Interface DownstreamTlsContextOrBuilder

All Superinterfaces:
com.google.protobuf.MessageLiteOrBuilder, com.google.protobuf.MessageOrBuilder
All Known Implementing Classes:
DownstreamTlsContext, DownstreamTlsContext.Builder

@Generated public interface DownstreamTlsContextOrBuilder extends com.google.protobuf.MessageOrBuilder
  • Method Details

    • hasCommonTlsContext

      boolean hasCommonTlsContext()
      Common TLS context settings.
      
      .envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
      Returns:
      Whether the commonTlsContext field is set.
    • getCommonTlsContext

      CommonTlsContext getCommonTlsContext()
      Common TLS context settings.
      
      .envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
      Returns:
      The commonTlsContext.
    • getCommonTlsContextOrBuilder

      CommonTlsContextOrBuilder getCommonTlsContextOrBuilder()
      Common TLS context settings.
      
      .envoy.extensions.transport_sockets.tls.v3.CommonTlsContext common_tls_context = 1;
    • hasRequireClientCertificate

      boolean hasRequireClientCertificate()
      If specified, Envoy will reject connections without a valid client
      certificate.
      
      .google.protobuf.BoolValue require_client_certificate = 2;
      Returns:
      Whether the requireClientCertificate field is set.
    • getRequireClientCertificate

      com.google.protobuf.BoolValue getRequireClientCertificate()
      If specified, Envoy will reject connections without a valid client
      certificate.
      
      .google.protobuf.BoolValue require_client_certificate = 2;
      Returns:
      The requireClientCertificate.
    • getRequireClientCertificateOrBuilder

      com.google.protobuf.BoolValueOrBuilder getRequireClientCertificateOrBuilder()
      If specified, Envoy will reject connections without a valid client
      certificate.
      
      .google.protobuf.BoolValue require_client_certificate = 2;
    • hasRequireSni

      boolean hasRequireSni()
      If specified, Envoy will reject connections without a valid and matching SNI.
      [#not-implemented-hide:]
      
      .google.protobuf.BoolValue require_sni = 3;
      Returns:
      Whether the requireSni field is set.
    • getRequireSni

      com.google.protobuf.BoolValue getRequireSni()
      If specified, Envoy will reject connections without a valid and matching SNI.
      [#not-implemented-hide:]
      
      .google.protobuf.BoolValue require_sni = 3;
      Returns:
      The requireSni.
    • getRequireSniOrBuilder

      com.google.protobuf.BoolValueOrBuilder getRequireSniOrBuilder()
      If specified, Envoy will reject connections without a valid and matching SNI.
      [#not-implemented-hide:]
      
      .google.protobuf.BoolValue require_sni = 3;
    • hasSessionTicketKeys

      boolean hasSessionTicketKeys()
      TLS session ticket key settings.
      
      .envoy.extensions.transport_sockets.tls.v3.TlsSessionTicketKeys session_ticket_keys = 4;
      Returns:
      Whether the sessionTicketKeys field is set.
    • getSessionTicketKeys

      TlsSessionTicketKeys getSessionTicketKeys()
      TLS session ticket key settings.
      
      .envoy.extensions.transport_sockets.tls.v3.TlsSessionTicketKeys session_ticket_keys = 4;
      Returns:
      The sessionTicketKeys.
    • getSessionTicketKeysOrBuilder

      TlsSessionTicketKeysOrBuilder getSessionTicketKeysOrBuilder()
      TLS session ticket key settings.
      
      .envoy.extensions.transport_sockets.tls.v3.TlsSessionTicketKeys session_ticket_keys = 4;
    • hasSessionTicketKeysSdsSecretConfig

      boolean hasSessionTicketKeysSdsSecretConfig()
      Config for fetching TLS session ticket keys via SDS API.
      
      .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
      Returns:
      Whether the sessionTicketKeysSdsSecretConfig field is set.
    • getSessionTicketKeysSdsSecretConfig

      SdsSecretConfig getSessionTicketKeysSdsSecretConfig()
      Config for fetching TLS session ticket keys via SDS API.
      
      .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
      Returns:
      The sessionTicketKeysSdsSecretConfig.
    • getSessionTicketKeysSdsSecretConfigOrBuilder

      SdsSecretConfigOrBuilder getSessionTicketKeysSdsSecretConfigOrBuilder()
      Config for fetching TLS session ticket keys via SDS API.
      
