Documentation ¶
Index ¶
- Variables
- type CertificateValidationContext
- func (*CertificateValidationContext) Descriptor() ([]byte, []int)
- func (m *CertificateValidationContext) GetAllowExpiredCertificate() bool
- func (m *CertificateValidationContext) GetCrl() *v4alpha.DataSource
- func (m *CertificateValidationContext) GetMatchSubjectAltNames() []*v3.StringMatcher
- func (m *CertificateValidationContext) GetRequireOcspStaple() *types.BoolValue
- func (m *CertificateValidationContext) GetRequireSignedCertificateTimestamp() *types.BoolValue
- func (m *CertificateValidationContext) GetTrustChainVerification() CertificateValidationContext_TrustChainVerification
- func (m *CertificateValidationContext) GetTrustedCa() *v4alpha.DataSource
- func (m *CertificateValidationContext) GetVerifyCertificateHash() []string
- func (m *CertificateValidationContext) GetVerifyCertificateSpki() []string
- func (m *CertificateValidationContext) Marshal() (dAtA []byte, err error)
- func (m *CertificateValidationContext) MarshalTo(dAtA []byte) (int, error)
- func (m *CertificateValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*CertificateValidationContext) ProtoMessage()
- func (m *CertificateValidationContext) Reset()
- func (m *CertificateValidationContext) Size() (n int)
- func (m *CertificateValidationContext) String() string
- func (m *CertificateValidationContext) Unmarshal(dAtA []byte) error
- func (m *CertificateValidationContext) Validate() error
- func (m *CertificateValidationContext) XXX_DiscardUnknown()
- func (m *CertificateValidationContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *CertificateValidationContext) XXX_Merge(src proto.Message)
- func (m *CertificateValidationContext) XXX_Size() int
- func (m *CertificateValidationContext) XXX_Unmarshal(b []byte) error
- type CertificateValidationContextValidationError
- func (e CertificateValidationContextValidationError) Cause() error
- func (e CertificateValidationContextValidationError) Error() string
- func (e CertificateValidationContextValidationError) ErrorName() string
- func (e CertificateValidationContextValidationError) Field() string
- func (e CertificateValidationContextValidationError) Key() bool
- func (e CertificateValidationContextValidationError) Reason() string
- type CertificateValidationContext_TrustChainVerification
- type CommonTlsContext
- func (*CommonTlsContext) Descriptor() ([]byte, []int)
- func (m *CommonTlsContext) GetAlpnProtocols() []string
- func (m *CommonTlsContext) GetCombinedValidationContext() *CommonTlsContext_CombinedCertificateValidationContext
- func (m *CommonTlsContext) GetTlsCertificateSdsSecretConfigs() []*SdsSecretConfig
- func (m *CommonTlsContext) GetTlsCertificates() []*TlsCertificate
- func (m *CommonTlsContext) GetTlsParams() *TlsParameters
- func (m *CommonTlsContext) GetValidationContext() *CertificateValidationContext
- func (m *CommonTlsContext) GetValidationContextSdsSecretConfig() *SdsSecretConfig
- func (m *CommonTlsContext) GetValidationContextType() isCommonTlsContext_ValidationContextType
- func (m *CommonTlsContext) Marshal() (dAtA []byte, err error)
- func (m *CommonTlsContext) MarshalTo(dAtA []byte) (int, error)
- func (m *CommonTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*CommonTlsContext) ProtoMessage()
- func (m *CommonTlsContext) Reset()
- func (m *CommonTlsContext) Size() (n int)
- func (m *CommonTlsContext) String() string
- func (m *CommonTlsContext) Unmarshal(dAtA []byte) error
- func (m *CommonTlsContext) Validate() error
- func (m *CommonTlsContext) XXX_DiscardUnknown()
- func (m *CommonTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *CommonTlsContext) XXX_Merge(src proto.Message)
- func (*CommonTlsContext) XXX_OneofWrappers() []interface{}
- func (m *CommonTlsContext) XXX_Size() int
- func (m *CommonTlsContext) XXX_Unmarshal(b []byte) error
- type CommonTlsContextValidationError
- func (e CommonTlsContextValidationError) Cause() error
- func (e CommonTlsContextValidationError) Error() string
- func (e CommonTlsContextValidationError) ErrorName() string
- func (e CommonTlsContextValidationError) Field() string
- func (e CommonTlsContextValidationError) Key() bool
- func (e CommonTlsContextValidationError) Reason() string
- type CommonTlsContext_CombinedCertificateValidationContext
- func (*CommonTlsContext_CombinedCertificateValidationContext) Descriptor() ([]byte, []int)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) GetDefaultValidationContext() *CertificateValidationContext
- func (m *CommonTlsContext_CombinedCertificateValidationContext) GetValidationContextSdsSecretConfig() *SdsSecretConfig
- func (m *CommonTlsContext_CombinedCertificateValidationContext) Marshal() (dAtA []byte, err error)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) MarshalTo(dAtA []byte) (int, error)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*CommonTlsContext_CombinedCertificateValidationContext) ProtoMessage()
- func (m *CommonTlsContext_CombinedCertificateValidationContext) Reset()
- func (m *CommonTlsContext_CombinedCertificateValidationContext) Size() (n int)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) String() string
- func (m *CommonTlsContext_CombinedCertificateValidationContext) Unmarshal(dAtA []byte) error
- func (m *CommonTlsContext_CombinedCertificateValidationContext) Validate() error
- func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_DiscardUnknown()
- func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Merge(src proto.Message)
- func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Size() int
- func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Unmarshal(b []byte) error
- type CommonTlsContext_CombinedCertificateValidationContextValidationError
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Cause() error
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Error() string
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) ErrorName() string
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Field() string
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Key() bool
- func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Reason() string
- type CommonTlsContext_CombinedValidationContext
- type CommonTlsContext_ValidationContext
- type CommonTlsContext_ValidationContextSdsSecretConfig
- type DownstreamTlsContext
- func (*DownstreamTlsContext) Descriptor() ([]byte, []int)
- func (m *DownstreamTlsContext) GetCommonTlsContext() *CommonTlsContext
- func (m *DownstreamTlsContext) GetDisableStatelessSessionResumption() bool
- func (m *DownstreamTlsContext) GetRequireClientCertificate() *types.BoolValue
- func (m *DownstreamTlsContext) GetRequireSni() *types.BoolValue
- func (m *DownstreamTlsContext) GetSessionTicketKeys() *TlsSessionTicketKeys
- func (m *DownstreamTlsContext) GetSessionTicketKeysSdsSecretConfig() *SdsSecretConfig
- func (m *DownstreamTlsContext) GetSessionTicketKeysType() isDownstreamTlsContext_SessionTicketKeysType
- func (m *DownstreamTlsContext) GetSessionTimeout() *types.Duration
- func (m *DownstreamTlsContext) Marshal() (dAtA []byte, err error)
- func (m *DownstreamTlsContext) MarshalTo(dAtA []byte) (int, error)
- func (m *DownstreamTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*DownstreamTlsContext) ProtoMessage()
- func (m *DownstreamTlsContext) Reset()
- func (m *DownstreamTlsContext) Size() (n int)
- func (m *DownstreamTlsContext) String() string
- func (m *DownstreamTlsContext) Unmarshal(dAtA []byte) error
- func (m *DownstreamTlsContext) Validate() error
- func (m *DownstreamTlsContext) XXX_DiscardUnknown()
- func (m *DownstreamTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *DownstreamTlsContext) XXX_Merge(src proto.Message)
- func (*DownstreamTlsContext) XXX_OneofWrappers() []interface{}
- func (m *DownstreamTlsContext) XXX_Size() int
- func (m *DownstreamTlsContext) XXX_Unmarshal(b []byte) error
- type DownstreamTlsContextValidationError
- func (e DownstreamTlsContextValidationError) Cause() error
- func (e DownstreamTlsContextValidationError) Error() string
- func (e DownstreamTlsContextValidationError) ErrorName() string
- func (e DownstreamTlsContextValidationError) Field() string
- func (e DownstreamTlsContextValidationError) Key() bool
- func (e DownstreamTlsContextValidationError) Reason() string
- type DownstreamTlsContext_DisableStatelessSessionResumption
- type DownstreamTlsContext_SessionTicketKeys
- type DownstreamTlsContext_SessionTicketKeysSdsSecretConfig
- type GenericSecret
- func (*GenericSecret) Descriptor() ([]byte, []int)
- func (m *GenericSecret) GetSecret() *v4alpha.DataSource
- func (m *GenericSecret) Marshal() (dAtA []byte, err error)
- func (m *GenericSecret) MarshalTo(dAtA []byte) (int, error)
- func (m *GenericSecret) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*GenericSecret) ProtoMessage()
- func (m *GenericSecret) Reset()
- func (m *GenericSecret) Size() (n int)
- func (m *GenericSecret) String() string
- func (m *GenericSecret) Unmarshal(dAtA []byte) error
- func (m *GenericSecret) Validate() error
- func (m *GenericSecret) XXX_DiscardUnknown()
- func (m *GenericSecret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *GenericSecret) XXX_Merge(src proto.Message)
- func (m *GenericSecret) XXX_Size() int
- func (m *GenericSecret) XXX_Unmarshal(b []byte) error
- type GenericSecretValidationError
- func (e GenericSecretValidationError) Cause() error
- func (e GenericSecretValidationError) Error() string
- func (e GenericSecretValidationError) ErrorName() string
- func (e GenericSecretValidationError) Field() string
- func (e GenericSecretValidationError) Key() bool
- func (e GenericSecretValidationError) Reason() string
- type PrivateKeyProvider
- func (*PrivateKeyProvider) Descriptor() ([]byte, []int)
- func (m *PrivateKeyProvider) GetConfigType() isPrivateKeyProvider_ConfigType
- func (m *PrivateKeyProvider) GetProviderName() string
- func (m *PrivateKeyProvider) GetTypedConfig() *types.Any
- func (m *PrivateKeyProvider) Marshal() (dAtA []byte, err error)
- func (m *PrivateKeyProvider) MarshalTo(dAtA []byte) (int, error)
- func (m *PrivateKeyProvider) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*PrivateKeyProvider) ProtoMessage()
- func (m *PrivateKeyProvider) Reset()
