
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContextOrBuilder Maven / Gradle / Ivy
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: envoy/api/v2/auth/cert.proto
package io.envoyproxy.envoy.api.v2.auth;
public interface DownstreamTlsContextOrBuilder extends
// @@protoc_insertion_point(interface_extends:envoy.api.v2.auth.DownstreamTlsContext)
com.google.protobuf.MessageOrBuilder {
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
boolean hasCommonTlsContext();
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getCommonTlsContext();
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder getCommonTlsContextOrBuilder();
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
boolean hasRequireClientCertificate();
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
com.google.protobuf.BoolValue getRequireClientCertificate();
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
com.google.protobuf.BoolValueOrBuilder getRequireClientCertificateOrBuilder();
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
boolean hasRequireSni();
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
com.google.protobuf.BoolValue getRequireSni();
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
com.google.protobuf.BoolValueOrBuilder getRequireSniOrBuilder();
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
boolean hasSessionTicketKeys();
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys getSessionTicketKeys();
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder getSessionTicketKeysOrBuilder();
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
boolean hasSessionTicketKeysSdsSecretConfig();
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getSessionTicketKeysSdsSecretConfig();
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getSessionTicketKeysSdsSecretConfigOrBuilder();
/**
*
* If specified, session_timeout will change maximum lifetime (in seconds) of TLS session
* Currently this value is used as a hint to `TLS session ticket lifetime (for TLSv1.2)
* <https://tools.ietf.org/html/rfc5077#section-5.6>`
* only seconds could be specified (fractional seconds are going to be ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
boolean hasSessionTimeout();
/**
*
* If specified, session_timeout will change maximum lifetime (in seconds) of TLS session
* Currently this value is used as a hint to `TLS session ticket lifetime (for TLSv1.2)
* <https://tools.ietf.org/html/rfc5077#section-5.6>`
* only seconds could be specified (fractional seconds are going to be ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
com.google.protobuf.Duration getSessionTimeout();
/**
*
* If specified, session_timeout will change maximum lifetime (in seconds) of TLS session
* Currently this value is used as a hint to `TLS session ticket lifetime (for TLSv1.2)
* <https://tools.ietf.org/html/rfc5077#section-5.6>`
* only seconds could be specified (fractional seconds are going to be ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
com.google.protobuf.DurationOrBuilder getSessionTimeoutOrBuilder();
public io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.SessionTicketKeysTypeCase getSessionTicketKeysTypeCase();
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy