORITY frames received over the lifetime of connection exceeds the value calculated using this formula:: ``max_inbound_priority_frames_per_stream`` * (1 + ``opened_streams``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connection the ``opened_streams`` is incremented when Envoy send the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default limit is 100.
.google.protobuf.UInt32Value max_inbound_priority_frames_per_stream = 10;
-
hasMaxInboundWindowUpdateFramesPerDataFrameSent
public boolean hasMaxInboundWindowUpdateFramesPerDataFrameSent()Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
hasMaxInboundWindowUpdateFramesPerDataFrameSent
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the maxInboundWindowUpdateFramesPerDataFrameSent field is set.
-
getMaxInboundWindowUpdateFramesPerDataFrameSent
public com.google.protobuf.UInt32Value getMaxInboundWindowUpdateFramesPerDataFrameSent()Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
getMaxInboundWindowUpdateFramesPerDataFrameSent
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The maxInboundWindowUpdateFramesPerDataFrameSent.
-
setMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
setMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder setMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value.Builder builderForValue) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
mergeMaxInboundWindowUpdateFramesPerDataFrameSent
public Http2ProtocolOptions.Builder mergeMaxInboundWindowUpdateFramesPerDataFrameSent(com.google.protobuf.UInt32Value value) Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
clearMaxInboundWindowUpdateFramesPerDataFrameSent
Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder
public com.google.protobuf.UInt32Value.Builder getMaxInboundWindowUpdateFramesPerDataFrameSentBuilder()Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder
public com.google.protobuf.UInt32ValueOrBuilder getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder()Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
- Specified by:
getMaxInboundWindowUpdateFramesPerDataFrameSentOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getMaxInboundWindowUpdateFramesPerDataFrameSentFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.UInt32Value,com.google.protobuf.UInt32Value.Builder, getMaxInboundWindowUpdateFramesPerDataFrameSentFieldBuilder()com.google.protobuf.UInt32ValueOrBuilder> Limit the number of inbound WINDOW_UPDATE frames allowed per DATA frame sent. If the number of WINDOW_UPDATE frames received over the lifetime of connection exceeds the value calculated using this formula:: 5 + 2 * (``opened_streams`` + ``max_inbound_window_update_frames_per_data_frame_sent`` * ``outbound_data_frames``) the connection is terminated. For downstream connections the ``opened_streams`` is incremented when Envoy receives complete response headers from the upstream server. For upstream connections the ``opened_streams`` is incremented when Envoy sends the HEADERS frame for a new stream. The ``http2.inbound_priority_frames_flood`` stat tracks the number of connections terminated due to flood mitigation. The default max_inbound_window_update_frames_per_data_frame_sent value is 10. Setting this to 1 should be enough to support HTTP/2 implementations with basic flow control, but more complex implementations that try to estimate available bandwidth require at least 2.
.google.protobuf.UInt32Value max_inbound_window_update_frames_per_data_frame_sent = 11 [(.validate.rules) = { ... }
-
getStreamErrorOnInvalidHttpMessaging
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Specified by:
getStreamErrorOnInvalidHttpMessaging
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The streamErrorOnInvalidHttpMessaging.
-
setStreamErrorOnInvalidHttpMessaging
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Parameters:
value
- The streamErrorOnInvalidHttpMessaging to set.- Returns:
- This builder for chaining.
-
clearStreamErrorOnInvalidHttpMessaging
Deprecated.envoy.config.core.v3.Http2ProtocolOptions.stream_error_on_invalid_http_messaging is deprecated. See envoy/config/core/v3/protocol.proto;l=559Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This is overridden by HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` iff present. This is deprecated in favor of :ref:`override_stream_error_on_invalid_http_message <envoy_v3_api_field_config.core.v3.Http2ProtocolOptions.override_stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
bool stream_error_on_invalid_http_messaging = 12 [deprecated = true, (.envoy.annotations.deprecated_at_minor_version) = "3.0"];
- Returns:
- This builder for chaining.
