/
tls_inspector.proto
26 lines (19 loc) · 1.05 KB
/
tls_inspector.proto
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
syntax = "proto3";
package envoy.extensions.filters.listener.tls_inspector.v3;
import "google/protobuf/wrappers.proto";
import "udpa/annotations/status.proto";
import "udpa/annotations/versioning.proto";
option java_package = "io.envoyproxy.envoy.extensions.filters.listener.tls_inspector.v3";
option java_outer_classname = "TlsInspectorProto";
option java_multiple_files = true;
option go_package = "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/listener/tls_inspector/v3;tls_inspectorv3";
option (udpa.annotations.file_status).package_version_status = ACTIVE;
// [#protodoc-title: TLS Inspector Filter]
// Allows detecting whether the transport appears to be TLS or plaintext.
// [#extension: envoy.filters.listener.tls_inspector]
message TlsInspector {
option (udpa.annotations.versioning).previous_message_type =
"envoy.config.filter.listener.tls_inspector.v2.TlsInspector";
// Populate ``JA3`` fingerprint hash using data from the TLS Client Hello packet. Default is false.
google.protobuf.BoolValue enable_ja3_fingerprinting = 1;
}