gitee.com/ks-custle/core-gm@v0.0.0-20230922171213-b83bdd97b62c/go-control-plane/envoy/api/v2/auth/common.pb.go (about) 1 // Code generated by protoc-gen-go. DO NOT EDIT. 2 // versions: 3 // protoc-gen-go v1.25.0 4 // protoc v3.16.0 5 // source: envoy/api/v2/auth/common.proto 6 7 package envoy_api_v2_auth 8 9 import ( 10 _ "github.com/cncf/xds/go/udpa/annotations" 11 core "gitee.com/ks-custle/core-gm/go-control-plane/envoy/api/v2/core" 12 matcher "gitee.com/ks-custle/core-gm/go-control-plane/envoy/type/matcher" 13 _ "github.com/envoyproxy/protoc-gen-validate/validate" 14 proto "github.com/golang/protobuf/proto" 15 any "github.com/golang/protobuf/ptypes/any" 16 _struct "github.com/golang/protobuf/ptypes/struct" 17 wrappers "github.com/golang/protobuf/ptypes/wrappers" 18 protoreflect "google.golang.org/protobuf/reflect/protoreflect" 19 protoimpl "google.golang.org/protobuf/runtime/protoimpl" 20 reflect "reflect" 21 sync "sync" 22 ) 23 24 const ( 25 // Verify that this generated code is sufficiently up-to-date. 26 _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) 27 // Verify that runtime/protoimpl is sufficiently up-to-date. 28 _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) 29 ) 30 31 // This is a compile-time assertion that a sufficiently up-to-date version 32 // of the legacy proto package is being used. 33 const _ = proto.ProtoPackageIsVersion4 34 35 type TlsParameters_TlsProtocol int32 36 37 const ( 38 // Envoy will choose the optimal TLS version. 39 TlsParameters_TLS_AUTO TlsParameters_TlsProtocol = 0 40 // TLS 1.0 41 TlsParameters_TLSv1_0 TlsParameters_TlsProtocol = 1 42 // TLS 1.1 43 TlsParameters_TLSv1_1 TlsParameters_TlsProtocol = 2 44 // TLS 1.2 45 TlsParameters_TLSv1_2 TlsParameters_TlsProtocol = 3 46 // TLS 1.3 47 TlsParameters_TLSv1_3 TlsParameters_TlsProtocol = 4 48 ) 49 50 // Enum value maps for TlsParameters_TlsProtocol. 51 var ( 52 TlsParameters_TlsProtocol_name = map[int32]string{ 53 0: "TLS_AUTO", 54 1: "TLSv1_0", 55 2: "TLSv1_1", 56 3: "TLSv1_2", 57 4: "TLSv1_3", 58 } 59 TlsParameters_TlsProtocol_value = map[string]int32{ 60 "TLS_AUTO": 0, 61 "TLSv1_0": 1, 62 "TLSv1_1": 2, 63 "TLSv1_2": 3, 64 "TLSv1_3": 4, 65 } 66 ) 67 68 func (x TlsParameters_TlsProtocol) Enum() *TlsParameters_TlsProtocol { 69 p := new(TlsParameters_TlsProtocol) 70 *p = x 71 return p 72 } 73 74 func (x TlsParameters_TlsProtocol) String() string { 75 return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) 76 } 77 78 func (TlsParameters_TlsProtocol) Descriptor() protoreflect.EnumDescriptor { 79 return file_envoy_api_v2_auth_common_proto_enumTypes[0].Descriptor() 80 } 81 82 func (TlsParameters_TlsProtocol) Type() protoreflect.EnumType { 83 return &file_envoy_api_v2_auth_common_proto_enumTypes[0] 84 } 85 86 func (x TlsParameters_TlsProtocol) Number() protoreflect.EnumNumber { 87 return protoreflect.EnumNumber(x) 88 } 89 90 // Deprecated: Use TlsParameters_TlsProtocol.Descriptor instead. 91 func (TlsParameters_TlsProtocol) EnumDescriptor() ([]byte, []int) { 92 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{0, 0} 93 } 94 95 // Peer certificate verification mode. 96 type CertificateValidationContext_TrustChainVerification int32 97 98 const ( 99 // Perform default certificate verification (e.g., against CA / verification lists) 100 CertificateValidationContext_VERIFY_TRUST_CHAIN CertificateValidationContext_TrustChainVerification = 0 101 // Connections where the certificate fails verification will be permitted. 102 // For HTTP connections, the result of certificate verification can be used in route matching. ( 103 // see :ref:`validated <envoy_api_field_route.RouteMatch.TlsContextMatchOptions.validated>` ). 104 CertificateValidationContext_ACCEPT_UNTRUSTED CertificateValidationContext_TrustChainVerification = 1 105 ) 106 107 // Enum value maps for CertificateValidationContext_TrustChainVerification. 108 var ( 109 CertificateValidationContext_TrustChainVerification_name = map[int32]string{ 110 0: "VERIFY_TRUST_CHAIN", 111 1: "ACCEPT_UNTRUSTED", 112 } 113 CertificateValidationContext_TrustChainVerification_value = map[string]int32{ 114 "VERIFY_TRUST_CHAIN": 0, 115 "ACCEPT_UNTRUSTED": 1, 116 } 117 ) 118 119 func (x CertificateValidationContext_TrustChainVerification) Enum() *CertificateValidationContext_TrustChainVerification { 120 p := new(CertificateValidationContext_TrustChainVerification) 121 *p = x 122 return p 123 } 124 125 func (x CertificateValidationContext_TrustChainVerification) String() string { 126 return protoimpl.X.EnumStringOf(x.Descriptor(), protoreflect.EnumNumber(x)) 127 } 128 129 func (CertificateValidationContext_TrustChainVerification) Descriptor() protoreflect.EnumDescriptor { 130 return file_envoy_api_v2_auth_common_proto_enumTypes[1].Descriptor() 131 } 132 133 func (CertificateValidationContext_TrustChainVerification) Type() protoreflect.EnumType { 134 return &file_envoy_api_v2_auth_common_proto_enumTypes[1] 135 } 136 137 func (x CertificateValidationContext_TrustChainVerification) Number() protoreflect.EnumNumber { 138 return protoreflect.EnumNumber(x) 139 } 140 141 // Deprecated: Use CertificateValidationContext_TrustChainVerification.Descriptor instead. 142 func (CertificateValidationContext_TrustChainVerification) EnumDescriptor() ([]byte, []int) { 143 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{4, 0} 144 } 145 146 type TlsParameters struct { 147 state protoimpl.MessageState 148 sizeCache protoimpl.SizeCache 149 unknownFields protoimpl.UnknownFields 150 151 // Minimum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_0`` for 152 // servers. 153 TlsMinimumProtocolVersion TlsParameters_TlsProtocol `protobuf:"varint,1,opt,name=tls_minimum_protocol_version,json=tlsMinimumProtocolVersion,proto3,enum=envoy.api.v2.auth.TlsParameters_TlsProtocol" json:"tls_minimum_protocol_version,omitempty"` 154 // Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for 155 // servers. 