- func (m *PrivateKeyProvider) Size() (n int)
- func (m *PrivateKeyProvider) String() string
- func (m *PrivateKeyProvider) Unmarshal(dAtA []byte) error
- func (m *PrivateKeyProvider) Validate() error
- func (m *PrivateKeyProvider) XXX_DiscardUnknown()
- func (m *PrivateKeyProvider) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *PrivateKeyProvider) XXX_Merge(src proto.Message)
- func (*PrivateKeyProvider) XXX_OneofWrappers() []interface{}
- func (m *PrivateKeyProvider) XXX_Size() int
- func (m *PrivateKeyProvider) XXX_Unmarshal(b []byte) error
- type PrivateKeyProviderValidationError
- func (e PrivateKeyProviderValidationError) Cause() error
- func (e PrivateKeyProviderValidationError) Error() string
- func (e PrivateKeyProviderValidationError) ErrorName() string
- func (e PrivateKeyProviderValidationError) Field() string
- func (e PrivateKeyProviderValidationError) Key() bool
- func (e PrivateKeyProviderValidationError) Reason() string
- type PrivateKeyProvider_TypedConfig
- type SdsSecretConfig
- func (*SdsSecretConfig) Descriptor() ([]byte, []int)
- func (m *SdsSecretConfig) GetName() string
- func (m *SdsSecretConfig) GetSdsConfig() *v4alpha.ConfigSource
- func (m *SdsSecretConfig) Marshal() (dAtA []byte, err error)
- func (m *SdsSecretConfig) MarshalTo(dAtA []byte) (int, error)
- func (m *SdsSecretConfig) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*SdsSecretConfig) ProtoMessage()
- func (m *SdsSecretConfig) Reset()
- func (m *SdsSecretConfig) Size() (n int)
- func (m *SdsSecretConfig) String() string
- func (m *SdsSecretConfig) Unmarshal(dAtA []byte) error
- func (m *SdsSecretConfig) Validate() error
- func (m *SdsSecretConfig) XXX_DiscardUnknown()
- func (m *SdsSecretConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *SdsSecretConfig) XXX_Merge(src proto.Message)
- func (m *SdsSecretConfig) XXX_Size() int
- func (m *SdsSecretConfig) XXX_Unmarshal(b []byte) error
- type SdsSecretConfigValidationError
- func (e SdsSecretConfigValidationError) Cause() error
- func (e SdsSecretConfigValidationError) Error() string
- func (e SdsSecretConfigValidationError) ErrorName() string
- func (e SdsSecretConfigValidationError) Field() string
- func (e SdsSecretConfigValidationError) Key() bool
- func (e SdsSecretConfigValidationError) Reason() string
- type Secret
- func (*Secret) Descriptor() ([]byte, []int)
- func (m *Secret) GetGenericSecret() *GenericSecret
- func (m *Secret) GetName() string
- func (m *Secret) GetSessionTicketKeys() *TlsSessionTicketKeys
- func (m *Secret) GetTlsCertificate() *TlsCertificate
- func (m *Secret) GetType() isSecret_Type
- func (m *Secret) GetValidationContext() *CertificateValidationContext
- func (m *Secret) Marshal() (dAtA []byte, err error)
- func (m *Secret) MarshalTo(dAtA []byte) (int, error)
- func (m *Secret) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*Secret) ProtoMessage()
- func (m *Secret) Reset()
- func (m *Secret) Size() (n int)
- func (m *Secret) String() string
- func (m *Secret) Unmarshal(dAtA []byte) error
- func (m *Secret) Validate() error
- func (m *Secret) XXX_DiscardUnknown()
- func (m *Secret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *Secret) XXX_Merge(src proto.Message)
- func (*Secret) XXX_OneofWrappers() []interface{}
- func (m *Secret) XXX_Size() int
- func (m *Secret) XXX_Unmarshal(b []byte) error
- type SecretValidationError
- type Secret_GenericSecret
- type Secret_SessionTicketKeys
- type Secret_TlsCertificate
- type Secret_ValidationContext
- type TlsCertificate
- func (*TlsCertificate) Descriptor() ([]byte, []int)
- func (m *TlsCertificate) GetCertificateChain() *v4alpha.DataSource
- func (m *TlsCertificate) GetOcspStaple() *v4alpha.DataSource
- func (m *TlsCertificate) GetPassword() *v4alpha.DataSource
- func (m *TlsCertificate) GetPrivateKey() *v4alpha.DataSource
- func (m *TlsCertificate) GetPrivateKeyProvider() *PrivateKeyProvider
- func (m *TlsCertificate) GetSignedCertificateTimestamp() []*v4alpha.DataSource
- func (m *TlsCertificate) Marshal() (dAtA []byte, err error)
- func (m *TlsCertificate) MarshalTo(dAtA []byte) (int, error)
- func (m *TlsCertificate) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*TlsCertificate) ProtoMessage()
- func (m *TlsCertificate) Reset()
- func (m *TlsCertificate) Size() (n int)
- func (m *TlsCertificate) String() string
- func (m *TlsCertificate) Unmarshal(dAtA []byte) error
- func (m *TlsCertificate) Validate() error
- func (m *TlsCertificate) XXX_DiscardUnknown()
- func (m *TlsCertificate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *TlsCertificate) XXX_Merge(src proto.Message)
- func (m *TlsCertificate) XXX_Size() int
- func (m *TlsCertificate) XXX_Unmarshal(b []byte) error
- type TlsCertificateValidationError
- func (e TlsCertificateValidationError) Cause() error
- func (e TlsCertificateValidationError) Error() string
- func (e TlsCertificateValidationError) ErrorName() string
- func (e TlsCertificateValidationError) Field() string
- func (e TlsCertificateValidationError) Key() bool
- func (e TlsCertificateValidationError) Reason() string
- type TlsParameters
- func (*TlsParameters) Descriptor() ([]byte, []int)
- func (m *TlsParameters) GetCipherSuites() []string
- func (m *TlsParameters) GetEcdhCurves() []string
- func (m *TlsParameters) GetTlsMaximumProtocolVersion() TlsParameters_TlsProtocol
- func (m *TlsParameters) GetTlsMinimumProtocolVersion() TlsParameters_TlsProtocol
- func (m *TlsParameters) Marshal() (dAtA []byte, err error)
- func (m *TlsParameters) MarshalTo(dAtA []byte) (int, error)
- func (m *TlsParameters) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*TlsParameters) ProtoMessage()
- func (m *TlsParameters) Reset()
- func (m *TlsParameters) Size() (n int)
- func (m *TlsParameters) String() string
- func (m *TlsParameters) Unmarshal(dAtA []byte) error
- func (m *TlsParameters) Validate() error
- func (m *TlsParameters) XXX_DiscardUnknown()
- func (m *TlsParameters) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *TlsParameters) XXX_Merge(src proto.Message)
- func (m *TlsParameters) XXX_Size() int
- func (m *TlsParameters) XXX_Unmarshal(b []byte) error
- type TlsParametersValidationError
- func (e TlsParametersValidationError) Cause() error
- func (e TlsParametersValidationError) Error() string
- func (e TlsParametersValidationError) ErrorName() string
- func (e TlsParametersValidationError) Field() string
- func (e TlsParametersValidationError) Key() bool
- func (e TlsParametersValidationError) Reason() string
- type TlsParameters_TlsProtocol
- type TlsSessionTicketKeys
- func (*TlsSessionTicketKeys) Descriptor() ([]byte, []int)
- func (m *TlsSessionTicketKeys) GetKeys() []*v4alpha.DataSource
- func (m *TlsSessionTicketKeys) Marshal() (dAtA []byte, err error)
- func (m *TlsSessionTicketKeys) MarshalTo(dAtA []byte) (int, error)
- func (m *TlsSessionTicketKeys) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*TlsSessionTicketKeys) ProtoMessage()
- func (m *TlsSessionTicketKeys) Reset()
- func (m *TlsSessionTicketKeys) Size() (n int)
- func (m *TlsSessionTicketKeys) String() string
- func (m *TlsSessionTicketKeys) Unmarshal(dAtA []byte) error
- func (m *TlsSessionTicketKeys) Validate() error
- func (m *TlsSessionTicketKeys) XXX_DiscardUnknown()
- func (m *TlsSessionTicketKeys) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *TlsSessionTicketKeys) XXX_Merge(src proto.Message)
- func (m *TlsSessionTicketKeys) XXX_Size() int
- func (m *TlsSessionTicketKeys) XXX_Unmarshal(b []byte) error
- type TlsSessionTicketKeysValidationError
- func (e TlsSessionTicketKeysValidationError) Cause() error
- func (e TlsSessionTicketKeysValidationError) Error() string
- func (e TlsSessionTicketKeysValidationError) ErrorName() string
- func (e TlsSessionTicketKeysValidationError) Field() string
- func (e TlsSessionTicketKeysValidationError) Key() bool
- func (e TlsSessionTicketKeysValidationError) Reason() string
- type UpstreamTlsContext
- func (*UpstreamTlsContext) Descriptor() ([]byte, []int)
- func (m *UpstreamTlsContext) GetAllowRenegotiation() bool
- func (m *UpstreamTlsContext) GetCommonTlsContext() *CommonTlsContext
- func (m *UpstreamTlsContext) GetMaxSessionKeys() *types.UInt32Value
- func (m *UpstreamTlsContext) GetSni() string
- func (m *UpstreamTlsContext) Marshal() (dAtA []byte, err error)
- func (m *UpstreamTlsContext) MarshalTo(dAtA []byte) (int, error)
- func (m *UpstreamTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
- func (*UpstreamTlsContext) ProtoMessage()
- func (m *UpstreamTlsContext) Reset()
- func (m *UpstreamTlsContext) Size() (n int)
- func (m *UpstreamTlsContext) String() string
- func (m *UpstreamTlsContext) Unmarshal(dAtA []byte) error
- func (m *UpstreamTlsContext) Validate() error
- func (m *UpstreamTlsContext) XXX_DiscardUnknown()
- func (m *UpstreamTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
- func (m *UpstreamTlsContext) XXX_Merge(src proto.Message)
- func (m *UpstreamTlsContext) XXX_Size() int
- func (m *UpstreamTlsContext) XXX_Unmarshal(b []byte) error
- type UpstreamTlsContextValidationError
- func (e UpstreamTlsContextValidationError) Cause() error
- func (e UpstreamTlsContextValidationError) Error() string
- func (e UpstreamTlsContextValidationError) ErrorName() string
- func (e UpstreamTlsContextValidationError) Field() string
- func (e UpstreamTlsContextValidationError) Key() bool
- func (e UpstreamTlsContextValidationError) Reason() string
Constants ¶
This section is empty.
Variables ¶
var ( ErrInvalidLengthCert = fmt.Errorf("proto: negative length found during unmarshaling") ErrIntOverflowCert = fmt.Errorf("proto: integer overflow") ErrUnexpectedEndOfGroupCert = fmt.Errorf("proto: unexpected end of group") )
var CertificateValidationContext_TrustChainVerification_name = map[int32]string{
0: "VERIFY_TRUST_CHAIN",
1: "ACCEPT_UNTRUSTED",
}
var CertificateValidationContext_TrustChainVerification_value = map[string]int32{
"VERIFY_TRUST_CHAIN": 0,
"ACCEPT_UNTRUSTED": 1,
}
var TlsParameters_TlsProtocol_name = map[int32]string{
0: "TLS_AUTO",
1: "TLSv1_0",
2: "TLSv1_1",
3: "TLSv1_2",
4: "TLSv1_3",
}
var TlsParameters_TlsProtocol_value = map[string]int32{
"TLS_AUTO": 0,
"TLSv1_0": 1,
"TLSv1_1": 2,
"TLSv1_2": 3,
"TLSv1_3": 4,
}
Functions ¶
This section is empty.
