Class: Google::Cloud::Compute::V1::TargetHttpsProxy

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/compute/v1/compute.rb

Overview

Represents a Target HTTPS Proxy resource.

Google Compute Engine has two Target HTTPS Proxy resources:

A target HTTPS proxy is a component of Google Cloud HTTPS load balancers.

  • targetHttpsProxies are used by global external Application Load Balancers, classic Application Load Balancers, cross-region internal Application Load Balancers, and Traffic Director.
  • regionTargetHttpsProxies are used by regional internal Application Load Balancers and regional external Application Load Balancers.

Forwarding rules reference a target HTTPS proxy, and the target proxy then references a URL map. For more information, readUsing Target Proxies and Forwarding rule concepts.

Defined Under Namespace

Modules: QuicOverride, TlsEarlyData

Instance Attribute Summary collapse

Instance Attribute Details

#authorization_policy::String

Returns Optional. A URL referring to a networksecurity.AuthorizationPolicy resource that describes how the proxy should authorize inbound traffic. If left blank, access will not be restricted by an authorization policy.

Refer to the AuthorizationPolicy resource for additional details.

authorizationPolicy only applies to a globalTargetHttpsProxy attached toglobalForwardingRules with theloadBalancingScheme set to INTERNAL_SELF_MANAGED.

Note: This field currently has no impact.

Returns:

  • (::String)

    Optional. A URL referring to a networksecurity.AuthorizationPolicy resource that describes how the proxy should authorize inbound traffic. If left blank, access will not be restricted by an authorization policy.

    Refer to the AuthorizationPolicy resource for additional details.

    authorizationPolicy only applies to a globalTargetHttpsProxy attached toglobalForwardingRules with theloadBalancingScheme set to INTERNAL_SELF_MANAGED.

    Note: This field currently has no impact.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#certificate_map::String

Returns URL of a certificate map that identifies a certificate map associated with the given target proxy. This field can only be set for Global external Application Load Balancer or Classic Application Load Balancer. For other products use Certificate Manager Certificates instead.

If set, sslCertificates will be ignored.

Accepted format is//certificatemanager.googleapis.com/projects/{project}/locations/{location}/certificateMaps/{resourceName}.

Returns:

  • (::String)

    URL of a certificate map that identifies a certificate map associated with the given target proxy. This field can only be set for Global external Application Load Balancer or Classic Application Load Balancer. For other products use Certificate Manager Certificates instead.

    If set, sslCertificates will be ignored.

    Accepted format is//certificatemanager.googleapis.com/projects/{project}/locations/{location}/certificateMaps/{resourceName}.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#creation_timestamp::String

Returns Output only. [Output Only] Creation timestamp inRFC3339 text format.

Returns:

  • (::String)

    Output only. [Output Only] Creation timestamp inRFC3339 text format.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#description::String

Returns An optional description of this resource. Provide this property when you create the resource.

Returns:

  • (::String)

    An optional description of this resource. Provide this property when you create the resource.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#fingerprint::String

Returns Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a TargetHttpsProxy. An up-to-date fingerprint must be provided in order to patch the TargetHttpsProxy; otherwise, the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve the TargetHttpsProxy.

Returns:

  • (::String)

    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a TargetHttpsProxy. An up-to-date fingerprint must be provided in order to patch the TargetHttpsProxy; otherwise, the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve the TargetHttpsProxy.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#http_keep_alive_timeout_sec::Integer

Returns Specifies how long to keep a connection open, after completing a response, while there is no matching traffic (in seconds). If an HTTP keep-alive is not specified, a default value (610 seconds) will be used.

For global external Application Load Balancers, the minimum allowed value is 5 seconds and the maximum allowed value is 1200 seconds.

For classic Application Load Balancers, this option is not supported.

Returns:

  • (::Integer)

    Specifies how long to keep a connection open, after completing a response, while there is no matching traffic (in seconds). If an HTTP keep-alive is not specified, a default value (610 seconds) will be used.

    For global external Application Load Balancers, the minimum allowed value is 5 seconds and the maximum allowed value is 1200 seconds.

    For classic Application Load Balancers, this option is not supported.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#id::Integer

Returns [Output Only] The unique identifier for the resource. This identifier is defined by the server.

Returns:

  • (::Integer)

    [Output Only] The unique identifier for the resource. This identifier is defined by the server.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#kind::String

Returns Output only. [Output Only] Type of resource. Alwayscompute#targetHttpsProxy for target HTTPS proxies.