156 TlsMaximumProtocolVersion TlsParameters_TlsProtocol `protobuf:"varint,2,opt,name=tls_maximum_protocol_version,json=tlsMaximumProtocolVersion,proto3,enum=envoy.api.v2.auth.TlsParameters_TlsProtocol" json:"tls_maximum_protocol_version,omitempty"` 157 // If specified, the TLS listener will only support the specified `cipher list 158 // <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_ 159 // when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not 160 // specified, the default list will be used. 161 // 162 // In non-FIPS builds, the default cipher list is: 163 // 164 // .. code-block:: none 165 // 166 // [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305] 167 // [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305] 168 // ECDHE-ECDSA-AES128-SHA 169 // ECDHE-RSA-AES128-SHA 170 // AES128-GCM-SHA256 171 // AES128-SHA 172 // ECDHE-ECDSA-AES256-GCM-SHA384 173 // ECDHE-RSA-AES256-GCM-SHA384 174 // ECDHE-ECDSA-AES256-SHA 175 // ECDHE-RSA-AES256-SHA 176 // AES256-GCM-SHA384 177 // AES256-SHA 178 // 179 // In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is: 180 // 181 // .. code-block:: none 182 // 183 // ECDHE-ECDSA-AES128-GCM-SHA256 184 // ECDHE-RSA-AES128-GCM-SHA256 185 // ECDHE-ECDSA-AES128-SHA 186 // ECDHE-RSA-AES128-SHA 187 // AES128-GCM-SHA256 188 // AES128-SHA 189 // ECDHE-ECDSA-AES256-GCM-SHA384 190 // ECDHE-RSA-AES256-GCM-SHA384 191 // ECDHE-ECDSA-AES256-SHA 192 // ECDHE-RSA-AES256-SHA 193 // AES256-GCM-SHA384 194 // AES256-SHA 195 CipherSuites []string `protobuf:"bytes,3,rep,name=cipher_suites,json=cipherSuites,proto3" json:"cipher_suites,omitempty"` 196 // If specified, the TLS connection will only support the specified ECDH 197 // curves. If not specified, the default curves will be used. 198 // 199 // In non-FIPS builds, the default curves are: 200 // 201 // .. code-block:: none 202 // 203 // X25519 204 // P-256 205 // 206 // In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is: 207 // 208 // .. code-block:: none 209 // 210 // P-256 211 EcdhCurves []string `protobuf:"bytes,4,rep,name=ecdh_curves,json=ecdhCurves,proto3" json:"ecdh_curves,omitempty"` 212 } 213 214 func (x *TlsParameters) Reset() { 215 *x = TlsParameters{} 216 if protoimpl.UnsafeEnabled { 217 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[0] 218 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 219 ms.StoreMessageInfo(mi) 220 } 221 } 222 223 func (x *TlsParameters) String() string { 224 return protoimpl.X.MessageStringOf(x) 225 } 226 227 func (*TlsParameters) ProtoMessage() {} 228 229 func (x *TlsParameters) ProtoReflect() protoreflect.Message { 230 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[0] 231 if protoimpl.UnsafeEnabled && x != nil { 232 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 233 if ms.LoadMessageInfo() == nil { 234 ms.StoreMessageInfo(mi) 235 } 236 return ms 237 } 238 return mi.MessageOf(x) 239 } 240 241 // Deprecated: Use TlsParameters.ProtoReflect.Descriptor instead. 242 func (*TlsParameters) Descriptor() ([]byte, []int) { 243 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{0} 244 } 245 246 func (x *TlsParameters) GetTlsMinimumProtocolVersion() TlsParameters_TlsProtocol { 247 if x != nil { 248 return x.TlsMinimumProtocolVersion 249 } 250 return TlsParameters_TLS_AUTO 251 } 252 253 func (x *TlsParameters) GetTlsMaximumProtocolVersion() TlsParameters_TlsProtocol { 254 if x != nil { 255 return x.TlsMaximumProtocolVersion 256 } 257 return TlsParameters_TLS_AUTO 258 } 259 260 func (x *TlsParameters) GetCipherSuites() []string { 261 if x != nil { 262 return x.CipherSuites 263 } 264 return nil 265 } 266 267 func (x *TlsParameters) GetEcdhCurves() []string { 268 if x != nil { 269 return x.EcdhCurves 270 } 271 return nil 272 } 273 274 // BoringSSL private key method configuration. The private key methods are used for external 275 // (potentially asynchronous) signing and decryption operations. Some use cases for private key 276 // methods would be TPM support and TLS acceleration. 277 type PrivateKeyProvider struct { 278 state protoimpl.MessageState 279 sizeCache protoimpl.SizeCache 280 unknownFields protoimpl.UnknownFields 281 282 // Private key method provider name. The name must match a 283 // supported private key method provider type. 284 ProviderName string `protobuf:"bytes,1,opt,name=provider_name,json=providerName,proto3" json:"provider_name,omitempty"` 285 // Private key method provider specific configuration. 286 // 287 // Types that are assignable to ConfigType: 288 // *PrivateKeyProvider_Config 289 // *PrivateKeyProvider_TypedConfig 290 ConfigType isPrivateKeyProvider_ConfigType `protobuf_oneof:"config_type"` 291 } 292 293 func (x *PrivateKeyProvider) Reset() { 294 *x = PrivateKeyProvider{} 295 if protoimpl.UnsafeEnabled { 296 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[1] 297 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 298 ms.StoreMessageInfo(mi) 299 } 300 } 301 302 func (x *PrivateKeyProvider) String() string { 303 return protoimpl.X.MessageStringOf(x) 304 } 305 306 func (*PrivateKeyProvider) ProtoMessage() {} 307 308 func (x *PrivateKeyProvider) ProtoReflect() protoreflect.Message { 309 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[1] 310 if protoimpl.UnsafeEnabled && x != nil { 311 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 312 if ms.LoadMessageInfo() == nil { 313 ms.StoreMessageInfo(mi) 314 } 315 return ms 316 } 317 return mi.MessageOf(x) 318 } 319 320 // Deprecated: Use PrivateKeyProvider.ProtoReflect.Descriptor instead. 321 func (*PrivateKeyProvider) Descriptor() ([]byte, []int) { 322 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{1} 323 } 324 325 func (x *PrivateKeyProvider) GetProviderName() string { 326 if x != nil { 327 return x.ProviderName 328 } 329 return "" 330 } 331 332 func (m *PrivateKeyProvider) GetConfigType() isPrivateKeyProvider_ConfigType { 333 if m != nil { 334 return m.ConfigType 335 } 336 return nil 337 } 338 339 // Deprecated: Do not use. 340 func (x *PrivateKeyProvider) GetConfig() *_struct.Struct { 341 if x, ok := x.GetConfigType().(*PrivateKeyProvider_Config); ok { 342 return x.Config 343 } 344 return nil 345 } 346 347 func (x *PrivateKeyProvider) GetTypedConfig() *any.Any { 348 if x, ok := x.GetConfigType().(*PrivateKeyProvider_TypedConfig); ok { 349 return x.TypedConfig 350 } 351 return nil 352 } 353 354 type isPrivateKeyProvider_ConfigType interface { 355 isPrivateKeyProvider_ConfigType() 356 } 357 358 type PrivateKeyProvider_Config struct { 359 // Deprecated: Do not use. 360 Config *_struct.Struct `protobuf:"bytes,2,opt,name=config,proto3,oneof"` 361 } 362 363 type PrivateKeyProvider_TypedConfig struct { 364 TypedConfig *any.Any `protobuf:"bytes,3,opt,name=typed_config,json=typedConfig,proto3,oneof"` 365 } 366 367 func (*PrivateKeyProvider_Config) isPrivateKeyProvider_ConfigType() {} 368 369 func (*PrivateKeyProvider_TypedConfig) isPrivateKeyProvider_ConfigType() {} 370 371 // [#next-free-field: 7] 372 type TlsCertificate struct { 373 state protoimpl.MessageState 374 sizeCache protoimpl.SizeCache 375 unknownFields protoimpl.UnknownFields 376 377 // The TLS certificate chain. 