Types ¶
type CertificateValidationContext ¶
type CertificateValidationContext struct { // TLS certificate data containing certificate authority certificates to use in verifying // a presented peer certificate (e.g. server certificate for clusters or client certificate // for listeners). If not specified and a peer certificate is presented it will not be // verified. By default, a client certificate is optional, unless one of the additional // options (:ref:`require_client_certificate // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.DownstreamTlsContext.require_client_certificate>`, // :ref:`verify_certificate_spki // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_spki>`, // :ref:`verify_certificate_hash // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_hash>`, or // :ref:`match_subject_alt_names // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.match_subject_alt_names>`) is also // specified. // // It can optionally contain certificate revocation lists, in which case Envoy will verify // that the presented peer certificate has not been revoked by one of the included CRLs. // // See :ref:`the TLS overview <arch_overview_ssl_enabling_verification>` for a list of common // system CA locations. TrustedCa *v4alpha.DataSource `protobuf:"bytes,1,opt,name=trusted_ca,json=trustedCa,proto3" json:"trusted_ca,omitempty"` // An optional list of base64-encoded SHA-256 hashes. If specified, Envoy will verify that the // SHA-256 of the DER-encoded Subject Public Key Information (SPKI) of the presented certificate // matches one of the specified values. // // A base64-encoded SHA-256 of the Subject Public Key Information (SPKI) of the certificate // can be generated with the following command: // // .. code-block:: bash // // $ openssl x509 -in path/to/client.crt -noout -pubkey // | openssl pkey -pubin -outform DER // | openssl dgst -sha256 -binary // | openssl enc -base64 // NvqYIYSbgK2vCJpQhObf77vv+bQWtc5ek5RIOwPiC9A= // // This is the format used in HTTP Public Key Pinning. // // When both: // :ref:`verify_certificate_hash // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_hash>` and // :ref:`verify_certificate_spki // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_spki>` are specified, // a hash matching value from either of the lists will result in the certificate being accepted. // // .. attention:: // // This option is preferred over :ref:`verify_certificate_hash // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_hash>`, // because SPKI is tied to a private key, so it doesn't change when the certificate // is renewed using the same private key. VerifyCertificateSpki []string `` /* 126-byte string literal not displayed */ // An optional list of hex-encoded SHA-256 hashes. If specified, Envoy will verify that // the SHA-256 of the DER-encoded presented certificate matches one of the specified values. // // A hex-encoded SHA-256 of the certificate can be generated with the following command: // // .. code-block:: bash // // $ openssl x509 -in path/to/client.crt -outform DER | openssl dgst -sha256 | cut -d" " -f2 // df6ff72fe9116521268f6f2dd4966f51df479883fe7037b39f75916ac3049d1a // // A long hex-encoded and colon-separated SHA-256 (a.k.a. "fingerprint") of the certificate // can be generated with the following command: // // .. code-block:: bash // // $ openssl x509 -in path/to/client.crt -noout -fingerprint -sha256 | cut -d"=" -f2 // DF:6F:F7:2F:E9:11:65:21:26:8F:6F:2D:D4:96:6F:51:DF:47:98:83:FE:70:37:B3:9F:75:91:6A:C3:04:9D:1A // // Both of those formats are acceptable. // // When both: // :ref:`verify_certificate_hash // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_hash>` and // :ref:`verify_certificate_spki // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.verify_certificate_spki>` are specified, // a hash matching value from either of the lists will result in the certificate being accepted. VerifyCertificateHash []string `` /* 126-byte string literal not displayed */ // An optional list of Subject Alternative name matchers. Envoy will verify that the // Subject Alternative Name of the presented certificate matches one of the specified matches. // // When a certificate has wildcard DNS SAN entries, to match a specific client, it should be // configured with exact match type in the :ref:`string matcher <envoy_api_msg_type.matcher.v3.StringMatcher>`. // For example if the certificate has "\*.example.com" as DNS SAN entry, to allow only "api.example.com", // it should be configured as shown below. // // .. code-block:: yaml // // match_subject_alt_names: // exact: "api.example.com" // // .. attention:: // // Subject Alternative Names are easily spoofable and verifying only them is insecure, // therefore this option must be used together with :ref:`trusted_ca // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.trusted_ca>`. MatchSubjectAltNames []*v3.StringMatcher `protobuf:"bytes,9,rep,name=match_subject_alt_names,json=matchSubjectAltNames,proto3" json:"match_subject_alt_names,omitempty"` // [#not-implemented-hide:] Must present a signed time-stamped OCSP response. RequireOcspStaple *types.BoolValue `protobuf:"bytes,5,opt,name=require_ocsp_staple,json=requireOcspStaple,proto3" json:"require_ocsp_staple,omitempty"` // [#not-implemented-hide:] Must present signed certificate time-stamp. RequireSignedCertificateTimestamp *types.BoolValue `` /* 164-byte string literal not displayed */ // An optional `certificate revocation list // <https://en.wikipedia.org/wiki/Certificate_revocation_list>`_ // (in PEM format). If specified, Envoy will verify that the presented peer // certificate has not been revoked by this CRL. If this DataSource contains // multiple CRLs, all of them will be used. Crl *v4alpha.DataSource `protobuf:"bytes,7,opt,name=crl,proto3" json:"crl,omitempty"` // If specified, Envoy will not reject expired certificates. AllowExpiredCertificate bool `` /* 133-byte string literal not displayed */ // Certificate trust chain verification mode. TrustChainVerification CertificateValidationContext_TrustChainVerification `` /* 235-byte string literal not displayed */ XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
[#next-free-field: 11]
func (*CertificateValidationContext) Descriptor ¶
func (*CertificateValidationContext) Descriptor() ([]byte, []int)
func (*CertificateValidationContext) GetAllowExpiredCertificate ¶
func (m *CertificateValidationContext) GetAllowExpiredCertificate() bool
func (*CertificateValidationContext) GetCrl ¶
func (m *CertificateValidationContext) GetCrl() *v4alpha.DataSource
func (*CertificateValidationContext) GetMatchSubjectAltNames ¶
func (m *CertificateValidationContext) GetMatchSubjectAltNames() []*v3.StringMatcher
func (*CertificateValidationContext) GetRequireOcspStaple ¶
func (m *CertificateValidationContext) GetRequireOcspStaple() *types.BoolValue
func (*CertificateValidationContext) GetRequireSignedCertificateTimestamp ¶
func (m *CertificateValidationContext) GetRequireSignedCertificateTimestamp() *types.BoolValue
func (*CertificateValidationContext) GetTrustChainVerification ¶
func (m *CertificateValidationContext) GetTrustChainVerification() CertificateValidationContext_TrustChainVerification
func (*CertificateValidationContext) GetTrustedCa ¶
func (m *CertificateValidationContext) GetTrustedCa() *v4alpha.DataSource
func (*CertificateValidationContext) GetVerifyCertificateHash ¶
func (m *CertificateValidationContext) GetVerifyCertificateHash() []string
func (*CertificateValidationContext) GetVerifyCertificateSpki ¶
func (m *CertificateValidationContext) GetVerifyCertificateSpki() []string
func (*CertificateValidationContext) Marshal ¶
func (m *CertificateValidationContext) Marshal() (dAtA []byte, err error)
func (*CertificateValidationContext) MarshalTo ¶
func (m *CertificateValidationContext) MarshalTo(dAtA []byte) (int, error)
func (*CertificateValidationContext) MarshalToSizedBuffer ¶
func (m *CertificateValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CertificateValidationContext) ProtoMessage ¶
func (*CertificateValidationContext) ProtoMessage()
func (*CertificateValidationContext) Reset ¶
func (m *CertificateValidationContext) Reset()
func (*CertificateValidationContext) Size ¶
func (m *CertificateValidationContext) Size() (n int)
func (*CertificateValidationContext) String ¶
func (m *CertificateValidationContext) String() string
func (*CertificateValidationContext) Unmarshal ¶
func (m *CertificateValidationContext) Unmarshal(dAtA []byte) error
func (*CertificateValidationContext) Validate ¶
func (m *CertificateValidationContext) Validate() error
Validate checks the field values on CertificateValidationContext with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*CertificateValidationContext) XXX_DiscardUnknown ¶
func (m *CertificateValidationContext) XXX_DiscardUnknown()
func (*CertificateValidationContext) XXX_Marshal ¶
func (m *CertificateValidationContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*CertificateValidationContext) XXX_Merge ¶
func (m *CertificateValidationContext) XXX_Merge(src proto.Message)
func (*CertificateValidationContext) XXX_Size ¶
func (m *CertificateValidationContext) XXX_Size() int
func (*CertificateValidationContext) XXX_Unmarshal ¶
func (m *CertificateValidationContext) XXX_Unmarshal(b []byte) error
type CertificateValidationContextValidationError ¶
type CertificateValidationContextValidationError struct {
// contains filtered or unexported fields
}
CertificateValidationContextValidationError is the validation error returned by CertificateValidationContext.Validate if the designated constraints aren't met.
func (CertificateValidationContextValidationError) Cause ¶
func (e CertificateValidationContextValidationError) Cause() error
Cause function returns cause value.
func (CertificateValidationContextValidationError) Error ¶
func (e CertificateValidationContextValidationError) Error() string
Error satisfies the builtin error interface
func (CertificateValidationContextValidationError) ErrorName ¶
func (e CertificateValidationContextValidationError) ErrorName() string
ErrorName returns error name.
func (CertificateValidationContextValidationError) Field ¶
func (e CertificateValidationContextValidationError) Field() string
Field function returns field value.
func (CertificateValidationContextValidationError) Key ¶
func (e CertificateValidationContextValidationError) Key() bool
Key function returns key value.
func (CertificateValidationContextValidationError) Reason ¶
func (e CertificateValidationContextValidationError) Reason() string
Reason function returns reason value.
type CertificateValidationContext_TrustChainVerification ¶
type CertificateValidationContext_TrustChainVerification int32
Peer certificate verification mode.
