summaryrefslogtreecommitdiff
path: root/src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs
diff options
context:
space:
mode:
Diffstat (limited to 'src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs')
-rw-r--r--src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs164
1 files changed, 0 insertions, 164 deletions
diff --git a/src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs b/src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs
deleted file mode 100644
index d3c4cda7..00000000
--- a/src/rpc/envoy.extensions.matching.common_inputs.network.v3.rs
+++ /dev/null
@@ -1,164 +0,0 @@
-// @generated
-// This file is @generated by prost-build.
-// \[#protodoc-title: Common network matching inputs\]
-
-/// Specifies that matching should be performed by the destination IP address.
-/// \[#extension: envoy.matching.inputs.destination_ip\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct DestinationIpInput {
-}
-/// Specifies that matching should be performed by the destination port.
-/// \[#extension: envoy.matching.inputs.destination_port\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct DestinationPortInput {
-}
-/// Specifies that matching should be performed by the source IP address.
-/// \[#extension: envoy.matching.inputs.source_ip\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct SourceIpInput {
-}
-/// Specifies that matching should be performed by the source port.
-/// \[#extension: envoy.matching.inputs.source_port\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct SourcePortInput {
-}
-/// Input that matches by the directly connected source IP address (this
-/// will only be different from the source IP address when using a listener
-/// filter that overrides the source address, such as the :ref:`Proxy Protocol
-/// listener filter <config_listener_filters_proxy_protocol>`).
-/// \[#extension: envoy.matching.inputs.direct_source_ip\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct DirectSourceIpInput {
-}
-/// Input that matches by the source IP type.
-/// Specifies the source IP match type. The values include:
-///
-/// * ``local`` - matches a connection originating from the same host,
-/// \[#extension: envoy.matching.inputs.source_type\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct SourceTypeInput {
-}
-/// Input that matches by the requested server name (e.g. SNI in TLS).
-///
-/// :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides the requested server name based on SNI,
-/// when TLS protocol is detected.
-/// \[#extension: envoy.matching.inputs.server_name\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct ServerNameInput {
-}
-/// Input that matches by the transport protocol.
-///
-/// Suggested values include:
-///
-/// * ``raw_buffer`` - default, used when no transport protocol is detected,
-/// * ``tls`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`
-/// when TLS protocol is detected.
-/// \[#extension: envoy.matching.inputs.transport_protocol\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct TransportProtocolInput {
-}
-/// List of quoted and comma-separated requested application protocols. The list consists of a
-/// single negotiated application protocol once the network stream is established.
-///
-/// Examples:
-///
-/// * ``'h2','http/1.1'``
-/// * ``'h2c'``
-///
-/// Suggested values in the list include:
-///
-/// * ``http/1.1`` - set by :ref:`envoy.filters.listener.tls_inspector
-/// <config_listener_filters_tls_inspector>` and :ref:`envoy.filters.listener.http_inspector
-/// <config_listener_filters_http_inspector>`,
-/// * ``h2`` - set by :ref:`envoy.filters.listener.tls_inspector <config_listener_filters_tls_inspector>`
-/// * ``h2c`` - set by :ref:`envoy.filters.listener.http_inspector <config_listener_filters_http_inspector>`
-///
-/// .. attention::
-///
-/// Currently, :ref:`TLS Inspector <config_listener_filters_tls_inspector>` provides
-/// application protocol detection based on the requested
-/// `ALPN <<https://en.wikipedia.org/wiki/Application-Layer_Protocol_Negotiation>`_> values.
-///
-/// However, the use of ALPN is pretty much limited to the HTTP/2 traffic on the Internet,
-/// and matching on values other than ``h2`` is going to lead to a lot of false negatives,
-/// unless all connecting clients are known to use ALPN.
-/// \[#extension: envoy.matching.inputs.application_protocol\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, Copy, PartialEq, ::prost::Message)]
-pub struct ApplicationProtocolInput {
-}
-/// Input that matches by a specific filter state key.
-/// The value of the provided filter state key will be the raw string representation of the filter state object
-/// \[#extension: envoy.matching.inputs.filter_state\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, PartialEq, ::prost::Message)]
-pub struct FilterStateInput {
- #[prost(string, tag="1")]
- pub key: ::prost::alloc::string::String,
-}
-/// Input that matches dynamic metadata by key.
-/// DynamicMetadataInput provides a general interface using ``filter`` and ``path`` to retrieve value from
-/// :ref:`Metadata <envoy_v3_api_msg_config.core.v3.Metadata>`.
-///
-/// For example, for the following Metadata:
-///
-/// .. code-block:: yaml
-///
-/// filter_metadata:
-/// envoy.xxx:
-/// prop:
-/// foo: bar
-/// xyz:
-/// hello: envoy
-///
-/// The following DynamicMetadataInput will retrieve a string value "bar" from the Metadata.
-///
-/// .. code-block:: yaml
-///
-/// filter: envoy.xxx
-/// path:
-/// - key: prop
-/// - key: foo
-///
-/// \[#extension: envoy.matching.inputs.dynamic_metadata\]
-#[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, PartialEq, ::prost::Message)]
-pub struct DynamicMetadataInput {
- /// The filter name to retrieve the Struct from the Metadata.
- #[prost(string, tag="1")]
- pub filter: ::prost::alloc::string::String,
- /// The path to retrieve the Value from the Struct.
- #[prost(message, repeated, tag="2")]
- pub path: ::prost::alloc::vec::Vec<dynamic_metadata_input::PathSegment>,
-}
-/// Nested message and enum types in `DynamicMetadataInput`.
-pub mod dynamic_metadata_input {
- /// Specifies the segment in a path to retrieve value from Metadata.
- /// Note: Currently it's not supported to retrieve a value from a list in Metadata. This means that
- /// if the segment key refers to a list, it has to be the last segment in a path.
- #[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, PartialEq, ::prost::Message)]
- pub struct PathSegment {
- #[prost(oneof="path_segment::Segment", tags="1")]
- pub segment: ::core::option::Option<path_segment::Segment>,
- }
- /// Nested message and enum types in `PathSegment`.
- pub mod path_segment {
- #[allow(clippy::derive_partial_eq_without_eq)]
-#[derive(Clone, PartialEq, ::prost::Oneof)]
- pub enum Segment {
- /// If specified, use the key to retrieve the value in a Struct.
- #[prost(string, tag="1")]
- Key(::prost::alloc::string::String),
- }
- }
-}
-// @@protoc_insertion_point(module)