378 CertificateChain *core.DataSource `protobuf:"bytes,1,opt,name=certificate_chain,json=certificateChain,proto3" json:"certificate_chain,omitempty"` 379 // The TLS private key. 380 PrivateKey *core.DataSource `protobuf:"bytes,2,opt,name=private_key,json=privateKey,proto3" json:"private_key,omitempty"` 381 // BoringSSL private key method provider. This is an alternative to :ref:`private_key 382 // <envoy_api_field_auth.TlsCertificate.private_key>` field. This can't be 383 // marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key 384 // <envoy_api_field_auth.TlsCertificate.private_key>` and 385 // :ref:`private_key_provider 386 // <envoy_api_field_auth.TlsCertificate.private_key_provider>` fields will result in an 387 // error. 388 PrivateKeyProvider *PrivateKeyProvider `protobuf:"bytes,6,opt,name=private_key_provider,json=privateKeyProvider,proto3" json:"private_key_provider,omitempty"` 389 // The password to decrypt the TLS private key. If this field is not set, it is assumed that the 390 // TLS private key is not password encrypted. 391 Password *core.DataSource `protobuf:"bytes,3,opt,name=password,proto3" json:"password,omitempty"` 392 // [#not-implemented-hide:] 393 OcspStaple *core.DataSource `protobuf:"bytes,4,opt,name=ocsp_staple,json=ocspStaple,proto3" json:"ocsp_staple,omitempty"` 394 // [#not-implemented-hide:] 395 SignedCertificateTimestamp []*core.DataSource `protobuf:"bytes,5,rep,name=signed_certificate_timestamp,json=signedCertificateTimestamp,proto3" json:"signed_certificate_timestamp,omitempty"` 396 } 397 398 func (x *TlsCertificate) Reset() { 399 *x = TlsCertificate{} 400 if protoimpl.UnsafeEnabled { 401 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[2] 402 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 403 ms.StoreMessageInfo(mi) 404 } 405 } 406 407 func (x *TlsCertificate) String() string { 408 return protoimpl.X.MessageStringOf(x) 409 } 410 411 func (*TlsCertificate) ProtoMessage() {} 412 413 func (x *TlsCertificate) ProtoReflect() protoreflect.Message { 414 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[2] 415 if protoimpl.UnsafeEnabled && x != nil { 416 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 417 if ms.LoadMessageInfo() == nil { 418 ms.StoreMessageInfo(mi) 419 } 420 return ms 421 } 422 return mi.MessageOf(x) 423 } 424 425 // Deprecated: Use TlsCertificate.ProtoReflect.Descriptor instead. 426 func (*TlsCertificate) Descriptor() ([]byte, []int) { 427 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{2} 428 } 429 430 func (x *TlsCertificate) GetCertificateChain() *core.DataSource { 431 if x != nil { 432 return x.CertificateChain 433 } 434 return nil 435 } 436 437 func (x *TlsCertificate) GetPrivateKey() *core.DataSource { 438 if x != nil { 439 return x.PrivateKey 440 } 441 return nil 442 } 443 444 func (x *TlsCertificate) GetPrivateKeyProvider() *PrivateKeyProvider { 445 if x != nil { 446 return x.PrivateKeyProvider 447 } 448 return nil 449 } 450 451 func (x *TlsCertificate) GetPassword() *core.DataSource { 452 if x != nil { 453 return x.Password 454 } 455 return nil 456 } 457 458 func (x *TlsCertificate) GetOcspStaple() *core.DataSource { 459 if x != nil { 460 return x.OcspStaple 461 } 462 return nil 463 } 464 465 func (x *TlsCertificate) GetSignedCertificateTimestamp() []*core.DataSource { 466 if x != nil { 467 return x.SignedCertificateTimestamp 468 } 469 return nil 470 } 471 472 type TlsSessionTicketKeys struct { 473 state protoimpl.MessageState 474 sizeCache protoimpl.SizeCache 475 unknownFields protoimpl.UnknownFields 476 477 // Keys for encrypting and decrypting TLS session tickets. The 478 // first key in the array contains the key to encrypt all new sessions created by this context. 479 // All keys are candidates for decrypting received tickets. This allows for easy rotation of keys 480 // by, for example, putting the new key first, and the previous key second. 481 // 482 // If :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>` 483 // is not specified, the TLS library will still support resuming sessions via tickets, but it will 484 // use an internally-generated and managed key, so sessions cannot be resumed across hot restarts 485 // or on different hosts. 486 // 487 // Each key must contain exactly 80 bytes of cryptographically-secure random data. For 488 // example, the output of ``openssl rand 80``. 489 // 490 // .. attention:: 491 // 492 // Using this feature has serious security considerations and risks. Improper handling of keys 493 // may result in loss of secrecy in connections, even if ciphers supporting perfect forward 494 // secrecy are used. See https://www.imperialviolet.org/2013/06/27/botchingpfs.html for some 495 // discussion. To minimize the risk, you must: 496 // 497 // * Keep the session ticket keys at least as secure as your TLS certificate private keys 498 // * Rotate session ticket keys at least daily, and preferably hourly 499 // * Always generate keys using a cryptographically-secure random data source 500 Keys []*core.DataSource `protobuf:"bytes,1,rep,name=keys,proto3" json:"keys,omitempty"` 501 } 502 503 func (x *TlsSessionTicketKeys) Reset() { 504 *x = TlsSessionTicketKeys{} 505 if protoimpl.UnsafeEnabled { 506 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[3] 507 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 508 ms.StoreMessageInfo(mi) 509 } 510 } 511 512 func (x *TlsSessionTicketKeys) String() string { 513 return protoimpl.X.MessageStringOf(x) 514 } 515 516 func (*TlsSessionTicketKeys) ProtoMessage() {} 517 518 func (x *TlsSessionTicketKeys) ProtoReflect() protoreflect.Message { 519 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[3] 520 if protoimpl.UnsafeEnabled && x != nil { 521 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 522 if ms.LoadMessageInfo() == nil { 523 ms.StoreMessageInfo(mi) 524 } 525 return ms 526 } 527 return mi.MessageOf(x) 528 } 529 530 // Deprecated: Use TlsSessionTicketKeys.ProtoReflect.Descriptor instead. 531 func (*TlsSessionTicketKeys) Descriptor() ([]byte, []int) { 532 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{3} 533 } 534 535 func (x *TlsSessionTicketKeys) GetKeys() []*core.DataSource { 536 if x != nil { 537 return x.Keys 538 } 539 return nil 540 } 541 542 // [#next-free-field: 11] 543 type CertificateValidationContext struct { 544 state protoimpl.MessageState 545 sizeCache protoimpl.SizeCache 546 unknownFields protoimpl.UnknownFields 547 548 // TLS certificate data containing certificate authority certificates to use in verifying 549 // a presented peer certificate (e.g. server certificate for clusters or client certificate 550 // for listeners). If not specified and a peer certificate is presented it will not be 551 // verified. By default, a client certificate is optional, unless one of the additional 552 // options (:ref:`require_client_certificate 553 // <envoy_api_field_auth.DownstreamTlsContext.require_client_certificate>`, 554 // :ref:`verify_certificate_spki 555 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_spki>`, 556 // :ref:`verify_certificate_hash 557 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_hash>`, or 558 // :ref:`match_subject_alt_names 559 // <envoy_api_field_auth.CertificateValidationContext.match_subject_alt_names>`) is also 560 // specified. 