const ( // Perform default certificate verification (e.g., against CA / verification lists) CertificateValidationContext_VERIFY_TRUST_CHAIN CertificateValidationContext_TrustChainVerification = 0 // Connections where the certificate fails verification will be permitted. // For HTTP connections, the result of certificate verification can be used in route matching. ( // see :ref:`validated <envoy_api_field_config.route.v4alpha.RouteMatch.TlsContextMatchOptions.validated>` ). CertificateValidationContext_ACCEPT_UNTRUSTED CertificateValidationContext_TrustChainVerification = 1 )
func (CertificateValidationContext_TrustChainVerification) EnumDescriptor ¶
func (CertificateValidationContext_TrustChainVerification) EnumDescriptor() ([]byte, []int)
func (CertificateValidationContext_TrustChainVerification) String ¶
func (x CertificateValidationContext_TrustChainVerification) String() string
type CommonTlsContext ¶
type CommonTlsContext struct { // TLS protocol versions, cipher suites etc. TlsParams *TlsParameters `protobuf:"bytes,1,opt,name=tls_params,json=tlsParams,proto3" json:"tls_params,omitempty"` // :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the // same context to allow both RSA and ECDSA certificates. // // Only a single TLS certificate is supported in client contexts. In server contexts, the first // RSA certificate is used for clients that only support RSA and the first ECDSA certificate is // used for clients that support ECDSA. TlsCertificates []*TlsCertificate `protobuf:"bytes,2,rep,name=tls_certificates,json=tlsCertificates,proto3" json:"tls_certificates,omitempty"` // Configs for fetching TLS certificates via SDS API. TlsCertificateSdsSecretConfigs []*SdsSecretConfig `` /* 157-byte string literal not displayed */ // Types that are valid to be assigned to ValidationContextType: // *CommonTlsContext_ValidationContext // *CommonTlsContext_ValidationContextSdsSecretConfig // *CommonTlsContext_CombinedValidationContext ValidationContextType isCommonTlsContext_ValidationContextType `protobuf_oneof:"validation_context_type"` // Supplies the list of ALPN protocols that the listener should expose. In // practice this is likely to be set to one of two values (see the // :ref:`codec_type // <envoy_api_field_extensions.filters.network.http_connection_manager.v4alpha.HttpConnectionManager.codec_type>` // parameter in the HTTP connection manager for more information): // // * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1. // * "http/1.1" If the listener is only going to support HTTP/1.1. // // There is no default for this parameter. If empty, Envoy will not expose ALPN. AlpnProtocols []string `protobuf:"bytes,4,rep,name=alpn_protocols,json=alpnProtocols,proto3" json:"alpn_protocols,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
TLS context shared by both client and server TLS contexts. [#next-free-field: 9]
func (*CommonTlsContext) Descriptor ¶
func (*CommonTlsContext) Descriptor() ([]byte, []int)
func (*CommonTlsContext) GetAlpnProtocols ¶
func (m *CommonTlsContext) GetAlpnProtocols() []string
func (*CommonTlsContext) GetCombinedValidationContext ¶
func (m *CommonTlsContext) GetCombinedValidationContext() *CommonTlsContext_CombinedCertificateValidationContext
func (*CommonTlsContext) GetTlsCertificateSdsSecretConfigs ¶
func (m *CommonTlsContext) GetTlsCertificateSdsSecretConfigs() []*SdsSecretConfig
func (*CommonTlsContext) GetTlsCertificates ¶
func (m *CommonTlsContext) GetTlsCertificates() []*TlsCertificate
func (*CommonTlsContext) GetTlsParams ¶
func (m *CommonTlsContext) GetTlsParams() *TlsParameters
func (*CommonTlsContext) GetValidationContext ¶
func (m *CommonTlsContext) GetValidationContext() *CertificateValidationContext
func (*CommonTlsContext) GetValidationContextSdsSecretConfig ¶
func (m *CommonTlsContext) GetValidationContextSdsSecretConfig() *SdsSecretConfig
func (*CommonTlsContext) GetValidationContextType ¶
func (m *CommonTlsContext) GetValidationContextType() isCommonTlsContext_ValidationContextType
func (*CommonTlsContext) Marshal ¶
func (m *CommonTlsContext) Marshal() (dAtA []byte, err error)
func (*CommonTlsContext) MarshalToSizedBuffer ¶
func (m *CommonTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CommonTlsContext) ProtoMessage ¶
func (*CommonTlsContext) ProtoMessage()
func (*CommonTlsContext) Reset ¶
func (m *CommonTlsContext) Reset()
func (*CommonTlsContext) Size ¶
func (m *CommonTlsContext) Size() (n int)
func (*CommonTlsContext) String ¶
func (m *CommonTlsContext) String() string
func (*CommonTlsContext) Unmarshal ¶
func (m *CommonTlsContext) Unmarshal(dAtA []byte) error
func (*CommonTlsContext) Validate ¶
func (m *CommonTlsContext) Validate() error
Validate checks the field values on CommonTlsContext with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*CommonTlsContext) XXX_DiscardUnknown ¶
func (m *CommonTlsContext) XXX_DiscardUnknown()
func (*CommonTlsContext) XXX_Marshal ¶
func (m *CommonTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*CommonTlsContext) XXX_Merge ¶
func (m *CommonTlsContext) XXX_Merge(src proto.Message)
func (*CommonTlsContext) XXX_OneofWrappers ¶
func (*CommonTlsContext) XXX_OneofWrappers() []interface{}
XXX_OneofWrappers is for the internal use of the proto package.
func (*CommonTlsContext) XXX_Size ¶
func (m *CommonTlsContext) XXX_Size() int
func (*CommonTlsContext) XXX_Unmarshal ¶
func (m *CommonTlsContext) XXX_Unmarshal(b []byte) error
type CommonTlsContextValidationError ¶
type CommonTlsContextValidationError struct {
// contains filtered or unexported fields
}
CommonTlsContextValidationError is the validation error returned by CommonTlsContext.Validate if the designated constraints aren't met.
func (CommonTlsContextValidationError) Cause ¶
func (e CommonTlsContextValidationError) Cause() error
Cause function returns cause value.
func (CommonTlsContextValidationError) Error ¶
func (e CommonTlsContextValidationError) Error() string
Error satisfies the builtin error interface
func (CommonTlsContextValidationError) ErrorName ¶
func (e CommonTlsContextValidationError) ErrorName() string
ErrorName returns error name.
func (CommonTlsContextValidationError) Field ¶
func (e CommonTlsContextValidationError) Field() string
Field function returns field value.
func (CommonTlsContextValidationError) Key ¶
func (e CommonTlsContextValidationError) Key() bool
Key function returns key value.
func (CommonTlsContextValidationError) Reason ¶
func (e CommonTlsContextValidationError) Reason() string
Reason function returns reason value.
type CommonTlsContext_CombinedCertificateValidationContext ¶
type CommonTlsContext_CombinedCertificateValidationContext struct { // How to validate peer certificates. DefaultValidationContext *CertificateValidationContext `` /* 135-byte string literal not displayed */ // Config for fetching validation context via SDS API. ValidationContextSdsSecretConfig *SdsSecretConfig `` /* 163-byte string literal not displayed */ XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*CommonTlsContext_CombinedCertificateValidationContext) Descriptor ¶
func (*CommonTlsContext_CombinedCertificateValidationContext) Descriptor() ([]byte, []int)
func (*CommonTlsContext_CombinedCertificateValidationContext) GetDefaultValidationContext ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) GetDefaultValidationContext() *CertificateValidationContext
func (*CommonTlsContext_CombinedCertificateValidationContext) GetValidationContextSdsSecretConfig ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) GetValidationContextSdsSecretConfig() *SdsSecretConfig
func (*CommonTlsContext_CombinedCertificateValidationContext) Marshal ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) Marshal() (dAtA []byte, err error)
func (*CommonTlsContext_CombinedCertificateValidationContext) MarshalTo ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) MarshalTo(dAtA []byte) (int, error)
func (*CommonTlsContext_CombinedCertificateValidationContext) MarshalToSizedBuffer ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CommonTlsContext_CombinedCertificateValidationContext) ProtoMessage ¶
func (*CommonTlsContext_CombinedCertificateValidationContext) ProtoMessage()
func (*CommonTlsContext_CombinedCertificateValidationContext) Reset ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) Reset()
func (*CommonTlsContext_CombinedCertificateValidationContext) Size ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) Size() (n int)
func (*CommonTlsContext_CombinedCertificateValidationContext) String ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) String() string
func (*CommonTlsContext_CombinedCertificateValidationContext) Unmarshal ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) Unmarshal(dAtA []byte) error
func (*CommonTlsContext_CombinedCertificateValidationContext) Validate ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) Validate() error
Validate checks the field values on CommonTlsContext_CombinedCertificateValidationContext with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*CommonTlsContext_CombinedCertificateValidationContext) XXX_DiscardUnknown ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_DiscardUnknown()
func (*CommonTlsContext_CombinedCertificateValidationContext) XXX_Marshal ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*CommonTlsContext_CombinedCertificateValidationContext) XXX_Merge ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Merge(src proto.Message)
func (*CommonTlsContext_CombinedCertificateValidationContext) XXX_Size ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Size() int
func (*CommonTlsContext_CombinedCertificateValidationContext) XXX_Unmarshal ¶
func (m *CommonTlsContext_CombinedCertificateValidationContext) XXX_Unmarshal(b []byte) error
type CommonTlsContext_CombinedCertificateValidationContextValidationError ¶
type CommonTlsContext_CombinedCertificateValidationContextValidationError struct {
// contains filtered or unexported fields
}
CommonTlsContext_CombinedCertificateValidationContextValidationError is the validation error returned by CommonTlsContext_CombinedCertificateValidationContext.Validate if the designated constraints aren't met.
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) Cause ¶
Cause function returns cause value.
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) Error ¶
Error satisfies the builtin error interface
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) ErrorName ¶
func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) ErrorName() string
ErrorName returns error name.
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) Field ¶
Field function returns field value.
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) Key ¶
Key function returns key value.
func (CommonTlsContext_CombinedCertificateValidationContextValidationError) Reason ¶
func (e CommonTlsContext_CombinedCertificateValidationContextValidationError) Reason() string
Reason function returns reason value.