-
hasOverrideStreamErrorOnInvalidHttpMessage
public boolean hasOverrideStreamErrorOnInvalidHttpMessage()Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
hasOverrideStreamErrorOnInvalidHttpMessage
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the overrideStreamErrorOnInvalidHttpMessage field is set.
-
getOverrideStreamErrorOnInvalidHttpMessage
public com.google.protobuf.BoolValue getOverrideStreamErrorOnInvalidHttpMessage()Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
getOverrideStreamErrorOnInvalidHttpMessage
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The overrideStreamErrorOnInvalidHttpMessage.
-
setOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value) Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
setOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder setOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue.Builder builderForValue) Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
mergeOverrideStreamErrorOnInvalidHttpMessage
public Http2ProtocolOptions.Builder mergeOverrideStreamErrorOnInvalidHttpMessage(com.google.protobuf.BoolValue value) Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
clearOverrideStreamErrorOnInvalidHttpMessage
Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
getOverrideStreamErrorOnInvalidHttpMessageBuilder
public com.google.protobuf.BoolValue.Builder getOverrideStreamErrorOnInvalidHttpMessageBuilder()Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder
public com.google.protobuf.BoolValueOrBuilder getOverrideStreamErrorOnInvalidHttpMessageOrBuilder()Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
- Specified by:
getOverrideStreamErrorOnInvalidHttpMessageOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getOverrideStreamErrorOnInvalidHttpMessageFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder, getOverrideStreamErrorOnInvalidHttpMessageFieldBuilder()com.google.protobuf.BoolValueOrBuilder> Allows invalid HTTP messaging and headers. When this option is disabled (default), then the whole HTTP/2 connection is terminated upon receiving invalid HEADERS frame. However, when this option is enabled, only the offending stream is terminated. This overrides any HCM :ref:`stream_error_on_invalid_http_messaging <envoy_v3_api_field_extensions.filters.network.http_connection_manager.v3.HttpConnectionManager.stream_error_on_invalid_http_message>` See `RFC7540, sec. 8.1 <https://tools.ietf.org/html/rfc7540#section-8.1>`_ for details.
.google.protobuf.BoolValue override_stream_error_on_invalid_http_message = 14;
-
ensureCustomSettingsParametersIsMutable
private void ensureCustomSettingsParametersIsMutable() -
getCustomSettingsParametersList
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersList
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParametersCount
public int getCustomSettingsParametersCount()[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersCount
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParameters
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParameters
in interfaceHttp2ProtocolOptionsOrBuilder
-
setCustomSettingsParameters
public Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
setCustomSettingsParameters
public Http2ProtocolOptions.Builder setCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter value) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter value) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(Http2ProtocolOptions.SettingsParameter.Builder builderForValue) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParameters
public Http2ProtocolOptions.Builder addCustomSettingsParameters(int index, Http2ProtocolOptions.SettingsParameter.Builder builderForValue) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addAllCustomSettingsParameters
public Http2ProtocolOptions.Builder addAllCustomSettingsParameters(Iterable<? extends Http2ProtocolOptions.SettingsParameter> values) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
clearCustomSettingsParameters
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
removeCustomSettingsParameters
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersBuilder
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersOrBuilder
public Http2ProtocolOptions.SettingsParameterOrBuilder getCustomSettingsParametersOrBuilder(int index) [#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getCustomSettingsParametersOrBuilderList
public List<? extends Http2ProtocolOptions.SettingsParameterOrBuilder> getCustomSettingsParametersOrBuilderList()[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
- Specified by:
getCustomSettingsParametersOrBuilderList
in interfaceHttp2ProtocolOptionsOrBuilder
-
addCustomSettingsParametersBuilder
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
addCustomSettingsParametersBuilder
[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersBuilderList
public List<Http2ProtocolOptions.SettingsParameter.Builder> getCustomSettingsParametersBuilderList()[#not-implemented-hide:] Specifies SETTINGS frame parameters to be sent to the peer, with two exceptions: 1. SETTINGS_ENABLE_PUSH (0x2) is not configurable as HTTP/2 server push is not supported by Envoy. 2. SETTINGS_ENABLE_CONNECT_PROTOCOL (0x8) is only configurable through the named field 'allow_connect'. Note that custom parameters specified through this field can not also be set in the corresponding named parameters: .. code-block:: text ID Field Name ---------------- 0x1 hpack_table_size 0x3 max_concurrent_streams 0x4 initial_stream_window_size Collisions will trigger config validation failure on load/update. Likewise, inconsistencies between custom parameters with the same identifier will trigger a failure. See `IANA HTTP/2 Settings <https://www.iana.org/assignments/http2-parameters/http2-parameters.xhtml#settings>`_ for standardized identifiers.