561 // 562 // It can optionally contain certificate revocation lists, in which case Envoy will verify 563 // that the presented peer certificate has not been revoked by one of the included CRLs. 564 // 565 // See :ref:`the TLS overview <arch_overview_ssl_enabling_verification>` for a list of common 566 // system CA locations. 567 TrustedCa *core.DataSource `protobuf:"bytes,1,opt,name=trusted_ca,json=trustedCa,proto3" json:"trusted_ca,omitempty"` 568 // An optional list of base64-encoded SHA-256 hashes. If specified, Envoy will verify that the 569 // SHA-256 of the DER-encoded Subject Public Key Information (SPKI) of the presented certificate 570 // matches one of the specified values. 571 // 572 // A base64-encoded SHA-256 of the Subject Public Key Information (SPKI) of the certificate 573 // can be generated with the following command: 574 // 575 // .. code-block:: bash 576 // 577 // $ openssl x509 -in path/to/client.crt -noout -pubkey 578 // | openssl pkey -pubin -outform DER 579 // | openssl dgst -sha256 -binary 580 // | openssl enc -base64 581 // NvqYIYSbgK2vCJpQhObf77vv+bQWtc5ek5RIOwPiC9A= 582 // 583 // This is the format used in HTTP Public Key Pinning. 584 // 585 // When both: 586 // :ref:`verify_certificate_hash 587 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_hash>` and 588 // :ref:`verify_certificate_spki 589 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_spki>` are specified, 590 // a hash matching value from either of the lists will result in the certificate being accepted. 591 // 592 // .. attention:: 593 // 594 // This option is preferred over :ref:`verify_certificate_hash 595 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_hash>`, 596 // because SPKI is tied to a private key, so it doesn't change when the certificate 597 // is renewed using the same private key. 598 VerifyCertificateSpki []string `protobuf:"bytes,3,rep,name=verify_certificate_spki,json=verifyCertificateSpki,proto3" json:"verify_certificate_spki,omitempty"` 599 // An optional list of hex-encoded SHA-256 hashes. If specified, Envoy will verify that 600 // the SHA-256 of the DER-encoded presented certificate matches one of the specified values. 601 // 602 // A hex-encoded SHA-256 of the certificate can be generated with the following command: 603 // 604 // .. code-block:: bash 605 // 606 // $ openssl x509 -in path/to/client.crt -outform DER | openssl dgst -sha256 | cut -d" " -f2 607 // df6ff72fe9116521268f6f2dd4966f51df479883fe7037b39f75916ac3049d1a 608 // 609 // A long hex-encoded and colon-separated SHA-256 (a.k.a. "fingerprint") of the certificate 610 // can be generated with the following command: 611 // 612 // .. code-block:: bash 613 // 614 // $ openssl x509 -in path/to/client.crt -noout -fingerprint -sha256 | cut -d"=" -f2 615 // DF:6F:F7:2F:E9:11:65:21:26:8F:6F:2D:D4:96:6F:51:DF:47:98:83:FE:70:37:B3:9F:75:91:6A:C3:04:9D:1A 616 // 617 // Both of those formats are acceptable. 618 // 619 // When both: 620 // :ref:`verify_certificate_hash 621 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_hash>` and 622 // :ref:`verify_certificate_spki 623 // <envoy_api_field_auth.CertificateValidationContext.verify_certificate_spki>` are specified, 624 // a hash matching value from either of the lists will result in the certificate being accepted. 625 VerifyCertificateHash []string `protobuf:"bytes,2,rep,name=verify_certificate_hash,json=verifyCertificateHash,proto3" json:"verify_certificate_hash,omitempty"` 626 // An optional list of Subject Alternative Names. If specified, Envoy will verify that the 627 // Subject Alternative Name of the presented certificate matches one of the specified values. 628 // 629 // .. attention:: 630 // 631 // Subject Alternative Names are easily spoofable and verifying only them is insecure, 632 // therefore this option must be used together with :ref:`trusted_ca 633 // <envoy_api_field_auth.CertificateValidationContext.trusted_ca>`. 634 // 635 // Deprecated: Do not use. 636 VerifySubjectAltName []string `protobuf:"bytes,4,rep,name=verify_subject_alt_name,json=verifySubjectAltName,proto3" json:"verify_subject_alt_name,omitempty"` 637 // An optional list of Subject Alternative name matchers. Envoy will verify that the 638 // Subject Alternative Name of the presented certificate matches one of the specified matches. 639 // 640 // When a certificate has wildcard DNS SAN entries, to match a specific client, it should be 641 // configured with exact match type in the :ref:`string matcher <envoy_api_msg_type.matcher.StringMatcher>`. 642 // For example if the certificate has "\*.example.com" as DNS SAN entry, to allow only "api.example.com", 643 // it should be configured as shown below. 644 // 645 // .. code-block:: yaml 646 // 647 // match_subject_alt_names: 648 // exact: "api.example.com" 649 // 650 // .. attention:: 651 // 652 // Subject Alternative Names are easily spoofable and verifying only them is insecure, 653 // therefore this option must be used together with :ref:`trusted_ca 654 // <envoy_api_field_auth.CertificateValidationContext.trusted_ca>`. 655 MatchSubjectAltNames []*matcher.StringMatcher `protobuf:"bytes,9,rep,name=match_subject_alt_names,json=matchSubjectAltNames,proto3" json:"match_subject_alt_names,omitempty"` 656 // [#not-implemented-hide:] Must present a signed time-stamped OCSP response. 657 RequireOcspStaple *wrappers.BoolValue `protobuf:"bytes,5,opt,name=require_ocsp_staple,json=requireOcspStaple,proto3" json:"require_ocsp_staple,omitempty"` 658 // [#not-implemented-hide:] Must present signed certificate time-stamp. 659 RequireSignedCertificateTimestamp *wrappers.BoolValue `protobuf:"bytes,6,opt,name=require_signed_certificate_timestamp,json=requireSignedCertificateTimestamp,proto3" json:"require_signed_certificate_timestamp,omitempty"` 660 // An optional `certificate revocation list 661 // <https://en.wikipedia.org/wiki/Certificate_revocation_list>`_ 662 // (in PEM format). If specified, Envoy will verify that the presented peer 663 // certificate has not been revoked by this CRL. If this DataSource contains 664 // multiple CRLs, all of them will be used. 665 Crl *core.DataSource `protobuf:"bytes,7,opt,name=crl,proto3" json:"crl,omitempty"` 666 // If specified, Envoy will not reject expired certificates. 