Returns:

  • (::String)

    Output only. [Output Only] Type of resource. Alwayscompute#targetHttpsProxy for target HTTPS proxies.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#name::String

Returns Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply withRFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

Returns:

  • (::String)

    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply withRFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#proxy_bind::Boolean

Returns This field only applies when the forwarding rule that references this target proxy has a loadBalancingScheme set toINTERNAL_SELF_MANAGED.

When this field is set to true, Envoy proxies set up inbound traffic interception and bind to the IP address and port specified in the forwarding rule. This is generally useful when using Traffic Director to configure Envoy as a gateway or middle proxy (in other words, not a sidecar proxy). The Envoy proxy listens for inbound requests and handles requests when it receives them.

The default is false.

Returns:

  • (::Boolean)

    This field only applies when the forwarding rule that references this target proxy has a loadBalancingScheme set toINTERNAL_SELF_MANAGED.

    When this field is set to true, Envoy proxies set up inbound traffic interception and bind to the IP address and port specified in the forwarding rule. This is generally useful when using Traffic Director to configure Envoy as a gateway or middle proxy (in other words, not a sidecar proxy). The Envoy proxy listens for inbound requests and handles requests when it receives them.

    The default is false.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#quic_override::String

Returns Specifies the QUIC override policy for this TargetHttpsProxy resource. This setting determines whether the load balancer attempts to negotiate QUIC with clients. You can specify NONE, ENABLE, orDISABLE.

  • When quic-override is set to NONE, Google manages whether QUIC is used.
  • When quic-override is set to ENABLE, the load balancer uses QUIC when possible.
  • When quic-override is set to DISABLE, the load balancer doesn't use QUIC.
  • If the quic-override flag is not specified,NONE is implied. Check the QuicOverride enum for the list of possible values.

Returns:

  • (::String)

    Specifies the QUIC override policy for this TargetHttpsProxy resource. This setting determines whether the load balancer attempts to negotiate QUIC with clients. You can specify NONE, ENABLE, orDISABLE.

    • When quic-override is set to NONE, Google manages whether QUIC is used.
    • When quic-override is set to ENABLE, the load balancer uses QUIC when possible.
    • When quic-override is set to DISABLE, the load balancer doesn't use QUIC.
    • If the quic-override flag is not specified,NONE is implied. Check the QuicOverride enum for the list of possible values.


78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#region::String

Returns Output only. [Output Only] URL of the region where the regional TargetHttpsProxy resides. This field is not applicable to global TargetHttpsProxies.

Returns:

  • (::String)

    Output only. [Output Only] URL of the region where the regional TargetHttpsProxy resides. This field is not applicable to global TargetHttpsProxies.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

Returns [Output Only] Server-defined URL for the resource.

Returns:

  • (::String)

    [Output Only] Server-defined URL for the resource.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#server_tls_policy::String

Returns Optional. A URL referring to a networksecurity.ServerTlsPolicy resource that describes how the proxy should authenticate inbound traffic.

serverTlsPolicy only applies to a globalTargetHttpsProxy attached toglobalForwardingRules with theloadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL orEXTERNAL_MANAGED or INTERNAL_MANAGED. It also applies to a regional TargetHttpsProxy attached to regional forwardingRules with theloadBalancingScheme set to EXTERNAL_MANAGED orINTERNAL_MANAGED. For details whichServerTlsPolicy resources are accepted withINTERNAL_SELF_MANAGED and which with EXTERNAL,INTERNAL_MANAGED, EXTERNAL_MANAGEDloadBalancingScheme consult ServerTlsPolicy documentation.

If left blank, communications are not encrypted.

Returns:

  • (::String)

    Optional. A URL referring to a networksecurity.ServerTlsPolicy resource that describes how the proxy should authenticate inbound traffic.

    serverTlsPolicy only applies to a globalTargetHttpsProxy attached toglobalForwardingRules with theloadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL orEXTERNAL_MANAGED or INTERNAL_MANAGED. It also applies to a regional TargetHttpsProxy attached to regional forwardingRules with theloadBalancingScheme set to EXTERNAL_MANAGED orINTERNAL_MANAGED. For details whichServerTlsPolicy resources are accepted withINTERNAL_SELF_MANAGED and which with EXTERNAL,INTERNAL_MANAGED, EXTERNAL_MANAGEDloadBalancingScheme consult ServerTlsPolicy documentation.

    If left blank, communications are not encrypted.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#ssl_certificates::Array<::String>

Returns URLs to SslCertificate resources that are used to authenticate connections between users and the load balancer. At least one SSL certificate must be specified. SslCertificates do not apply when the load balancing scheme is set to INTERNAL_SELF_MANAGED.

