@ -11,6 +11,7 @@ import "google/protobuf/duration.proto";
import "google/protobuf/struct.proto" ;
import "google/protobuf/wrappers.proto" ;
import "udpa/annotations/sensitive.proto" ;
import "udpa/annotations/versioning.proto" ;
import "validate/validate.proto" ;
@ -136,7 +137,7 @@ message TlsCertificate {
config.core.v3alpha.DataSource certificate_chain = 1 ;
/ / The TLS private key.
config.core.v3alpha.DataSource private_key = 2 ;
config.core.v3alpha.DataSource private_key = 2 [ ( udpa.annotations.sensitive ) = true ] ;
/ / BoringSSL private key method provider. This is an alternative to : ref : ` private_key
/ / < envoy_api_field_extensions.transport_sockets.tls.v3alpha.TlsCertificate.private_key > ` field.
@ -150,7 +151,7 @@ message TlsCertificate {
/ / The password to decrypt the TLS private key. If this field is not set , it is assumed that the
/ / TLS private key is not password encrypted.
config.core.v3alpha.DataSource password = 3 ;
config.core.v3alpha.DataSource password = 3 [ ( udpa.annotations.sensitive ) = true ] ;
/ / [ # not - implemented - hide : ]
config.core.v3alpha.DataSource ocsp_staple = 4 ;
@ -187,7 +188,8 @@ message TlsSessionTicketKeys {
/ / * Keep the session ticket keys at least as secure as your TLS certificate private keys
/ / * Rotate session ticket keys at least daily , and preferably hourly
/ / * Always generate keys using a cryptographically - secure random data source
repeated config.core.v3alpha.DataSource keys = 1 [ ( validate.rules ) . repeated = { min_items : 1 } ] ;
repeated config.core.v3alpha.DataSource keys = 1
[ ( validate.rules ) . repeated = { min_items : 1 } , ( udpa.annotations.sensitive ) = true ] ;
}
/ / [ # next - free - field : 10 ]