667 AllowExpiredCertificate bool `protobuf:"varint,8,opt,name=allow_expired_certificate,json=allowExpiredCertificate,proto3" json:"allow_expired_certificate,omitempty"` 668 // Certificate trust chain verification mode. 669 TrustChainVerification CertificateValidationContext_TrustChainVerification `protobuf:"varint,10,opt,name=trust_chain_verification,json=trustChainVerification,proto3,enum=envoy.api.v2.auth.CertificateValidationContext_TrustChainVerification" json:"trust_chain_verification,omitempty"` 670 } 671 672 func (x *CertificateValidationContext) Reset() { 673 *x = CertificateValidationContext{} 674 if protoimpl.UnsafeEnabled { 675 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[4] 676 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 677 ms.StoreMessageInfo(mi) 678 } 679 } 680 681 func (x *CertificateValidationContext) String() string { 682 return protoimpl.X.MessageStringOf(x) 683 } 684 685 func (*CertificateValidationContext) ProtoMessage() {} 686 687 func (x *CertificateValidationContext) ProtoReflect() protoreflect.Message { 688 mi := &file_envoy_api_v2_auth_common_proto_msgTypes[4] 689 if protoimpl.UnsafeEnabled && x != nil { 690 ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) 691 if ms.LoadMessageInfo() == nil { 692 ms.StoreMessageInfo(mi) 693 } 694 return ms 695 } 696 return mi.MessageOf(x) 697 } 698 699 // Deprecated: Use CertificateValidationContext.ProtoReflect.Descriptor instead. 700 func (*CertificateValidationContext) Descriptor() ([]byte, []int) { 701 return file_envoy_api_v2_auth_common_proto_rawDescGZIP(), []int{4} 702 } 703 704 func (x *CertificateValidationContext) GetTrustedCa() *core.DataSource { 705 if x != nil { 706 return x.TrustedCa 707 } 708 return nil 709 } 710 711 func (x *CertificateValidationContext) GetVerifyCertificateSpki() []string { 712 if x != nil { 713 return x.VerifyCertificateSpki 714 } 715 return nil 716 } 717 718 func (x *CertificateValidationContext) GetVerifyCertificateHash() []string { 719 if x != nil { 720 return x.VerifyCertificateHash 721 } 722 return nil 723 } 724 725 // Deprecated: Do not use. 726 func (x *CertificateValidationContext) GetVerifySubjectAltName() []string { 727 if x != nil { 728 return x.VerifySubjectAltName 729 } 730 return nil 731 } 732 733 func (x *CertificateValidationContext) GetMatchSubjectAltNames() []*matcher.StringMatcher { 734 if x != nil { 735 return x.MatchSubjectAltNames 736 } 737 return nil 738 } 739 740 func (x *CertificateValidationContext) GetRequireOcspStaple() *wrappers.BoolValue { 741 if x != nil { 742 return x.RequireOcspStaple 743 } 744 return nil 745 } 746 747 func (x *CertificateValidationContext) GetRequireSignedCertificateTimestamp() *wrappers.BoolValue { 748 if x != nil { 749 return x.RequireSignedCertificateTimestamp 750 } 751 return nil 752 } 753 754 func (x *CertificateValidationContext) GetCrl() *core.DataSource { 755 if x != nil { 756 return x.Crl 757 } 758 return nil 759 } 760 761 func (x *CertificateValidationContext) GetAllowExpiredCertificate() bool { 762 if x != nil { 763 return x.AllowExpiredCertificate 764 } 765 return false 766 } 767 768 func (x *CertificateValidationContext) GetTrustChainVerification() CertificateValidationContext_TrustChainVerification { 769 if x != nil { 770 return x.TrustChainVerification 771 } 772 return CertificateValidationContext_VERIFY_TRUST_CHAIN 773 } 774 775 var File_envoy_api_v2_auth_common_proto protoreflect.FileDescriptor 776 777 var file_envoy_api_v2_auth_common_proto_rawDesc = []byte{ 778 0x0a, 0x1e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x32, 0x2f, 0x61, 779 0x75, 0x74, 0x68, 0x2f, 0x63, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 780 0x12, 0x11, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x61, 781 0x75, 0x74, 0x68, 0x1a, 0x1c, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 782 0x32, 0x2f, 0x63, 0x6f, 0x72, 0x65, 0x2f, 0x62, 0x61, 0x73, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 783 0x6f, 0x1a, 0x1f, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2f, 0x74, 0x79, 0x70, 0x65, 0x2f, 0x6d, 0x61, 784 0x74, 0x63, 0x68, 0x65, 0x72, 0x2f, 0x73, 0x74, 0x72, 0x69, 0x6e, 0x67, 0x2e, 0x70, 0x72, 0x6f, 785 0x74, 0x6f, 0x1a, 0x19, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 786 0x62, 0x75, 0x66, 0x2f, 0x61, 0x6e, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1c, 0x67, 787 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x73, 788 0x74, 0x72, 0x75, 0x63, 0x74, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1e, 0x67, 0x6f, 0x6f, 789 0x67, 0x6c, 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x77, 0x72, 0x61, 790 0x70, 0x70, 0x65, 0x72, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1e, 0x75, 0x64, 0x70, 791 0x61, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x6d, 0x69, 792 0x67, 0x72, 0x61, 0x74, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x20, 0x75, 0x64, 0x70, 793 0x61, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 0x73, 0x65, 794 0x6e, 0x73, 0x69, 0x74, 0x69, 0x76, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1d, 0x75, 795 0x64, 0x70, 0x61, 0x2f, 0x61, 0x6e, 0x6e, 0x6f, 0x74, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x73, 0x2f, 796 0x73, 0x74, 0x61, 0x74, 0x75, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x17, 0x76, 0x61, 797 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2f, 0x76, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x65, 0x2e, 798 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0x98, 0x03, 0x0a, 0x0d, 0x54, 0x6c, 0x73, 0x50, 0x61, 0x72, 799 0x61, 0x6d, 0x65, 0x74, 0x65, 0x72, 0x73, 0x12, 0x77, 0x0a, 0x1c, 0x74, 0x6c, 0x73, 0x5f, 0x6d, 800 0x69, 0x6e, 0x69, 0x6d, 0x75, 0x6d, 0x5f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x5f, 801 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x2c, 0x2e, 802 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x61, 0x75, 0x74, 803 0x68, 0x2e, 0x54, 0x6c, 0x73, 0x50, 0x61, 0x72, 0x61, 0x6d, 0x65, 0x74, 0x65, 0x72, 0x73, 0x2e, 804 0x54, 0x6c, 0x73, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x42, 0x08, 0xfa, 0x42, 0x05, 805 0x82, 0x01, 0x02, 0x10, 0x01, 0x52, 0x19, 0x74, 0x6c, 0x73, 0x4d, 0x69, 0x6e, 0x69, 0x6d, 0x75, 806 0x6d, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 807 0x12, 0x77, 0x0a, 0x1c, 0x74, 0x6c, 0x73, 0x5f, 0x6d, 