type CommonTlsContext_CombinedValidationContext ¶
type CommonTlsContext_CombinedValidationContext struct {
CombinedValidationContext *CommonTlsContext_CombinedCertificateValidationContext `` /* 144-byte string literal not displayed */
}
func (*CommonTlsContext_CombinedValidationContext) MarshalTo ¶
func (m *CommonTlsContext_CombinedValidationContext) MarshalTo(dAtA []byte) (int, error)
func (*CommonTlsContext_CombinedValidationContext) MarshalToSizedBuffer ¶
func (m *CommonTlsContext_CombinedValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CommonTlsContext_CombinedValidationContext) Size ¶
func (m *CommonTlsContext_CombinedValidationContext) Size() (n int)
type CommonTlsContext_ValidationContext ¶
type CommonTlsContext_ValidationContext struct {
ValidationContext *CertificateValidationContext `protobuf:"bytes,3,opt,name=validation_context,json=validationContext,proto3,oneof" json:"validation_context,omitempty"`
}
func (*CommonTlsContext_ValidationContext) MarshalTo ¶
func (m *CommonTlsContext_ValidationContext) MarshalTo(dAtA []byte) (int, error)
func (*CommonTlsContext_ValidationContext) MarshalToSizedBuffer ¶
func (m *CommonTlsContext_ValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CommonTlsContext_ValidationContext) Size ¶
func (m *CommonTlsContext_ValidationContext) Size() (n int)
type CommonTlsContext_ValidationContextSdsSecretConfig ¶
type CommonTlsContext_ValidationContextSdsSecretConfig struct {
ValidationContextSdsSecretConfig *SdsSecretConfig `` /* 169-byte string literal not displayed */
}
func (*CommonTlsContext_ValidationContextSdsSecretConfig) MarshalTo ¶
func (m *CommonTlsContext_ValidationContextSdsSecretConfig) MarshalTo(dAtA []byte) (int, error)
func (*CommonTlsContext_ValidationContextSdsSecretConfig) MarshalToSizedBuffer ¶
func (m *CommonTlsContext_ValidationContextSdsSecretConfig) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*CommonTlsContext_ValidationContextSdsSecretConfig) Size ¶
func (m *CommonTlsContext_ValidationContextSdsSecretConfig) Size() (n int)
type DownstreamTlsContext ¶
type DownstreamTlsContext struct { // Common TLS context settings. CommonTlsContext *CommonTlsContext `protobuf:"bytes,1,opt,name=common_tls_context,json=commonTlsContext,proto3" json:"common_tls_context,omitempty"` // If specified, Envoy will reject connections without a valid client // certificate. RequireClientCertificate *types.BoolValue `` /* 135-byte string literal not displayed */ // If specified, Envoy will reject connections without a valid and matching SNI. // [#not-implemented-hide:] RequireSni *types.BoolValue `protobuf:"bytes,3,opt,name=require_sni,json=requireSni,proto3" json:"require_sni,omitempty"` // Types that are valid to be assigned to SessionTicketKeysType: // *DownstreamTlsContext_SessionTicketKeys // *DownstreamTlsContext_SessionTicketKeysSdsSecretConfig // *DownstreamTlsContext_DisableStatelessSessionResumption SessionTicketKeysType isDownstreamTlsContext_SessionTicketKeysType `protobuf_oneof:"session_ticket_keys_type"` // If specified, session_timeout will change maximum lifetime (in seconds) of TLS session // Currently this value is used as a hint to `TLS session ticket lifetime (for TLSv1.2) // <https://tools.ietf.org/html/rfc5077#section-5.6>` // only seconds could be specified (fractional seconds are going to be ignored). SessionTimeout *types.Duration `protobuf:"bytes,6,opt,name=session_timeout,json=sessionTimeout,proto3" json:"session_timeout,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
[#next-free-field: 8]
func (*DownstreamTlsContext) Descriptor ¶
func (*DownstreamTlsContext) Descriptor() ([]byte, []int)
func (*DownstreamTlsContext) GetCommonTlsContext ¶
func (m *DownstreamTlsContext) GetCommonTlsContext() *CommonTlsContext
func (*DownstreamTlsContext) GetDisableStatelessSessionResumption ¶
func (m *DownstreamTlsContext) GetDisableStatelessSessionResumption() bool
func (*DownstreamTlsContext) GetRequireClientCertificate ¶
func (m *DownstreamTlsContext) GetRequireClientCertificate() *types.BoolValue
func (*DownstreamTlsContext) GetRequireSni ¶
func (m *DownstreamTlsContext) GetRequireSni() *types.BoolValue
func (*DownstreamTlsContext) GetSessionTicketKeys ¶
func (m *DownstreamTlsContext) GetSessionTicketKeys() *TlsSessionTicketKeys
func (*DownstreamTlsContext) GetSessionTicketKeysSdsSecretConfig ¶
func (m *DownstreamTlsContext) GetSessionTicketKeysSdsSecretConfig() *SdsSecretConfig
func (*DownstreamTlsContext) GetSessionTicketKeysType ¶
func (m *DownstreamTlsContext) GetSessionTicketKeysType() isDownstreamTlsContext_SessionTicketKeysType
func (*DownstreamTlsContext) GetSessionTimeout ¶
func (m *DownstreamTlsContext) GetSessionTimeout() *types.Duration
func (*DownstreamTlsContext) Marshal ¶
func (m *DownstreamTlsContext) Marshal() (dAtA []byte, err error)
func (*DownstreamTlsContext) MarshalTo ¶
func (m *DownstreamTlsContext) MarshalTo(dAtA []byte) (int, error)
func (*DownstreamTlsContext) MarshalToSizedBuffer ¶
func (m *DownstreamTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*DownstreamTlsContext) ProtoMessage ¶
func (*DownstreamTlsContext) ProtoMessage()
func (*DownstreamTlsContext) Reset ¶
func (m *DownstreamTlsContext) Reset()
func (*DownstreamTlsContext) Size ¶
func (m *DownstreamTlsContext) Size() (n int)
func (*DownstreamTlsContext) String ¶
func (m *DownstreamTlsContext) String() string
func (*DownstreamTlsContext) Unmarshal ¶
func (m *DownstreamTlsContext) Unmarshal(dAtA []byte) error
func (*DownstreamTlsContext) Validate ¶
func (m *DownstreamTlsContext) Validate() error
Validate checks the field values on DownstreamTlsContext with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*DownstreamTlsContext) XXX_DiscardUnknown ¶
func (m *DownstreamTlsContext) XXX_DiscardUnknown()
func (*DownstreamTlsContext) XXX_Marshal ¶
func (m *DownstreamTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*DownstreamTlsContext) XXX_Merge ¶
func (m *DownstreamTlsContext) XXX_Merge(src proto.Message)
func (*DownstreamTlsContext) XXX_OneofWrappers ¶
func (*DownstreamTlsContext) XXX_OneofWrappers() []interface{}
XXX_OneofWrappers is for the internal use of the proto package.
func (*DownstreamTlsContext) XXX_Size ¶
func (m *DownstreamTlsContext) XXX_Size() int
func (*DownstreamTlsContext) XXX_Unmarshal ¶
func (m *DownstreamTlsContext) XXX_Unmarshal(b []byte) error
type DownstreamTlsContextValidationError ¶
type DownstreamTlsContextValidationError struct {
// contains filtered or unexported fields
}
DownstreamTlsContextValidationError is the validation error returned by DownstreamTlsContext.Validate if the designated constraints aren't met.
func (DownstreamTlsContextValidationError) Cause ¶
func (e DownstreamTlsContextValidationError) Cause() error
Cause function returns cause value.
func (DownstreamTlsContextValidationError) Error ¶
func (e DownstreamTlsContextValidationError) Error() string
Error satisfies the builtin error interface
func (DownstreamTlsContextValidationError) ErrorName ¶
func (e DownstreamTlsContextValidationError) ErrorName() string
ErrorName returns error name.
func (DownstreamTlsContextValidationError) Field ¶
func (e DownstreamTlsContextValidationError) Field() string
Field function returns field value.
func (DownstreamTlsContextValidationError) Key ¶
func (e DownstreamTlsContextValidationError) Key() bool
Key function returns key value.
func (DownstreamTlsContextValidationError) Reason ¶
func (e DownstreamTlsContextValidationError) Reason() string
Reason function returns reason value.
type DownstreamTlsContext_DisableStatelessSessionResumption ¶
type DownstreamTlsContext_DisableStatelessSessionResumption struct {
DisableStatelessSessionResumption bool `` /* 171-byte string literal not displayed */
}
func (*DownstreamTlsContext_DisableStatelessSessionResumption) MarshalTo ¶
func (m *DownstreamTlsContext_DisableStatelessSessionResumption) MarshalTo(dAtA []byte) (int, error)
func (*DownstreamTlsContext_DisableStatelessSessionResumption) MarshalToSizedBuffer ¶
func (m *DownstreamTlsContext_DisableStatelessSessionResumption) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*DownstreamTlsContext_DisableStatelessSessionResumption) Size ¶
func (m *DownstreamTlsContext_DisableStatelessSessionResumption) Size() (n int)
type DownstreamTlsContext_SessionTicketKeys ¶
type DownstreamTlsContext_SessionTicketKeys struct {
SessionTicketKeys *TlsSessionTicketKeys `protobuf:"bytes,4,opt,name=session_ticket_keys,json=sessionTicketKeys,proto3,oneof" json:"session_ticket_keys,omitempty"`
}
func (*DownstreamTlsContext_SessionTicketKeys) MarshalTo ¶
func (m *DownstreamTlsContext_SessionTicketKeys) MarshalTo(dAtA []byte) (int, error)
func (*DownstreamTlsContext_SessionTicketKeys) MarshalToSizedBuffer ¶
func (m *DownstreamTlsContext_SessionTicketKeys) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*DownstreamTlsContext_SessionTicketKeys) Size ¶
func (m *DownstreamTlsContext_SessionTicketKeys) Size() (n int)
type DownstreamTlsContext_SessionTicketKeysSdsSecretConfig ¶
type DownstreamTlsContext_SessionTicketKeysSdsSecretConfig struct {
SessionTicketKeysSdsSecretConfig *SdsSecretConfig `` /* 171-byte string literal not displayed */
}
func (*DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) MarshalTo ¶
func (m *DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) MarshalTo(dAtA []byte) (int, error)
func (*DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) MarshalToSizedBuffer ¶
func (m *DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) Size ¶
func (m *DownstreamTlsContext_SessionTicketKeysSdsSecretConfig) Size() (n int)
type GenericSecret ¶
type GenericSecret struct { // Secret of generic type and is available to filters. Secret *v4alpha.DataSource `protobuf:"bytes,1,opt,name=secret,proto3" json:"secret,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*GenericSecret) Descriptor ¶
func (*GenericSecret) Descriptor() ([]byte, []int)
func (*GenericSecret) GetSecret ¶
func (m *GenericSecret) GetSecret() *v4alpha.DataSource
func (*GenericSecret) Marshal ¶
func (m *GenericSecret) Marshal() (dAtA []byte, err error)
func (*GenericSecret) MarshalToSizedBuffer ¶
func (m *GenericSecret) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*GenericSecret) ProtoMessage ¶
func (*GenericSecret) ProtoMessage()
func (*GenericSecret) Reset ¶
func (m *GenericSecret) Reset()
func (*GenericSecret) Size ¶
func (m *GenericSecret) Size() (n int)
func (*GenericSecret) String ¶
func (m *GenericSecret) String() string
func (*GenericSecret) Unmarshal ¶
func (m *GenericSecret) Unmarshal(dAtA []byte) error
func (*GenericSecret) Validate ¶
func (m *GenericSecret) Validate() error
Validate checks the field values on GenericSecret with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*GenericSecret) XXX_DiscardUnknown ¶
func (m *GenericSecret) XXX_DiscardUnknown()
func (*GenericSecret) XXX_Marshal ¶
func (m *GenericSecret) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*GenericSecret) XXX_Merge ¶
func (m *GenericSecret) XXX_Merge(src proto.Message)
func (*GenericSecret) XXX_Size ¶
func (m *GenericSecret) XXX_Size() int
func (*GenericSecret) XXX_Unmarshal ¶
func (m *GenericSecret) XXX_Unmarshal(b []byte) error
type GenericSecretValidationError ¶
type GenericSecretValidationError struct {
// contains filtered or unexported fields
}
GenericSecretValidationError is the validation error returned by GenericSecret.Validate if the designated constraints aren't met.
func (GenericSecretValidationError) Cause ¶
func (e GenericSecretValidationError) Cause() error
Cause function returns cause value.
func (GenericSecretValidationError) Error ¶
func (e GenericSecretValidationError) Error() string
Error satisfies the builtin error interface
func (GenericSecretValidationError) ErrorName ¶
func (e GenericSecretValidationError) ErrorName() string
ErrorName returns error name.
func (GenericSecretValidationError) Field ¶
func (e GenericSecretValidationError) Field() string
Field function returns field value.
func (GenericSecretValidationError) Key ¶
func (e GenericSecretValidationError) Key() bool
Key function returns key value.
func (GenericSecretValidationError) Reason ¶
func (e GenericSecretValidationError) Reason() string
Reason function returns reason value.
type PrivateKeyProvider ¶
type PrivateKeyProvider struct { // Private key method provider name. The name must match a // supported private key method provider type. ProviderName string `protobuf:"bytes,1,opt,name=provider_name,json=providerName,proto3" json:"provider_name,omitempty"` // Private key method provider specific configuration. // // Types that are valid to be assigned to ConfigType: // *PrivateKeyProvider_TypedConfig ConfigType isPrivateKeyProvider_ConfigType `protobuf_oneof:"config_type"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
BoringSSL private key method configuration. The private key methods are used for external (potentially asynchronous) signing and decryption operations. Some use cases for private key methods would be TPM support and TLS acceleration.