repeated .envoy.config.core.v3.Http2ProtocolOptions.SettingsParameter custom_settings_parameters = 13;
-
getCustomSettingsParametersFieldBuilder
private com.google.protobuf.RepeatedFieldBuilder<Http2ProtocolOptions.SettingsParameter,Http2ProtocolOptions.SettingsParameter.Builder, getCustomSettingsParametersFieldBuilder()Http2ProtocolOptions.SettingsParameterOrBuilder> -
hasConnectionKeepalive
public boolean hasConnectionKeepalive()Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
hasConnectionKeepalive
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the connectionKeepalive field is set.
-
getConnectionKeepalive
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
getConnectionKeepalive
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The connectionKeepalive.
-
setConnectionKeepalive
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
setConnectionKeepalive
public Http2ProtocolOptions.Builder setConnectionKeepalive(KeepaliveSettings.Builder builderForValue) Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
mergeConnectionKeepalive
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
clearConnectionKeepalive
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
getConnectionKeepaliveBuilder
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
getConnectionKeepaliveOrBuilder
Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
- Specified by:
getConnectionKeepaliveOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getConnectionKeepaliveFieldBuilder
private com.google.protobuf.SingleFieldBuilder<KeepaliveSettings,KeepaliveSettings.Builder, getConnectionKeepaliveFieldBuilder()KeepaliveSettingsOrBuilder> Send HTTP/2 PING frames to verify that the connection is still healthy. If the remote peer does not respond within the configured timeout, the connection will be aborted.
.envoy.config.core.v3.KeepaliveSettings connection_keepalive = 15;
-
hasUseOghttp2Codec
public boolean hasUseOghttp2Codec()[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
hasUseOghttp2Codec
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- Whether the useOghttp2Codec field is set.
-
getUseOghttp2Codec
public com.google.protobuf.BoolValue getUseOghttp2Codec()[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
getUseOghttp2Codec
in interfaceHttp2ProtocolOptionsOrBuilder
- Returns:
- The useOghttp2Codec.
-
setUseOghttp2Codec
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
setUseOghttp2Codec
public Http2ProtocolOptions.Builder setUseOghttp2Codec(com.google.protobuf.BoolValue.Builder builderForValue) [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
mergeUseOghttp2Codec
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
clearUseOghttp2Codec
[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
getUseOghttp2CodecBuilder
public com.google.protobuf.BoolValue.Builder getUseOghttp2CodecBuilder()[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-
getUseOghttp2CodecOrBuilder
public com.google.protobuf.BoolValueOrBuilder getUseOghttp2CodecOrBuilder()[#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
- Specified by:
getUseOghttp2CodecOrBuilder
in interfaceHttp2ProtocolOptionsOrBuilder
-
getUseOghttp2CodecFieldBuilder
private com.google.protobuf.SingleFieldBuilder<com.google.protobuf.BoolValue,com.google.protobuf.BoolValue.Builder, getUseOghttp2CodecFieldBuilder()com.google.protobuf.BoolValueOrBuilder> [#not-implemented-hide:] Hiding so that the field can be removed after oghttp2 is rolled out. If set, force use of a particular HTTP/2 codec: oghttp2 if true, nghttp2 if false. If unset, HTTP/2 codec is selected based on envoy.reloadable_features.http2_use_oghttp2.
.google.protobuf.BoolValue use_oghttp2_codec = 16 [(.xds.annotations.v3.field_status) = { ... }
-