0x61, 0x78, 0x69, 0x6d, 0x75, 0x6d, 0x5f, 808 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x5f, 0x76, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 809 0x18, 0x02, 0x20, 0x01, 0x28, 0x0e, 0x32, 0x2c, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 810 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x54, 0x6c, 0x73, 0x50, 0x61, 811 0x72, 0x61, 0x6d, 0x65, 0x74, 0x65, 0x72, 0x73, 0x2e, 0x54, 0x6c, 0x73, 0x50, 0x72, 0x6f, 0x74, 812 0x6f, 0x63, 0x6f, 0x6c, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x82, 0x01, 0x02, 0x10, 0x01, 0x52, 0x19, 813 0x74, 0x6c, 0x73, 0x4d, 0x61, 0x78, 0x69, 0x6d, 0x75, 0x6d, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 814 0x6f, 0x6c, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e, 0x12, 0x23, 0x0a, 0x0d, 0x63, 0x69, 0x70, 815 0x68, 0x65, 0x72, 0x5f, 0x73, 0x75, 0x69, 0x74, 0x65, 0x73, 0x18, 0x03, 0x20, 0x03, 0x28, 0x09, 816 0x52, 0x0c, 0x63, 0x69, 0x70, 0x68, 0x65, 0x72, 0x53, 0x75, 0x69, 0x74, 0x65, 0x73, 0x12, 0x1f, 817 0x0a, 0x0b, 0x65, 0x63, 0x64, 0x68, 0x5f, 0x63, 0x75, 0x72, 0x76, 0x65, 0x73, 0x18, 0x04, 0x20, 818 0x03, 0x28, 0x09, 0x52, 0x0a, 0x65, 0x63, 0x64, 0x68, 0x43, 0x75, 0x72, 0x76, 0x65, 0x73, 0x22, 819 0x4f, 0x0a, 0x0b, 0x54, 0x6c, 0x73, 0x50, 0x72, 0x6f, 0x74, 0x6f, 0x63, 0x6f, 0x6c, 0x12, 0x0c, 820 0x0a, 0x08, 0x54, 0x4c, 0x53, 0x5f, 0x41, 0x55, 0x54, 0x4f, 0x10, 0x00, 0x12, 0x0b, 0x0a, 0x07, 821 0x54, 0x4c, 0x53, 0x76, 0x31, 0x5f, 0x30, 0x10, 0x01, 0x12, 0x0b, 0x0a, 0x07, 0x54, 0x4c, 0x53, 822 0x76, 0x31, 0x5f, 0x31, 0x10, 0x02, 0x12, 0x0b, 0x0a, 0x07, 0x54, 0x4c, 0x53, 0x76, 0x31, 0x5f, 823 0x32, 0x10, 0x03, 0x12, 0x0b, 0x0a, 0x07, 0x54, 0x4c, 0x53, 0x76, 0x31, 0x5f, 0x33, 0x10, 0x04, 824 0x22, 0xd1, 0x01, 0x0a, 0x12, 0x50, 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x4b, 0x65, 0x79, 0x50, 825 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 0x12, 0x2c, 0x0a, 0x0d, 0x70, 0x72, 0x6f, 0x76, 0x69, 826 0x64, 0x65, 0x72, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x42, 0x07, 827 0xfa, 0x42, 0x04, 0x72, 0x02, 0x20, 0x01, 0x52, 0x0c, 0x70, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 828 0x72, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x3b, 0x0a, 0x06, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x18, 829 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x17, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 830 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x53, 0x74, 0x72, 0x75, 0x63, 0x74, 0x42, 0x08, 831 0x18, 0x01, 0xb8, 0xb7, 0x8b, 0xa4, 0x02, 0x01, 0x48, 0x00, 0x52, 0x06, 0x63, 0x6f, 0x6e, 0x66, 832 0x69, 0x67, 0x12, 0x41, 0x0a, 0x0c, 0x74, 0x79, 0x70, 0x65, 0x64, 0x5f, 0x63, 0x6f, 0x6e, 0x66, 833 0x69, 0x67, 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x14, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 834 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x41, 0x6e, 0x79, 0x42, 0x06, 835 0xb8, 0xb7, 0x8b, 0xa4, 0x02, 0x01, 0x48, 0x00, 0x52, 0x0b, 0x74, 0x79, 0x70, 0x65, 0x64, 0x43, 836 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x42, 0x0d, 0x0a, 0x0b, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x5f, 837 0x74, 0x79, 0x70, 0x65, 0x22, 0xe1, 0x03, 0x0a, 0x0e, 0x54, 0x6c, 0x73, 0x43, 0x65, 0x72, 0x74, 838 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x12, 0x4a, 0x0a, 0x11, 0x63, 0x65, 0x72, 0x74, 0x69, 839 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x5f, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x18, 0x01, 0x20, 0x01, 840 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 841 0x32, 0x2e, 0x63, 0x6f, 0x72, 0x65, 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 842 0x65, 0x52, 0x10, 0x63, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x43, 0x68, 843 0x61, 0x69, 0x6e, 0x12, 0x46, 0x0a, 0x0b, 0x70, 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x5f, 0x6b, 844 0x65, 0x79, 0x18, 0x02, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 845 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 0x65, 0x2e, 0x44, 0x61, 0x74, 846 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x42, 0x06, 0xb8, 0xb7, 0x8b, 0xa4, 0x02, 0x01, 0x52, 847 0x0a, 0x70, 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x4b, 0x65, 0x79, 0x12, 0x57, 0x0a, 0x14, 0x70, 848 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x5f, 0x6b, 0x65, 0x79, 0x5f, 0x70, 0x72, 0x6f, 0x76, 0x69, 849 0x64, 0x65, 0x72, 0x18, 0x06, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x25, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 850 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x61, 0x75, 0x74, 0x68, 0x2e, 0x50, 0x72, 851 0x69, 0x76, 0x61, 0x74, 0x65, 0x4b, 0x65, 0x79, 0x50, 0x72, 0x6f, 0x76, 0x69, 0x64, 0x65, 0x72, 852 0x52, 0x12, 0x70, 0x72, 0x69, 0x76, 0x61, 0x74, 0x65, 0x4b, 0x65, 0x79, 0x50, 0x72, 0x6f, 0x76, 853 0x69, 0x64, 0x65, 0x72, 0x12, 0x41, 0x0a, 0x08, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 854 0x18, 0x03, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 855 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 0x65, 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 856 0x6f, 0x75, 0x72, 0x63, 0x65, 0x42, 0x06, 0xb8, 0xb7, 0x8b, 0xa4, 0x02, 0x01, 0x52, 0x08, 0x70, 857 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x12, 0x3e, 0x0a, 0x0b, 0x6f, 0x63, 0x73, 0x70, 0x5f, 858 0x73, 0x74, 0x61, 0x70, 0x6c, 0x65, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x65, 859 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 0x65, 860 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x52, 0x0a, 0x6f, 0x63, 0x73, 861 0x70, 0x53, 0x74, 0x61, 0x70, 0x6c, 0x65, 0x12, 0x5f, 0x0a, 0x1c, 0x73, 0x69, 0x67, 0x6e, 0x65, 862 0x64, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x5f, 0x74, 0x69, 863 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x18, 0x05, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 864 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 865 0x65, 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x52, 0x1a, 0x73, 0x69, 866 0x67, 0x6e, 0x65, 0x64, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x54, 867 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x22, 0x59, 0x0a, 0x14, 0x54, 0x6c, 0x73, 0x53, 868 0x65, 0x73, 0x73, 0x69, 0x6f, 0x6e, 0x54, 0x69, 0x63, 0x6b, 0x65, 0x74, 0x4b, 0x65, 0x79, 0x73, 869 0x12, 0x41, 0x0a, 0x04, 0x6b, 0x65, 0x79, 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x1d, 870 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 871 0x72, 0x65, 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x42, 0x0e, 0xfa, 872 0x42, 0x05, 0x92, 0x01, 0x02, 0x08, 0x01, 0xb8, 0xb7, 