func (*PrivateKeyProvider) Descriptor ¶
func (*PrivateKeyProvider) Descriptor() ([]byte, []int)
func (*PrivateKeyProvider) GetConfigType ¶
func (m *PrivateKeyProvider) GetConfigType() isPrivateKeyProvider_ConfigType
func (*PrivateKeyProvider) GetProviderName ¶
func (m *PrivateKeyProvider) GetProviderName() string
func (*PrivateKeyProvider) GetTypedConfig ¶
func (m *PrivateKeyProvider) GetTypedConfig() *types.Any
func (*PrivateKeyProvider) Marshal ¶
func (m *PrivateKeyProvider) Marshal() (dAtA []byte, err error)
func (*PrivateKeyProvider) MarshalTo ¶
func (m *PrivateKeyProvider) MarshalTo(dAtA []byte) (int, error)
func (*PrivateKeyProvider) MarshalToSizedBuffer ¶
func (m *PrivateKeyProvider) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*PrivateKeyProvider) ProtoMessage ¶
func (*PrivateKeyProvider) ProtoMessage()
func (*PrivateKeyProvider) Reset ¶
func (m *PrivateKeyProvider) Reset()
func (*PrivateKeyProvider) Size ¶
func (m *PrivateKeyProvider) Size() (n int)
func (*PrivateKeyProvider) String ¶
func (m *PrivateKeyProvider) String() string
func (*PrivateKeyProvider) Unmarshal ¶
func (m *PrivateKeyProvider) Unmarshal(dAtA []byte) error
func (*PrivateKeyProvider) Validate ¶
func (m *PrivateKeyProvider) Validate() error
Validate checks the field values on PrivateKeyProvider with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*PrivateKeyProvider) XXX_DiscardUnknown ¶
func (m *PrivateKeyProvider) XXX_DiscardUnknown()
func (*PrivateKeyProvider) XXX_Marshal ¶
func (m *PrivateKeyProvider) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*PrivateKeyProvider) XXX_Merge ¶
func (m *PrivateKeyProvider) XXX_Merge(src proto.Message)
func (*PrivateKeyProvider) XXX_OneofWrappers ¶
func (*PrivateKeyProvider) XXX_OneofWrappers() []interface{}
XXX_OneofWrappers is for the internal use of the proto package.
func (*PrivateKeyProvider) XXX_Size ¶
func (m *PrivateKeyProvider) XXX_Size() int
func (*PrivateKeyProvider) XXX_Unmarshal ¶
func (m *PrivateKeyProvider) XXX_Unmarshal(b []byte) error
type PrivateKeyProviderValidationError ¶
type PrivateKeyProviderValidationError struct {
// contains filtered or unexported fields
}
PrivateKeyProviderValidationError is the validation error returned by PrivateKeyProvider.Validate if the designated constraints aren't met.
func (PrivateKeyProviderValidationError) Cause ¶
func (e PrivateKeyProviderValidationError) Cause() error
Cause function returns cause value.
func (PrivateKeyProviderValidationError) Error ¶
func (e PrivateKeyProviderValidationError) Error() string
Error satisfies the builtin error interface
func (PrivateKeyProviderValidationError) ErrorName ¶
func (e PrivateKeyProviderValidationError) ErrorName() string
ErrorName returns error name.
func (PrivateKeyProviderValidationError) Field ¶
func (e PrivateKeyProviderValidationError) Field() string
Field function returns field value.
func (PrivateKeyProviderValidationError) Key ¶
func (e PrivateKeyProviderValidationError) Key() bool
Key function returns key value.
func (PrivateKeyProviderValidationError) Reason ¶
func (e PrivateKeyProviderValidationError) Reason() string
Reason function returns reason value.
type PrivateKeyProvider_TypedConfig ¶
type PrivateKeyProvider_TypedConfig struct {
TypedConfig *types.Any `protobuf:"bytes,3,opt,name=typed_config,json=typedConfig,proto3,oneof" json:"typed_config,omitempty"`
}
func (*PrivateKeyProvider_TypedConfig) MarshalTo ¶
func (m *PrivateKeyProvider_TypedConfig) MarshalTo(dAtA []byte) (int, error)
func (*PrivateKeyProvider_TypedConfig) MarshalToSizedBuffer ¶
func (m *PrivateKeyProvider_TypedConfig) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*PrivateKeyProvider_TypedConfig) Size ¶
func (m *PrivateKeyProvider_TypedConfig) Size() (n int)
type SdsSecretConfig ¶
type SdsSecretConfig struct { // Name (FQDN, UUID, SPKI, SHA256, etc.) by which the secret can be uniquely referred to. // When both name and config are specified, then secret can be fetched and/or reloaded via // SDS. When only name is specified, then secret will be loaded from static resources. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` SdsConfig *v4alpha.ConfigSource `protobuf:"bytes,2,opt,name=sds_config,json=sdsConfig,proto3" json:"sds_config,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*SdsSecretConfig) Descriptor ¶
func (*SdsSecretConfig) Descriptor() ([]byte, []int)
func (*SdsSecretConfig) GetName ¶
func (m *SdsSecretConfig) GetName() string
func (*SdsSecretConfig) GetSdsConfig ¶
func (m *SdsSecretConfig) GetSdsConfig() *v4alpha.ConfigSource
func (*SdsSecretConfig) Marshal ¶
func (m *SdsSecretConfig) Marshal() (dAtA []byte, err error)
func (*SdsSecretConfig) MarshalToSizedBuffer ¶
func (m *SdsSecretConfig) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*SdsSecretConfig) ProtoMessage ¶
func (*SdsSecretConfig) ProtoMessage()
func (*SdsSecretConfig) Reset ¶
func (m *SdsSecretConfig) Reset()
func (*SdsSecretConfig) Size ¶
func (m *SdsSecretConfig) Size() (n int)
func (*SdsSecretConfig) String ¶
func (m *SdsSecretConfig) String() string
func (*SdsSecretConfig) Unmarshal ¶
func (m *SdsSecretConfig) Unmarshal(dAtA []byte) error
func (*SdsSecretConfig) Validate ¶
func (m *SdsSecretConfig) Validate() error
Validate checks the field values on SdsSecretConfig with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*SdsSecretConfig) XXX_DiscardUnknown ¶
func (m *SdsSecretConfig) XXX_DiscardUnknown()
func (*SdsSecretConfig) XXX_Marshal ¶
func (m *SdsSecretConfig) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*SdsSecretConfig) XXX_Merge ¶
func (m *SdsSecretConfig) XXX_Merge(src proto.Message)
func (*SdsSecretConfig) XXX_Size ¶
func (m *SdsSecretConfig) XXX_Size() int
func (*SdsSecretConfig) XXX_Unmarshal ¶
func (m *SdsSecretConfig) XXX_Unmarshal(b []byte) error
type SdsSecretConfigValidationError ¶
type SdsSecretConfigValidationError struct {
// contains filtered or unexported fields
}
SdsSecretConfigValidationError is the validation error returned by SdsSecretConfig.Validate if the designated constraints aren't met.
func (SdsSecretConfigValidationError) Cause ¶
func (e SdsSecretConfigValidationError) Cause() error
Cause function returns cause value.
func (SdsSecretConfigValidationError) Error ¶
func (e SdsSecretConfigValidationError) Error() string
Error satisfies the builtin error interface
func (SdsSecretConfigValidationError) ErrorName ¶
func (e SdsSecretConfigValidationError) ErrorName() string
ErrorName returns error name.
func (SdsSecretConfigValidationError) Field ¶
func (e SdsSecretConfigValidationError) Field() string
Field function returns field value.
func (SdsSecretConfigValidationError) Key ¶
func (e SdsSecretConfigValidationError) Key() bool
Key function returns key value.
func (SdsSecretConfigValidationError) Reason ¶
func (e SdsSecretConfigValidationError) Reason() string
Reason function returns reason value.
type Secret ¶
type Secret struct { // Name (FQDN, UUID, SPKI, SHA256, etc.) by which the secret can be uniquely referred to. Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` // Types that are valid to be assigned to Type: // *Secret_TlsCertificate // *Secret_SessionTicketKeys // *Secret_ValidationContext // *Secret_GenericSecret Type isSecret_Type `protobuf_oneof:"type"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
[#next-free-field: 6]
func (*Secret) Descriptor ¶
func (*Secret) GetGenericSecret ¶
func (m *Secret) GetGenericSecret() *GenericSecret
func (*Secret) GetSessionTicketKeys ¶
func (m *Secret) GetSessionTicketKeys() *TlsSessionTicketKeys
func (*Secret) GetTlsCertificate ¶
func (m *Secret) GetTlsCertificate() *TlsCertificate
func (*Secret) GetValidationContext ¶
func (m *Secret) GetValidationContext() *CertificateValidationContext
func (*Secret) MarshalToSizedBuffer ¶
func (*Secret) ProtoMessage ¶
func (*Secret) ProtoMessage()
func (*Secret) Validate ¶
Validate checks the field values on Secret with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*Secret) XXX_DiscardUnknown ¶
func (m *Secret) XXX_DiscardUnknown()
func (*Secret) XXX_Marshal ¶
func (*Secret) XXX_OneofWrappers ¶
func (*Secret) XXX_OneofWrappers() []interface{}
XXX_OneofWrappers is for the internal use of the proto package.
func (*Secret) XXX_Unmarshal ¶
type SecretValidationError ¶
type SecretValidationError struct {
// contains filtered or unexported fields
}
SecretValidationError is the validation error returned by Secret.Validate if the designated constraints aren't met.
func (SecretValidationError) Cause ¶
func (e SecretValidationError) Cause() error
Cause function returns cause value.
func (SecretValidationError) Error ¶
func (e SecretValidationError) Error() string
Error satisfies the builtin error interface
func (SecretValidationError) ErrorName ¶
func (e SecretValidationError) ErrorName() string
ErrorName returns error name.
func (SecretValidationError) Field ¶
func (e SecretValidationError) Field() string
Field function returns field value.
func (SecretValidationError) Key ¶
func (e SecretValidationError) Key() bool
Key function returns key value.
func (SecretValidationError) Reason ¶
func (e SecretValidationError) Reason() string
Reason function returns reason value.
