Add configuration for TLS session ticket encryption key, to allow (#178)

session resumption across hot-restart or between multiple envoy
instances.

Signed-off-by: Greg Greenway ggreenway@apple.com
pull/187/merge
Greg Greenway 7 years ago committed by htuch
parent daec566748
commit e14661aa93
  1. 16
      api/sds.proto

@ -59,6 +59,16 @@ message TlsCertificate {
repeated DataSource signed_certificate_timestamp = 5;
}
message TlsSessionTicketKeys {
// Keys to encrypt/decrypt TLS session tickets for session resumption. The first
// key is used to encrypt new tickets that are created. All keys are candidates
// for decrypting received tickets.
//
// Each key must be exactly 80 bytes long, containing cryptographically-secure random
// data. For example, the output of "openssl rand 80".
repeated DataSource keys = 1;
}
message CertificateValidationContext {
// TLS certificate data containing certificate authority certificates to use
// in verifying a presented certificate. If not specified and a certificate is
@ -130,6 +140,11 @@ message DownstreamTlsContext {
// If specified, Envoy will reject connections without a valid and matching SNI.
google.protobuf.BoolValue require_sni = 3;
oneof session_ticket_keys {
TlsSessionTicketKeys keys = 4;
SdsSecretConfig config = 5;
}
}
message SdsSecretConfig {
@ -145,5 +160,6 @@ message Secret {
string name = 1;
oneof type {
TlsCertificate tls_certificate = 2;
TlsSessionTicketKeys session_ticket_keys = 3;
}
}

Loading…
Cancel
Save