summaryrefslogtreecommitdiff
path: root/src/rpc/envoy.extensions.rbac.principals.mtls_authenticated.v3.rs
blob: f4e9d172d1b3e174e566e44cc58899dbea0270a6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
// @generated
// This file is @generated by prost-build.
// \[#protodoc-title: RBAC MTls Authenticated Principal\]
// \[#extension: envoy.rbac.principals.mtls_authenticated\]

/// Authentication attributes for a downstream mTLS connection. All modes require that a peer certificate
/// was presented and validated using the ValidationContext in the DownstreamTlsContext configuration.
///
/// If neither field is set, a configuration loading error will be generated. This is so that
/// not validating SANs requires an affirmative configuration to disable, to prevent accidentally
/// not configuring SAN validation.
///
/// If ``any_validated_client_certificate`` is set in addition to ``san_matcher`` or a future field
/// which specifies additional validation, the other field always takes precedence over
/// ``any_validated_client_certificate`` and all specified validation is performed.
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct Config {
    /// Specifies a SAN that must be present in the validated peer certificate.
    #[prost(message, optional, tag="1")]
    pub san_matcher: ::core::option::Option<super::super::super::super::transport_sockets::tls::v3::SubjectAltNameMatcher>,
    /// Only require that the peer certificate is present and valid.
    #[prost(bool, tag="2")]
    pub any_validated_client_certificate: bool,
}
// @@protoc_insertion_point(module)