type Secret_GenericSecret ¶
type Secret_GenericSecret struct {
GenericSecret *GenericSecret `protobuf:"bytes,5,opt,name=generic_secret,json=genericSecret,proto3,oneof" json:"generic_secret,omitempty"`
}
func (*Secret_GenericSecret) MarshalTo ¶
func (m *Secret_GenericSecret) MarshalTo(dAtA []byte) (int, error)
func (*Secret_GenericSecret) MarshalToSizedBuffer ¶
func (m *Secret_GenericSecret) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*Secret_GenericSecret) Size ¶
func (m *Secret_GenericSecret) Size() (n int)
type Secret_SessionTicketKeys ¶
type Secret_SessionTicketKeys struct {
SessionTicketKeys *TlsSessionTicketKeys `protobuf:"bytes,3,opt,name=session_ticket_keys,json=sessionTicketKeys,proto3,oneof" json:"session_ticket_keys,omitempty"`
}
func (*Secret_SessionTicketKeys) MarshalTo ¶
func (m *Secret_SessionTicketKeys) MarshalTo(dAtA []byte) (int, error)
func (*Secret_SessionTicketKeys) MarshalToSizedBuffer ¶
func (m *Secret_SessionTicketKeys) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*Secret_SessionTicketKeys) Size ¶
func (m *Secret_SessionTicketKeys) Size() (n int)
type Secret_TlsCertificate ¶
type Secret_TlsCertificate struct {
TlsCertificate *TlsCertificate `protobuf:"bytes,2,opt,name=tls_certificate,json=tlsCertificate,proto3,oneof" json:"tls_certificate,omitempty"`
}
func (*Secret_TlsCertificate) MarshalTo ¶
func (m *Secret_TlsCertificate) MarshalTo(dAtA []byte) (int, error)
func (*Secret_TlsCertificate) MarshalToSizedBuffer ¶
func (m *Secret_TlsCertificate) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*Secret_TlsCertificate) Size ¶
func (m *Secret_TlsCertificate) Size() (n int)
type Secret_ValidationContext ¶
type Secret_ValidationContext struct {
ValidationContext *CertificateValidationContext `protobuf:"bytes,4,opt,name=validation_context,json=validationContext,proto3,oneof" json:"validation_context,omitempty"`
}
func (*Secret_ValidationContext) MarshalTo ¶
func (m *Secret_ValidationContext) MarshalTo(dAtA []byte) (int, error)
func (*Secret_ValidationContext) MarshalToSizedBuffer ¶
func (m *Secret_ValidationContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*Secret_ValidationContext) Size ¶
func (m *Secret_ValidationContext) Size() (n int)
type TlsCertificate ¶
type TlsCertificate struct { // The TLS certificate chain. CertificateChain *v4alpha.DataSource `protobuf:"bytes,1,opt,name=certificate_chain,json=certificateChain,proto3" json:"certificate_chain,omitempty"` // The TLS private key. PrivateKey *v4alpha.DataSource `protobuf:"bytes,2,opt,name=private_key,json=privateKey,proto3" json:"private_key,omitempty"` // BoringSSL private key method provider. This is an alternative to :ref:`private_key // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be // marked as “oneof“ due to API compatibility reasons. Setting both :ref:`private_key // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and // :ref:`private_key_provider // <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an // error. PrivateKeyProvider *PrivateKeyProvider `protobuf:"bytes,6,opt,name=private_key_provider,json=privateKeyProvider,proto3" json:"private_key_provider,omitempty"` // The password to decrypt the TLS private key. If this field is not set, it is assumed that the // TLS private key is not password encrypted. Password *v4alpha.DataSource `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` // [#not-implemented-hide:] OcspStaple *v4alpha.DataSource `protobuf:"bytes,4,opt,name=ocsp_staple,json=ocspStaple,proto3" json:"ocsp_staple,omitempty"` // [#not-implemented-hide:] SignedCertificateTimestamp []*v4alpha.DataSource `` /* 141-byte string literal not displayed */ XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
[#next-free-field: 7]
func (*TlsCertificate) Descriptor ¶
func (*TlsCertificate) Descriptor() ([]byte, []int)
func (*TlsCertificate) GetCertificateChain ¶
func (m *TlsCertificate) GetCertificateChain() *v4alpha.DataSource
func (*TlsCertificate) GetOcspStaple ¶
func (m *TlsCertificate) GetOcspStaple() *v4alpha.DataSource
func (*TlsCertificate) GetPassword ¶
func (m *TlsCertificate) GetPassword() *v4alpha.DataSource
func (*TlsCertificate) GetPrivateKey ¶
func (m *TlsCertificate) GetPrivateKey() *v4alpha.DataSource
func (*TlsCertificate) GetPrivateKeyProvider ¶
func (m *TlsCertificate) GetPrivateKeyProvider() *PrivateKeyProvider
func (*TlsCertificate) GetSignedCertificateTimestamp ¶
func (m *TlsCertificate) GetSignedCertificateTimestamp() []*v4alpha.DataSource
func (*TlsCertificate) Marshal ¶
func (m *TlsCertificate) Marshal() (dAtA []byte, err error)
func (*TlsCertificate) MarshalToSizedBuffer ¶
func (m *TlsCertificate) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*TlsCertificate) ProtoMessage ¶
func (*TlsCertificate) ProtoMessage()
func (*TlsCertificate) Reset ¶
func (m *TlsCertificate) Reset()
func (*TlsCertificate) Size ¶
func (m *TlsCertificate) Size() (n int)
func (*TlsCertificate) String ¶
func (m *TlsCertificate) String() string
func (*TlsCertificate) Unmarshal ¶
func (m *TlsCertificate) Unmarshal(dAtA []byte) error
func (*TlsCertificate) Validate ¶
func (m *TlsCertificate) Validate() error
Validate checks the field values on TlsCertificate with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*TlsCertificate) XXX_DiscardUnknown ¶
func (m *TlsCertificate) XXX_DiscardUnknown()
func (*TlsCertificate) XXX_Marshal ¶
func (m *TlsCertificate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*TlsCertificate) XXX_Merge ¶
func (m *TlsCertificate) XXX_Merge(src proto.Message)
func (*TlsCertificate) XXX_Size ¶
func (m *TlsCertificate) XXX_Size() int
func (*TlsCertificate) XXX_Unmarshal ¶
func (m *TlsCertificate) XXX_Unmarshal(b []byte) error
type TlsCertificateValidationError ¶
type TlsCertificateValidationError struct {
// contains filtered or unexported fields
}
TlsCertificateValidationError is the validation error returned by TlsCertificate.Validate if the designated constraints aren't met.
func (TlsCertificateValidationError) Cause ¶
func (e TlsCertificateValidationError) Cause() error
Cause function returns cause value.
func (TlsCertificateValidationError) Error ¶
func (e TlsCertificateValidationError) Error() string
Error satisfies the builtin error interface
func (TlsCertificateValidationError) ErrorName ¶
func (e TlsCertificateValidationError) ErrorName() string
ErrorName returns error name.
func (TlsCertificateValidationError) Field ¶
func (e TlsCertificateValidationError) Field() string
Field function returns field value.
func (TlsCertificateValidationError) Key ¶
func (e TlsCertificateValidationError) Key() bool
Key function returns key value.
func (TlsCertificateValidationError) Reason ¶
func (e TlsCertificateValidationError) Reason() string
Reason function returns reason value.
type TlsParameters ¶
type TlsParameters struct { // Minimum TLS protocol version. By default, it's “TLSv1_2“ for clients and “TLSv1_0“ for // servers. TlsMinimumProtocolVersion TlsParameters_TlsProtocol `` /* 219-byte string literal not displayed */ // Maximum TLS protocol version. By default, it's “TLSv1_3“ for servers in non-FIPS builds, and // “TLSv1_2“ for clients and for servers using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`. TlsMaximumProtocolVersion TlsParameters_TlsProtocol `` /* 219-byte string literal not displayed */ // If specified, the TLS listener will only support the specified `cipher list // <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_ // when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not // specified, the default list will be used. // // In non-FIPS builds, the default cipher list is: // // .. code-block:: none // // [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305] // [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305] // ECDHE-ECDSA-AES128-SHA // ECDHE-RSA-AES128-SHA // AES128-GCM-SHA256 // AES128-SHA // ECDHE-ECDSA-AES256-GCM-SHA384 // ECDHE-RSA-AES256-GCM-SHA384 // ECDHE-ECDSA-AES256-SHA // ECDHE-RSA-AES256-SHA // AES256-GCM-SHA384 // AES256-SHA // // In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is: // // .. code-block:: none // // ECDHE-ECDSA-AES128-GCM-SHA256 // ECDHE-RSA-AES128-GCM-SHA256 // ECDHE-ECDSA-AES128-SHA // ECDHE-RSA-AES128-SHA // AES128-GCM-SHA256 // AES128-SHA // ECDHE-ECDSA-AES256-GCM-SHA384 // ECDHE-RSA-AES256-GCM-SHA384 // ECDHE-ECDSA-AES256-SHA // ECDHE-RSA-AES256-SHA // AES256-GCM-SHA384 // AES256-SHA CipherSuites []string `protobuf:"bytes,3,rep,name=cipher_suites,json=cipherSuites,proto3" json:"cipher_suites,omitempty"` // If specified, the TLS connection will only support the specified ECDH // curves. If not specified, the default curves will be used. // // In non-FIPS builds, the default curves are: // // .. code-block:: none // // X25519 // P-256 // // In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is: // // .. code-block:: none // // P-256 EcdhCurves []string `protobuf:"bytes,4,rep,name=ecdh_curves,json=ecdhCurves,proto3" json:"ecdh_curves,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*TlsParameters) Descriptor ¶
func (*TlsParameters) Descriptor() ([]byte, []int)
func (*TlsParameters) GetCipherSuites ¶
func (m *TlsParameters) GetCipherSuites() []string
func (*TlsParameters) GetEcdhCurves ¶
func (m *TlsParameters) GetEcdhCurves() []string
func (*TlsParameters) GetTlsMaximumProtocolVersion ¶
func (m *TlsParameters) GetTlsMaximumProtocolVersion() TlsParameters_TlsProtocol
func (*TlsParameters) GetTlsMinimumProtocolVersion ¶
func (m *TlsParameters) GetTlsMinimumProtocolVersion() TlsParameters_TlsProtocol
func (*TlsParameters) Marshal ¶
func (m *TlsParameters) Marshal() (dAtA []byte, err error)
func (*TlsParameters) MarshalToSizedBuffer ¶
func (m *TlsParameters) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*TlsParameters) ProtoMessage ¶
func (*TlsParameters) ProtoMessage()
func (*TlsParameters) Reset ¶
func (m *TlsParameters) Reset()
func (*TlsParameters) Size ¶
func (m *TlsParameters) Size() (n int)
func (*TlsParameters) String ¶
func (m *TlsParameters) String() string
func (*TlsParameters) Unmarshal ¶
func (m *TlsParameters) Unmarshal(dAtA []byte) error
func (*TlsParameters) Validate ¶
func (m *TlsParameters) Validate() error
Validate checks the field values on TlsParameters with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*TlsParameters) XXX_DiscardUnknown ¶
func (m *TlsParameters) XXX_DiscardUnknown()
func (*TlsParameters) XXX_Marshal ¶
func (m *TlsParameters) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*TlsParameters) XXX_Merge ¶
func (m *TlsParameters) XXX_Merge(src proto.Message)
func (*TlsParameters) XXX_Size ¶
func (m *TlsParameters) XXX_Size() int
func (*TlsParameters) XXX_Unmarshal ¶
func (m *TlsParameters) XXX_Unmarshal(b []byte) error
type TlsParametersValidationError ¶
type TlsParametersValidationError struct {
// contains filtered or unexported fields
}
TlsParametersValidationError is the validation error returned by TlsParameters.Validate if the designated constraints aren't met.
func (TlsParametersValidationError) Cause ¶
func (e TlsParametersValidationError) Cause() error
Cause function returns cause value.
func (TlsParametersValidationError) Error ¶
func (e TlsParametersValidationError) Error() string
Error satisfies the builtin error interface
func (TlsParametersValidationError) ErrorName ¶
func (e TlsParametersValidationError) ErrorName() string
ErrorName returns error name.
func (TlsParametersValidationError) Field ¶
func (e TlsParametersValidationError) Field() string
Field function returns field value.
