Interface UpstreamTlsContextOrBuilder
-
- All Superinterfaces:
com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
- All Known Implementing Classes:
UpstreamTlsContext
,UpstreamTlsContext.Builder
public interface UpstreamTlsContextOrBuilder extends com.google.protobuf.MessageOrBuilder
-
-
Method Summary
All Methods Instance Methods Abstract Methods Modifier and Type Method Description boolean
getAllowRenegotiation()
If true, server-initiated TLS renegotiation will be allowed.CommonTlsContext
getCommonTlsContext()
Common TLS context settings.CommonTlsContextOrBuilder
getCommonTlsContextOrBuilder()
Common TLS context settings.com.google.protobuf.BoolValue
getEnforceRsaKeyUsage()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage.com.google.protobuf.BoolValueOrBuilder
getEnforceRsaKeyUsageOrBuilder()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage.com.google.protobuf.UInt32Value
getMaxSessionKeys()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption.com.google.protobuf.UInt32ValueOrBuilder
getMaxSessionKeysOrBuilder()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption.java.lang.String
getSni()
SNI string to use when creating TLS backend connections.com.google.protobuf.ByteString
getSniBytes()
SNI string to use when creating TLS backend connections.boolean
hasCommonTlsContext()
Common TLS context settings.boolean
hasEnforceRsaKeyUsage()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage.boolean
hasMaxSessionKeys()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption.-
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getDefaultInstanceForType, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
-
-
-
Method Detail
-
hasCommonTlsContext
boolean hasCommonTlsContext()
Common TLS context settings. .. attention:: Server certificate verification is not enabled by default. Configure :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.trusted_ca>` to enable verification.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
- Returns:
- Whether the commonTlsContext field is set.
-
getCommonTlsContext
CommonTlsContext getCommonTlsContext()
Common TLS context settings. .. attention:: Server certificate verification is not enabled by default. Configure :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.trusted_ca>` to enable verification.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
- Returns:
- The commonTlsContext.
-
getCommonTlsContextOrBuilder
CommonTlsContextOrBuilder getCommonTlsContextOrBuilder()
Common TLS context settings. .. attention:: Server certificate verification is not enabled by default. Configure :ref:`trusted_ca<envoy_v3_api_field_extensions.transport_sockets.tls.v3.CertificateValidationContext.trusted_ca>` to enable verification.
.envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
-
getSni
java.lang.String getSni()
SNI string to use when creating TLS backend connections.
string sni = 2 [(.validate.rules) = { ... }
- Returns:
- The sni.
-
getSniBytes
com.google.protobuf.ByteString getSniBytes()
SNI string to use when creating TLS backend connections.
string sni = 2 [(.validate.rules) = { ... }
- Returns:
- The bytes for sni.
-
getAllowRenegotiation
boolean getAllowRenegotiation()
If true, server-initiated TLS renegotiation will be allowed. .. attention:: TLS renegotiation is considered insecure and shouldn't be used unless absolutely necessary.
bool allow_renegotiation = 3;
- Returns:
- The allowRenegotiation.
-
hasMaxSessionKeys
boolean hasMaxSessionKeys()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption. Defaults to 1, setting this to 0 disables session resumption.
.google.protobuf.UInt32Value max_session_keys = 4;
- Returns:
- Whether the maxSessionKeys field is set.
-
getMaxSessionKeys
com.google.protobuf.UInt32Value getMaxSessionKeys()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption. Defaults to 1, setting this to 0 disables session resumption.
.google.protobuf.UInt32Value max_session_keys = 4;
- Returns:
- The maxSessionKeys.
-
getMaxSessionKeysOrBuilder
com.google.protobuf.UInt32ValueOrBuilder getMaxSessionKeysOrBuilder()
Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets for TLSv1.2 and older) to store for the purpose of session resumption. Defaults to 1, setting this to 0 disables session resumption.
.google.protobuf.UInt32Value max_session_keys = 4;
-
hasEnforceRsaKeyUsage
boolean hasEnforceRsaKeyUsage()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage. Currently, the default value is false (i.e., enforcement off) but it is expected to be changed to true by default in a future release. ``ssl.was_key_usage_invalid`` in :ref:`listener metrics <config_listener_stats>` will be set for certificate configurations that would fail if this option were set to true.
.google.protobuf.BoolValue enforce_rsa_key_usage = 5;
- Returns:
- Whether the enforceRsaKeyUsage field is set.
-
getEnforceRsaKeyUsage
com.google.protobuf.BoolValue getEnforceRsaKeyUsage()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage. Currently, the default value is false (i.e., enforcement off) but it is expected to be changed to true by default in a future release. ``ssl.was_key_usage_invalid`` in :ref:`listener metrics <config_listener_stats>` will be set for certificate configurations that would fail if this option were set to true.
.google.protobuf.BoolValue enforce_rsa_key_usage = 5;
- Returns:
- The enforceRsaKeyUsage.
-
getEnforceRsaKeyUsageOrBuilder
com.google.protobuf.BoolValueOrBuilder getEnforceRsaKeyUsageOrBuilder()
This field is used to control the enforcement, whereby the handshake will fail if the keyUsage extension is present and incompatible with the TLS usage. Currently, the default value is false (i.e., enforcement off) but it is expected to be changed to true by default in a future release. ``ssl.was_key_usage_invalid`` in :ref:`listener metrics <config_listener_stats>` will be set for certificate configurations that would fail if this option were set to true.
.google.protobuf.BoolValue enforce_rsa_key_usage = 5;
-
-