0x8b, 0xa4, 0x02, 0x01, 0x52, 0x04, 0x6b, 873 0x65, 0x79, 0x73, 0x22, 0xfc, 0x06, 0x0a, 0x1c, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 874 0x61, 0x74, 0x65, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x43, 0x6f, 0x6e, 875 0x74, 0x65, 0x78, 0x74, 0x12, 0x3c, 0x0a, 0x0a, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x64, 0x5f, 876 0x63, 0x61, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 877 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 0x65, 0x2e, 0x44, 0x61, 0x74, 878 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x52, 0x09, 0x74, 0x72, 0x75, 0x73, 0x74, 0x65, 0x64, 879 0x43, 0x61, 0x12, 0x46, 0x0a, 0x17, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x5f, 0x63, 0x65, 0x72, 880 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x5f, 0x73, 0x70, 0x6b, 0x69, 0x18, 0x03, 0x20, 881 0x03, 0x28, 0x09, 0x42, 0x0e, 0xfa, 0x42, 0x0b, 0x92, 0x01, 0x08, 0x22, 0x06, 0x72, 0x04, 0x20, 882 0x2c, 0x28, 0x2c, 0x52, 0x15, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x43, 0x65, 0x72, 0x74, 0x69, 883 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x53, 0x70, 0x6b, 0x69, 0x12, 0x46, 0x0a, 0x17, 0x76, 0x65, 884 0x72, 0x69, 0x66, 0x79, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 885 0x5f, 0x68, 0x61, 0x73, 0x68, 0x18, 0x02, 0x20, 0x03, 0x28, 0x09, 0x42, 0x0e, 0xfa, 0x42, 0x0b, 886 0x92, 0x01, 0x08, 0x22, 0x06, 0x72, 0x04, 0x20, 0x40, 0x28, 0x5f, 0x52, 0x15, 0x76, 0x65, 0x72, 887 0x69, 0x66, 0x79, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x48, 0x61, 888 0x73, 0x68, 0x12, 0x39, 0x0a, 0x17, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x5f, 0x73, 0x75, 0x62, 889 0x6a, 0x65, 0x63, 0x74, 0x5f, 0x61, 0x6c, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x18, 0x04, 0x20, 890 0x03, 0x28, 0x09, 0x42, 0x02, 0x18, 0x01, 0x52, 0x14, 0x76, 0x65, 0x72, 0x69, 0x66, 0x79, 0x53, 891 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x41, 0x6c, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x12, 0x58, 0x0a, 892 0x17, 0x6d, 0x61, 0x74, 0x63, 0x68, 0x5f, 0x73, 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x5f, 0x61, 893 0x6c, 0x74, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x18, 0x09, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x21, 894 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x74, 0x79, 0x70, 0x65, 0x2e, 0x6d, 0x61, 0x74, 0x63, 895 0x68, 0x65, 0x72, 0x2e, 0x53, 0x74, 0x72, 0x69, 0x6e, 0x67, 0x4d, 0x61, 0x74, 0x63, 0x68, 0x65, 896 0x72, 0x52, 0x14, 0x6d, 0x61, 0x74, 0x63, 0x68, 0x53, 0x75, 0x62, 0x6a, 0x65, 0x63, 0x74, 0x41, 897 0x6c, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x12, 0x4a, 0x0a, 0x13, 0x72, 0x65, 0x71, 0x75, 0x69, 898 0x72, 0x65, 0x5f, 0x6f, 0x63, 0x73, 0x70, 0x5f, 0x73, 0x74, 0x61, 0x70, 0x6c, 0x65, 0x18, 0x05, 899 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 900 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x42, 0x6f, 0x6f, 0x6c, 0x56, 0x61, 0x6c, 0x75, 0x65, 901 0x52, 0x11, 0x72, 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x4f, 0x63, 0x73, 0x70, 0x53, 0x74, 0x61, 902 0x70, 0x6c, 0x65, 0x12, 0x6b, 0x0a, 0x24, 0x72, 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x5f, 0x73, 903 0x69, 0x67, 0x6e, 0x65, 0x64, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 904 0x65, 0x5f, 0x74, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x18, 0x06, 0x20, 0x01, 0x28, 905 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 906 0x62, 0x75, 0x66, 0x2e, 0x42, 0x6f, 0x6f, 0x6c, 0x56, 0x61, 0x6c, 0x75, 0x65, 0x52, 0x21, 0x72, 907 0x65, 0x71, 0x75, 0x69, 0x72, 0x65, 0x53, 0x69, 0x67, 0x6e, 0x65, 0x64, 0x43, 0x65, 0x72, 0x74, 908 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 909 0x12, 0x2f, 0x0a, 0x03, 0x63, 0x72, 0x6c, 0x18, 0x07, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1d, 0x2e, 910 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 0x63, 0x6f, 0x72, 911 0x65, 0x2e, 0x44, 0x61, 0x74, 0x61, 0x53, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x52, 0x03, 0x63, 0x72, 912 0x6c, 0x12, 0x3a, 0x0a, 0x19, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x5f, 0x65, 0x78, 0x70, 0x69, 0x72, 913 0x65, 0x64, 0x5f, 0x63, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x18, 0x08, 914 0x20, 0x01, 0x28, 0x08, 0x52, 0x17, 0x61, 0x6c, 0x6c, 0x6f, 0x77, 0x45, 0x78, 0x70, 0x69, 0x72, 915 0x65, 0x64, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 0x12, 0x8a, 0x01, 916 0x0a, 0x18, 0x74, 0x72, 0x75, 0x73, 0x74, 0x5f, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x5f, 0x76, 0x65, 917 0x72, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x0a, 0x20, 0x01, 0x28, 0x0e, 918 0x32, 0x46, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 0x2e, 919 0x61, 0x75, 0x74, 0x68, 0x2e, 0x43, 0x65, 0x72, 0x74, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x65, 920 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x43, 0x6f, 0x6e, 0x74, 0x65, 0x78, 921 0x74, 0x2e, 0x54, 0x72, 0x75, 0x73, 0x74, 0x43, 0x68, 0x61, 0x69, 0x6e, 0x56, 0x65, 0x72, 0x69, 922 0x66, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x42, 0x08, 0xfa, 0x42, 0x05, 0x82, 0x01, 0x02, 923 0x10, 0x01, 0x52, 0x16, 0x74, 0x72, 0x75, 0x73, 0x74, 0x43, 0x68, 0x61, 0x69, 0x6e, 0x56, 0x65, 924 0x72, 0x69, 0x66, 0x69, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x22, 0x46, 0x0a, 0x16, 0x54, 0x72, 925 0x75, 0x73, 0x74, 0x43, 0x68, 0x61, 0x69, 0x6e, 0x56, 0x65, 0x72, 0x69, 0x66, 0x69, 0x63, 0x61, 926 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x16, 0x0a, 0x12, 0x56, 0x45, 0x52, 0x49, 0x46, 0x59, 0x5f, 0x54, 927 0x52, 0x55, 0x53, 0x54, 0x5f, 0x43, 0x48, 0x41, 0x49, 0x4e, 0x10, 0x00, 0x12, 0x14, 0x0a, 0x10, 928 0x41, 0x43, 0x43, 0x45, 0x50, 0x54, 0x5f, 0x55, 0x4e, 0x54, 0x52, 0x55, 0x53, 0x54, 0x45, 0x44, 929 0x10, 0x01, 0x42, 0x69, 0x0a, 0x1f, 0x69, 0x6f, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x70, 0x72, 930 0x6f, 0x78, 0x79, 0x2e, 0x65, 0x6e, 0x76, 0x6f, 0x79, 0x2e, 0x61, 0x70, 0x69, 0x2e, 0x76, 0x32, 931 0x2e, 0x61, 0x75, 0x74, 0x68, 0x42, 0x0b, 0x43, 0x6f, 0x6d, 0x6d, 0x6f, 0x6e, 0x50, 0x72, 0x6f, 932 0x74, 0x6f, 0x50, 0x01, 0xf2, 0x98, 0xfe, 0x8f, 0x05, 0x2b, 0x12, 0x29, 0x65, 0x6e, 0x76, 0x6f, 933 0x79, 0x2e, 0x65, 0x78, 0x74, 0x65, 0x6e, 0x73, 0x69, 0x6f, 0x6e, 0x73, 0x2e, 0x74, 0x72, 0x61, 934 0x6e, 0x73, 0x70, 0x6f, 0x72, 0x74, 0x5f, 0x73, 0x6f, 0x63, 0x6b, 0x65, 0x74, 0x73, 0x2e, 0x74, 935 0x6c, 0x73, 0x2e, 0x76, 0x33, 0xba, 0x80, 0xc8, 0xd1, 0x06, 0x02, 0x10, 0x01, 0x62, 0x06, 0x70, 936 0x72, 0x6f, 0x74, 0x6f, 0x33, 937 } 938 939 var ( 940 file_envoy_api_v2_auth_common_proto_rawDescOnce sync.Once 941 