func (TlsParametersValidationError) Key ¶
func (e TlsParametersValidationError) Key() bool
Key function returns key value.
func (TlsParametersValidationError) Reason ¶
func (e TlsParametersValidationError) Reason() string
Reason function returns reason value.
type TlsParameters_TlsProtocol ¶
type TlsParameters_TlsProtocol int32
const ( // Envoy will choose the optimal TLS version. TlsParameters_TLS_AUTO TlsParameters_TlsProtocol = 0 // TLS 1.0 TlsParameters_TLSv1_0 TlsParameters_TlsProtocol = 1 // TLS 1.1 TlsParameters_TLSv1_1 TlsParameters_TlsProtocol = 2 // TLS 1.2 TlsParameters_TLSv1_2 TlsParameters_TlsProtocol = 3 // TLS 1.3 TlsParameters_TLSv1_3 TlsParameters_TlsProtocol = 4 )
func (TlsParameters_TlsProtocol) EnumDescriptor ¶
func (TlsParameters_TlsProtocol) EnumDescriptor() ([]byte, []int)
func (TlsParameters_TlsProtocol) String ¶
func (x TlsParameters_TlsProtocol) String() string
type TlsSessionTicketKeys ¶
type TlsSessionTicketKeys struct { // Keys for encrypting and decrypting TLS session tickets. The // first key in the array contains the key to encrypt all new sessions created by this context. // All keys are candidates for decrypting received tickets. This allows for easy rotation of keys // by, for example, putting the new key first, and the previous key second. // // If :ref:`session_ticket_keys <envoy_api_field_extensions.transport_sockets.tls.v4alpha.DownstreamTlsContext.session_ticket_keys>` // is not specified, the TLS library will still support resuming sessions via tickets, but it will // use an internally-generated and managed key, so sessions cannot be resumed across hot restarts // or on different hosts. // // Each key must contain exactly 80 bytes of cryptographically-secure random data. For // example, the output of “openssl rand 80“. // // .. attention:: // // Using this feature has serious security considerations and risks. Improper handling of keys // may result in loss of secrecy in connections, even if ciphers supporting perfect forward // secrecy are used. See https://www.imperialviolet.org/2013/06/27/botchingpfs.html for some // discussion. To minimize the risk, you must: // // * Keep the session ticket keys at least as secure as your TLS certificate private keys // * Rotate session ticket keys at least daily, and preferably hourly // * Always generate keys using a cryptographically-secure random data source Keys []*v4alpha.DataSource `protobuf:"bytes,1,rep,name=keys,proto3" json:"keys,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*TlsSessionTicketKeys) Descriptor ¶
func (*TlsSessionTicketKeys) Descriptor() ([]byte, []int)
func (*TlsSessionTicketKeys) GetKeys ¶
func (m *TlsSessionTicketKeys) GetKeys() []*v4alpha.DataSource
func (*TlsSessionTicketKeys) Marshal ¶
func (m *TlsSessionTicketKeys) Marshal() (dAtA []byte, err error)
func (*TlsSessionTicketKeys) MarshalTo ¶
func (m *TlsSessionTicketKeys) MarshalTo(dAtA []byte) (int, error)
func (*TlsSessionTicketKeys) MarshalToSizedBuffer ¶
func (m *TlsSessionTicketKeys) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*TlsSessionTicketKeys) ProtoMessage ¶
func (*TlsSessionTicketKeys) ProtoMessage()
func (*TlsSessionTicketKeys) Reset ¶
func (m *TlsSessionTicketKeys) Reset()
func (*TlsSessionTicketKeys) Size ¶
func (m *TlsSessionTicketKeys) Size() (n int)
func (*TlsSessionTicketKeys) String ¶
func (m *TlsSessionTicketKeys) String() string
func (*TlsSessionTicketKeys) Unmarshal ¶
func (m *TlsSessionTicketKeys) Unmarshal(dAtA []byte) error
func (*TlsSessionTicketKeys) Validate ¶
func (m *TlsSessionTicketKeys) Validate() error
Validate checks the field values on TlsSessionTicketKeys with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*TlsSessionTicketKeys) XXX_DiscardUnknown ¶
func (m *TlsSessionTicketKeys) XXX_DiscardUnknown()
func (*TlsSessionTicketKeys) XXX_Marshal ¶
func (m *TlsSessionTicketKeys) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*TlsSessionTicketKeys) XXX_Merge ¶
func (m *TlsSessionTicketKeys) XXX_Merge(src proto.Message)
func (*TlsSessionTicketKeys) XXX_Size ¶
func (m *TlsSessionTicketKeys) XXX_Size() int
func (*TlsSessionTicketKeys) XXX_Unmarshal ¶
func (m *TlsSessionTicketKeys) XXX_Unmarshal(b []byte) error
type TlsSessionTicketKeysValidationError ¶
type TlsSessionTicketKeysValidationError struct {
// contains filtered or unexported fields
}
TlsSessionTicketKeysValidationError is the validation error returned by TlsSessionTicketKeys.Validate if the designated constraints aren't met.
func (TlsSessionTicketKeysValidationError) Cause ¶
func (e TlsSessionTicketKeysValidationError) Cause() error
Cause function returns cause value.
func (TlsSessionTicketKeysValidationError) Error ¶
func (e TlsSessionTicketKeysValidationError) Error() string
Error satisfies the builtin error interface
func (TlsSessionTicketKeysValidationError) ErrorName ¶
func (e TlsSessionTicketKeysValidationError) ErrorName() string
ErrorName returns error name.
func (TlsSessionTicketKeysValidationError) Field ¶
func (e TlsSessionTicketKeysValidationError) Field() string
Field function returns field value.
func (TlsSessionTicketKeysValidationError) Key ¶
func (e TlsSessionTicketKeysValidationError) Key() bool
Key function returns key value.
func (TlsSessionTicketKeysValidationError) Reason ¶
func (e TlsSessionTicketKeysValidationError) Reason() string
Reason function returns reason value.
type UpstreamTlsContext ¶
type UpstreamTlsContext struct { // Common TLS context settings. // // .. attention:: // // Server certificate verification is not enabled by default. Configure // :ref:`trusted_ca<envoy_api_field_extensions.transport_sockets.tls.v4alpha.CertificateValidationContext.trusted_ca>` to enable // verification. CommonTlsContext *CommonTlsContext `protobuf:"bytes,1,opt,name=common_tls_context,json=commonTlsContext,proto3" json:"common_tls_context,omitempty"` // SNI string to use when creating TLS backend connections. Sni string `protobuf:"bytes,2,opt,name=sni,proto3" json:"sni,omitempty"` // If true, server-initiated TLS renegotiation will be allowed. // // .. attention:: // // TLS renegotiation is considered insecure and shouldn't be used unless absolutely necessary. AllowRenegotiation bool `protobuf:"varint,3,opt,name=allow_renegotiation,json=allowRenegotiation,proto3" json:"allow_renegotiation,omitempty"` // Maximum number of session keys (Pre-Shared Keys for TLSv1.3+, Session IDs and Session Tickets // for TLSv1.2 and older) to store for the purpose of session resumption. // // Defaults to 1, setting this to 0 disables session resumption. MaxSessionKeys *types.UInt32Value `protobuf:"bytes,4,opt,name=max_session_keys,json=maxSessionKeys,proto3" json:"max_session_keys,omitempty"` XXX_NoUnkeyedLiteral struct{} `json:"-"` XXX_unrecognized []byte `json:"-"` XXX_sizecache int32 `json:"-"` }
func (*UpstreamTlsContext) Descriptor ¶
func (*UpstreamTlsContext) Descriptor() ([]byte, []int)
func (*UpstreamTlsContext) GetAllowRenegotiation ¶
func (m *UpstreamTlsContext) GetAllowRenegotiation() bool
func (*UpstreamTlsContext) GetCommonTlsContext ¶
func (m *UpstreamTlsContext) GetCommonTlsContext() *CommonTlsContext
func (*UpstreamTlsContext) GetMaxSessionKeys ¶
func (m *UpstreamTlsContext) GetMaxSessionKeys() *types.UInt32Value
func (*UpstreamTlsContext) GetSni ¶
func (m *UpstreamTlsContext) GetSni() string
func (*UpstreamTlsContext) Marshal ¶
func (m *UpstreamTlsContext) Marshal() (dAtA []byte, err error)
func (*UpstreamTlsContext) MarshalTo ¶
func (m *UpstreamTlsContext) MarshalTo(dAtA []byte) (int, error)
func (*UpstreamTlsContext) MarshalToSizedBuffer ¶
func (m *UpstreamTlsContext) MarshalToSizedBuffer(dAtA []byte) (int, error)
func (*UpstreamTlsContext) ProtoMessage ¶
func (*UpstreamTlsContext) ProtoMessage()
func (*UpstreamTlsContext) Reset ¶
func (m *UpstreamTlsContext) Reset()
func (*UpstreamTlsContext) Size ¶
func (m *UpstreamTlsContext) Size() (n int)
func (*UpstreamTlsContext) String ¶
func (m *UpstreamTlsContext) String() string
func (*UpstreamTlsContext) Unmarshal ¶
func (m *UpstreamTlsContext) Unmarshal(dAtA []byte) error
func (*UpstreamTlsContext) Validate ¶
func (m *UpstreamTlsContext) Validate() error
Validate checks the field values on UpstreamTlsContext with the rules defined in the proto definition for this message. If any rules are violated, an error is returned.
func (*UpstreamTlsContext) XXX_DiscardUnknown ¶
func (m *UpstreamTlsContext) XXX_DiscardUnknown()
func (*UpstreamTlsContext) XXX_Marshal ¶
func (m *UpstreamTlsContext) XXX_Marshal(b []byte, deterministic bool) ([]byte, error)
func (*UpstreamTlsContext) XXX_Merge ¶
func (m *UpstreamTlsContext) XXX_Merge(src proto.Message)
func (*UpstreamTlsContext) XXX_Size ¶
func (m *UpstreamTlsContext) XXX_Size() int
func (*UpstreamTlsContext) XXX_Unmarshal ¶
func (m *UpstreamTlsContext) XXX_Unmarshal(b []byte) error
type UpstreamTlsContextValidationError ¶
type UpstreamTlsContextValidationError struct {
// contains filtered or unexported fields
}
UpstreamTlsContextValidationError is the validation error returned by UpstreamTlsContext.Validate if the designated constraints aren't met.
func (UpstreamTlsContextValidationError) Cause ¶
func (e UpstreamTlsContextValidationError) Cause() error
Cause function returns cause value.
func (UpstreamTlsContextValidationError) Error ¶
func (e UpstreamTlsContextValidationError) Error() string
Error satisfies the builtin error interface
func (UpstreamTlsContextValidationError) ErrorName ¶
func (e UpstreamTlsContextValidationError) ErrorName() string
ErrorName returns error name.
func (UpstreamTlsContextValidationError) Field ¶
func (e UpstreamTlsContextValidationError) Field() string
Field function returns field value.
func (UpstreamTlsContextValidationError) Key ¶
func (e UpstreamTlsContextValidationError) Key() bool
Key function returns key value.
func (UpstreamTlsContextValidationError) Reason ¶
func (e UpstreamTlsContextValidationError) Reason() string
Reason function returns reason value.