      .envoy.extensions.transport_sockets.tls.v3.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
    • hasDisableStatelessSessionResumption

      boolean hasDisableStatelessSessionResumption()
      Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
      server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
      If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
      the keys specified through either :ref:`session_ticket_keys <envoy_v3_api_field_extensions.transport_sockets.tls.v3.DownstreamTlsContext.session_ticket_keys>`
      or :ref:`session_ticket_keys_sds_secret_config <envoy_v3_api_field_extensions.transport_sockets.tls.v3.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
      If this config is set to false and no keys are explicitly configured, the TLS server will issue
      TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
      implication that sessions cannot be resumed across hot restarts or on different hosts.
      
      bool disable_stateless_session_resumption = 7;
      Returns:
      Whether the disableStatelessSessionResumption field is set.
    • getDisableStatelessSessionResumption

      boolean getDisableStatelessSessionResumption()
      Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
      server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
      If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
      the keys specified through either :ref:`session_ticket_keys <envoy_v3_api_field_extensions.transport_sockets.tls.v3.DownstreamTlsContext.session_ticket_keys>`
      or :ref:`session_ticket_keys_sds_secret_config <envoy_v3_api_field_extensions.transport_sockets.tls.v3.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
      If this config is set to false and no keys are explicitly configured, the TLS server will issue
      TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
      implication that sessions cannot be resumed across hot restarts or on different hosts.
      
      bool disable_stateless_session_resumption = 7;
      Returns:
      The disableStatelessSessionResumption.
    • getDisableStatefulSessionResumption

      boolean getDisableStatefulSessionResumption()
      If set to true, the TLS server will not maintain a session cache of TLS sessions. (This is
      relevant only for TLSv1.2 and earlier.)
      
      bool disable_stateful_session_resumption = 10;
      Returns:
      The disableStatefulSessionResumption.
    • hasSessionTimeout

      boolean hasSessionTimeout()
      If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
      Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
      Only seconds can be specified (fractional seconds are ignored).
      
      .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
      Returns:
      Whether the sessionTimeout field is set.
    • getSessionTimeout

      com.google.protobuf.Duration getSessionTimeout()
      If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
      Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
      Only seconds can be specified (fractional seconds are ignored).
      
      .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
      Returns:
      The sessionTimeout.
    • getSessionTimeoutOrBuilder

      com.google.protobuf.DurationOrBuilder getSessionTimeoutOrBuilder()
      If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
      Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
      Only seconds can be specified (fractional seconds are ignored).
      
      .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
    • getOcspStaplePolicyValue

      int getOcspStaplePolicyValue()
      Config for whether to use certificates if they do not have
      an accompanying OCSP response or if the response expires at runtime.
      Defaults to LENIENT_STAPLING
      
      .envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext.OcspStaplePolicy ocsp_staple_policy = 8 [(.validate.rules) = { ... }
      Returns:
      The enum numeric value on the wire for ocspStaplePolicy.
    • getOcspStaplePolicy

      Config for whether to use certificates if they do not have
      an accompanying OCSP response or if the response expires at runtime.
      Defaults to LENIENT_STAPLING
      
      .envoy.extensions.transport_sockets.tls.v3.DownstreamTlsContext.OcspStaplePolicy ocsp_staple_policy = 8 [(.validate.rules) = { ... }
      Returns:
      The ocspStaplePolicy.
    • hasFullScanCertsOnSniMismatch

      boolean hasFullScanCertsOnSniMismatch()
      Multiple certificates are allowed in Downstream transport socket to serve different SNI.
      If the client provides SNI but no such cert matched, it will decide to full scan certificates or not based on this config.
      Defaults to false. See more details in :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>`.
      
      .google.protobuf.BoolValue full_scan_certs_on_sni_mismatch = 9;
      Returns:
      Whether the fullScanCertsOnSniMismatch field is set.
    • getFullScanCertsOnSniMismatch

      com.google.protobuf.BoolValue getFullScanCertsOnSniMismatch()
      Multiple certificates are allowed in Downstream transport socket to serve different SNI.
      If the client provides SNI but no such cert matched, it will decide to full scan certificates or not based on this config.
      Defaults to false. See more details in :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>`.
      
      .google.protobuf.BoolValue full_scan_certs_on_sni_mismatch = 9;
      Returns:
      The fullScanCertsOnSniMismatch.
    • getFullScanCertsOnSniMismatchOrBuilder

      com.google.protobuf.BoolValueOrBuilder getFullScanCertsOnSniMismatchOrBuilder()
      Multiple certificates are allowed in Downstream transport socket to serve different SNI.
      If the client provides SNI but no such cert matched, it will decide to full scan certificates or not based on this config.
      Defaults to false. See more details in :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>`.
      
      .google.protobuf.BoolValue full_scan_certs_on_sni_mismatch = 9;
    • getSessionTicketKeysTypeCase

      DownstreamTlsContext.SessionTicketKeysTypeCase getSessionTicketKeysTypeCase()