file_envoy_api_v2_auth_common_proto_rawDescData = file_envoy_api_v2_auth_common_proto_rawDesc 942 ) 943 944 func file_envoy_api_v2_auth_common_proto_rawDescGZIP() []byte { 945 file_envoy_api_v2_auth_common_proto_rawDescOnce.Do(func() { 946 file_envoy_api_v2_auth_common_proto_rawDescData = protoimpl.X.CompressGZIP(file_envoy_api_v2_auth_common_proto_rawDescData) 947 }) 948 return file_envoy_api_v2_auth_common_proto_rawDescData 949 } 950 951 var file_envoy_api_v2_auth_common_proto_enumTypes = make([]protoimpl.EnumInfo, 2) 952 var file_envoy_api_v2_auth_common_proto_msgTypes = make([]protoimpl.MessageInfo, 5) 953 var file_envoy_api_v2_auth_common_proto_goTypes = []interface{}{ 954 (TlsParameters_TlsProtocol)(0), // 0: envoy.api.v2.auth.TlsParameters.TlsProtocol 955 (CertificateValidationContext_TrustChainVerification)(0), // 1: envoy.api.v2.auth.CertificateValidationContext.TrustChainVerification 956 (*TlsParameters)(nil), // 2: envoy.api.v2.auth.TlsParameters 957 (*PrivateKeyProvider)(nil), // 3: envoy.api.v2.auth.PrivateKeyProvider 958 (*TlsCertificate)(nil), // 4: envoy.api.v2.auth.TlsCertificate 959 (*TlsSessionTicketKeys)(nil), // 5: envoy.api.v2.auth.TlsSessionTicketKeys 960 (*CertificateValidationContext)(nil), // 6: envoy.api.v2.auth.CertificateValidationContext 961 (*_struct.Struct)(nil), // 7: google.protobuf.Struct 962 (*any.Any)(nil), // 8: google.protobuf.Any 963 (*core.DataSource)(nil), // 9: envoy.api.v2.core.DataSource 964 (*matcher.StringMatcher)(nil), // 10: envoy.type.matcher.StringMatcher 965 (*wrappers.BoolValue)(nil), // 11: google.protobuf.BoolValue 966 } 967 var file_envoy_api_v2_auth_common_proto_depIdxs = []int32{ 968 0, // 0: envoy.api.v2.auth.TlsParameters.tls_minimum_protocol_version:type_name -> envoy.api.v2.auth.TlsParameters.TlsProtocol 969 0, // 1: envoy.api.v2.auth.TlsParameters.tls_maximum_protocol_version:type_name -> envoy.api.v2.auth.TlsParameters.TlsProtocol 970 7, // 2: envoy.api.v2.auth.PrivateKeyProvider.config:type_name -> google.protobuf.Struct 971 8, // 3: envoy.api.v2.auth.PrivateKeyProvider.typed_config:type_name -> google.protobuf.Any 972 9, // 4: envoy.api.v2.auth.TlsCertificate.certificate_chain:type_name -> envoy.api.v2.core.DataSource 973 9, // 5: envoy.api.v2.auth.TlsCertificate.private_key:type_name -> envoy.api.v2.core.DataSource 974 3, // 6: envoy.api.v2.auth.TlsCertificate.private_key_provider:type_name -> envoy.api.v2.auth.PrivateKeyProvider 975 9, // 7: envoy.api.v2.auth.TlsCertificate.password:type_name -> envoy.api.v2.core.DataSource 976 9, // 8: envoy.api.v2.auth.TlsCertificate.ocsp_staple:type_name -> envoy.api.v2.core.DataSource 977 9, // 9: envoy.api.v2.auth.TlsCertificate.signed_certificate_timestamp:type_name -> envoy.api.v2.core.DataSource 978 9, // 10: envoy.api.v2.auth.TlsSessionTicketKeys.keys:type_name -> envoy.api.v2.core.DataSource 979 9, // 11: envoy.api.v2.auth.CertificateValidationContext.trusted_ca:type_name -> envoy.api.v2.core.DataSource 980 10, // 12: envoy.api.v2.auth.CertificateValidationContext.match_subject_alt_names:type_name -> envoy.type.matcher.StringMatcher 981 11, // 13: envoy.api.v2.auth.CertificateValidationContext.require_ocsp_staple:type_name -> google.protobuf.BoolValue 982 11, // 14: envoy.api.v2.auth.CertificateValidationContext.require_signed_certificate_timestamp:type_name -> google.protobuf.BoolValue 983 9, // 15: envoy.api.v2.auth.CertificateValidationContext.crl:type_name -> envoy.api.v2.core.DataSource 984 1, // 16: envoy.api.v2.auth.CertificateValidationContext.trust_chain_verification:type_name -> envoy.api.v2.auth.CertificateValidationContext.TrustChainVerification 985 17, // [17:17] is the sub-list for method output_type 986 17, // [17:17] is the sub-list for method input_type 987 17, // [17:17] is the sub-list for extension type_name 988 17, // [17:17] is the sub-list for extension extendee 989 0, // [0:17] is the sub-list for field type_name 990 } 991 992 func init() { file_envoy_api_v2_auth_common_proto_init() } 993 func file_envoy_api_v2_auth_common_proto_init() { 994 if File_envoy_api_v2_auth_common_proto != nil { 995 return 996 } 997 if !protoimpl.UnsafeEnabled { 998 file_envoy_api_v2_auth_common_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { 999 switch v := v.(*TlsParameters); i { 1000 case 0: 1001 return &v.state 1002 case 1: 1003 return &v.sizeCache 1004 case 2: 1005 return &v.unknownFields 1006 default: 1007 return nil 1008 } 1009 } 1010 file_envoy_api_v2_auth_common_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { 1011 switch v := v.(*PrivateKeyProvider); i { 1012 case 0: 1013 return &v.state 1014 case 1: 1015 return &v.sizeCache 1016 case 2: 1017 return &v.unknownFields 1018 default: 1019 return nil 1020 } 1021 } 1022 file_envoy_api_v2_auth_common_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { 1023 switch v := v.(*TlsCertificate); i { 1024 case 0: 1025 return &v.state 1026 case 1: 1027 return &v.sizeCache 1028 case 2: 1029 return &v.unknownFields 1030 default: 1031 return nil 1032 } 1033 } 1034 file_envoy_api_v2_auth_common_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { 1035 switch v := v.(*TlsSessionTicketKeys); i { 1036 case 0: 1037 return &v.state 1038 case 1: 1039 return &v.sizeCache 1040 case 2: 1041 return &v.unknownFields 1042 default: 1043 return nil 1044 } 1045 } 1046 file_envoy_api_v2_auth_common_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { 1047 switch v := v.(*CertificateValidationContext); i { 1048 case 0: 1049 return &v.state 1050 case 1: 1051 return &v.sizeCache 1052 case 2: 1053 return &v.unknownFields 1054 default: 1055 return nil 1056 } 1057 } 1058 } 1059 file_envoy_api_v2_auth_common_proto_msgTypes[1].OneofWrappers = []interface{}{ 1060 (*PrivateKeyProvider_Config)(nil), 1061 (*PrivateKeyProvider_TypedConfig)(nil), 1062 } 1063 type x struct{} 1064 out := protoimpl.TypeBuilder{ 1065 File: protoimpl.DescBuilder{ 1066 GoPackagePath: reflect.TypeOf(x{}).PkgPath(), 1067 RawDescriptor: file_envoy_api_v2_auth_common_proto_rawDesc, 1068 NumEnums: 2, 1069 NumMessages: 5, 1070 NumExtensions: 0, 1071 NumServices: 0, 1072 }, 1073 GoTypes: file_envoy_api_v2_auth_common_proto_goTypes, 1074 DependencyIndexes: file_envoy_api_v2_auth_common_proto_depIdxs, 1075 EnumInfos: file_envoy_api_v2_auth_common_proto_enumTypes, 1076 MessageInfos: file_envoy_api_v2_auth_common_proto_msgTypes, 1077 }.Build() 1078 File_envoy_api_v2_auth_common_proto = out.File 1079 file_envoy_api_v2_auth_common_proto_rawDesc = nil 1080 file_envoy_api_v2_auth_common_proto_goTypes = nil 1081 file_envoy_api_v2_auth_common_proto_depIdxs = nil 1082 }