19
19
/**
20
20
* ServerTlsPolicy is a resource that specifies how a server should authenticate incoming requests.
21
21
* This resource itself does not affect configuration unless it is attached to a target HTTPS proxy
22
- * or endpoint config selector resource. ServerTlsPolicy in the form accepted by external HTTPS load
23
- * balancers can be attached only to TargetHttpsProxy with an `EXTERNAL` or `EXTERNAL_MANAGED` load
24
- * balancing scheme. Traffic Director compatible ServerTlsPolicies can be attached to EndpointPolicy
25
- * and TargetHttpsProxy with Traffic Director `INTERNAL_SELF_MANAGED` load balancing scheme.
22
+ * or endpoint config selector resource. ServerTlsPolicy in the form accepted by Application Load
23
+ * Balancers can be attached only to TargetHttpsProxy with an `EXTERNAL`, `EXTERNAL_MANAGED` or
24
+ * `INTERNAL_MANAGED` load balancing scheme. Traffic Director compatible ServerTlsPolicies can be
25
+ * attached to EndpointPolicy and TargetHttpsProxy with Traffic Director `INTERNAL_SELF_MANAGED`
26
+ * load balancing scheme.
26
27
*
27
28
* <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is
28
29
* transmitted over HTTP when working with the Network Security API. For a detailed explanation see:
35
36
public final class ServerTlsPolicy extends com .google .api .client .json .GenericJson {
36
37
37
38
/**
38
- * This field applies only for Traffic Director policies. It is must be set to false for external
39
- * HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
40
- * true, server allows plain text connections. By default, it is set to false. This setting is not
41
- * exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
42
- * server allows both plain text and mTLS connections. See documentation of other encryption modes
43
- * to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
44
- * TLS while having mixed TLS and non-TLS traffic reaching port :80.
39
+ * This field applies only for Traffic Director policies. It is must be set to false for
40
+ * Application Load Balancer policies. Determines if server allows plaintext connections. If set
41
+ * to true, server allows plain text connections. By default, it is set to false. This setting is
42
+ * not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
43
+ * set, server allows both plain text and mTLS connections. See documentation of other encryption
44
+ * modes to confirm compatibility. Consider using it if you wish to upgrade in place your
45
+ * deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
45
46
* The value may be {@code null}.
46
47
*/
47
48
@ com .google .api .client .util .Key
@@ -69,11 +70,11 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
69
70
private java .util .Map <String , java .lang .String > labels ;
70
71
71
72
/**
72
- * This field is required if the policy is used with external HTTPS load balancers . This field can
73
- * be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
74
- * for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
75
- * not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
76
- * `mtls_policy` are set, server allows both plain text and mTLS connections.
73
+ * This field is required if the policy is used with Application Load Balancers . This field can be
74
+ * empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
75
+ * peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
76
+ * be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
77
+ * are set, server allows both plain text and mTLS connections.
77
78
* The value may be {@code null}.
78
79
*/
79
80
@ com .google .api .client .util .Key
@@ -88,8 +89,8 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
88
89
private java .lang .String name ;
89
90
90
91
/**
91
- * Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
92
- * be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
92
+ * Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
93
+ * empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
93
94
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
94
95
* supported.
95
96
* The value may be {@code null}.
@@ -105,27 +106,27 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
105
106
private String updateTime ;
106
107
107
108
/**
108
- * This field applies only for Traffic Director policies. It is must be set to false for external
109
- * HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
110
- * true, server allows plain text connections. By default, it is set to false. This setting is not
111
- * exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
112
- * server allows both plain text and mTLS connections. See documentation of other encryption modes
113
- * to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
114
- * TLS while having mixed TLS and non-TLS traffic reaching port :80.
109
+ * This field applies only for Traffic Director policies. It is must be set to false for
110
+ * Application Load Balancer policies. Determines if server allows plaintext connections. If set
111
+ * to true, server allows plain text connections. By default, it is set to false. This setting is
112
+ * not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
113
+ * set, server allows both plain text and mTLS connections. See documentation of other encryption
114
+ * modes to confirm compatibility. Consider using it if you wish to upgrade in place your
115
+ * deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
115
116
* @return value or {@code null} for none
116
117
*/
117
118
public java .lang .Boolean getAllowOpen () {
118
119
return allowOpen ;
119
120
}
120
121
121
122
/**
122
- * This field applies only for Traffic Director policies. It is must be set to false for external
123
- * HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
124
- * true, server allows plain text connections. By default, it is set to false. This setting is not
125
- * exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
126
- * server allows both plain text and mTLS connections. See documentation of other encryption modes
127
- * to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
128
- * TLS while having mixed TLS and non-TLS traffic reaching port :80.
123
+ * This field applies only for Traffic Director policies. It is must be set to false for
124
+ * Application Load Balancer policies. Determines if server allows plaintext connections. If set
125
+ * to true, server allows plain text connections. By default, it is set to false. This setting is
126
+ * not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
127
+ * set, server allows both plain text and mTLS connections. See documentation of other encryption
128
+ * modes to confirm compatibility. Consider using it if you wish to upgrade in place your
129
+ * deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
129
130
* @param allowOpen allowOpen or {@code null} for none
130
131
*/
131
132
public ServerTlsPolicy setAllowOpen (java .lang .Boolean allowOpen ) {
@@ -185,23 +186,23 @@ public ServerTlsPolicy setLabels(java.util.Map<String, java.lang.String> labels)
185
186
}
186
187
187
188
/**
188
- * This field is required if the policy is used with external HTTPS load balancers . This field can
189
- * be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
190
- * for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
191
- * not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
192
- * `mtls_policy` are set, server allows both plain text and mTLS connections.
189
+ * This field is required if the policy is used with Application Load Balancers . This field can be
190
+ * empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
191
+ * peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
192
+ * be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
193
+ * are set, server allows both plain text and mTLS connections.
193
194
* @return value or {@code null} for none
194
195
*/
195
196
public MTLSPolicy getMtlsPolicy () {
196
197
return mtlsPolicy ;
197
198
}
198
199
199
200
/**
200
- * This field is required if the policy is used with external HTTPS load balancers . This field can
201
- * be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
202
- * for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
203
- * not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
204
- * `mtls_policy` are set, server allows both plain text and mTLS connections.
201
+ * This field is required if the policy is used with Application Load Balancers . This field can be
202
+ * empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
203
+ * peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
204
+ * be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
205
+ * are set, server allows both plain text and mTLS connections.
205
206
* @param mtlsPolicy mtlsPolicy or {@code null} for none
206
207
*/
207
208
public ServerTlsPolicy setMtlsPolicy (MTLSPolicy mtlsPolicy ) {
@@ -229,8 +230,8 @@ public ServerTlsPolicy setName(java.lang.String name) {
229
230
}
230
231
231
232
/**
232
- * Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
233
- * be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
233
+ * Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
234
+ * empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
234
235
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
235
236
* supported.
236
237
* @return value or {@code null} for none
@@ -240,8 +241,8 @@ public GoogleCloudNetworksecurityV1CertificateProvider getServerCertificate() {
240
241
}
241
242
242
243
/**
243
- * Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
244
- * be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
244
+ * Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
245
+ * empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
245
246
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
246
247
* supported.
247
248
* @param serverCertificate serverCertificate or {@code null} for none
0 commit comments