The URLs should refer to a SSL Certificate resource or Certificate Manager Certificate resource. Mixing Classic Certificates and Certificate Manager Certificates is not allowed. Certificate Manager Certificates must include the certificatemanager API namespace. Using Certificate Manager Certificates in this field is not supported by Global external Application Load Balancer or Classic Application Load Balancer, use certificate_map instead.

Currently, you may specify up to 15 Classic SSL Certificates or up to 100 Certificate Manager Certificates.

Certificate Manager Certificates accepted formats are:

Returns:

  • (::Array<::String>)

    URLs to SslCertificate resources that are used to authenticate connections between users and the load balancer. At least one SSL certificate must be specified. SslCertificates do not apply when the load balancing scheme is set to INTERNAL_SELF_MANAGED.

    The URLs should refer to a SSL Certificate resource or Certificate Manager Certificate resource. Mixing Classic Certificates and Certificate Manager Certificates is not allowed. Certificate Manager Certificates must include the certificatemanager API namespace. Using Certificate Manager Certificates in this field is not supported by Global external Application Load Balancer or Classic Application Load Balancer, use certificate_map instead.

    Currently, you may specify up to 15 Classic SSL Certificates or up to 100 Certificate Manager Certificates.

    Certificate Manager Certificates accepted formats are:



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#ssl_policy::String

Returns URL of SslPolicy resource that will be associated with the TargetHttpsProxy resource. If not set, the TargetHttpsProxy resource has no SSL policy configured.

Returns:

  • (::String)

    URL of SslPolicy resource that will be associated with the TargetHttpsProxy resource. If not set, the TargetHttpsProxy resource has no SSL policy configured.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#tls_early_data::String

Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted for this service. Early Data allows a TLS resumption handshake to include the initial application payload (a HTTP request) alongside the handshake, reducing the effective round trips to "zero". This applies to TLS 1.3 connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).

This can improve application performance, especially on networks where interruptions may be common, such as on mobile.

Requests with Early Data will have the "Early-Data" HTTP header set on the request, with a value of "1", to allow the backend to determine whether Early Data was included.

Note: TLS Early Data may allow requests to be replayed, as the data is sent to the backend before the handshake has fully completed. Applications that allow idempotent HTTP methods to make non-idempotent changes, such as a GET request updating a database, should not accept Early Data on those requests, and reject requests with the "Early-Data: 1" HTTP header by returning a HTTP 425 (Too Early) status code, in order to remain RFC compliant.

The default value is DISABLED. Check the TlsEarlyData enum for the list of possible values.

Returns:

  • (::String)

    Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted for this service. Early Data allows a TLS resumption handshake to include the initial application payload (a HTTP request) alongside the handshake, reducing the effective round trips to "zero". This applies to TLS 1.3 connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).

    This can improve application performance, especially on networks where interruptions may be common, such as on mobile.

    Requests with Early Data will have the "Early-Data" HTTP header set on the request, with a value of "1", to allow the backend to determine whether Early Data was included.

    Note: TLS Early Data may allow requests to be replayed, as the data is sent to the backend before the handshake has fully completed. Applications that allow idempotent HTTP methods to make non-idempotent changes, such as a GET request updating a database, should not accept Early Data on those requests, and reject requests with the "Early-Data: 1" HTTP header by returning a HTTP 425 (Too Early) status code, in order to remain RFC compliant.

    The default value is DISABLED. Check the TlsEarlyData enum for the list of possible values.



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end

#url_map::String

Returns A fully-qualified or valid partial URL to the UrlMap resource that defines the mapping from URL to the BackendService. For example, the following are all valid URLs for specifying a URL map:

Returns:



78551
78552
78553
78554
78555
78556
78557
78558
78559
78560
78561
78562
78563
78564
78565
78566
78567
78568
78569
78570
78571
78572
78573
78574
78575
78576
78577
78578
78579
78580
78581
78582
78583
78584
78585
78586
78587
78588
78589
78590
78591
78592
78593
78594
78595
78596
78597
78598
78599
78600
78601
78602
78603
78604
78605
78606
78607
78608
78609
78610
78611
78612
78613
78614
78615
78616
78617
78618
78619
78620
78621
78622
78623
78624
78625
78626
78627
78628
78629
78630
78631
78632
78633
78634
78635
78636
# File 'proto_docs/google/cloud/compute/v1/compute.rb', line 78551

class TargetHttpsProxy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Specifies the QUIC override policy for this TargetHttpsProxy resource. This
  # setting determines whether the load balancer attempts to negotiate QUIC
  # with clients.
  # You can specify NONE, ENABLE, orDISABLE.
  #
  #    - When quic-override is set to NONE,
  #    Google manages whether QUIC is used.
  #    - When quic-override is set to ENABLE, the
  #    load balancer uses QUIC when possible.
  #    - When quic-override is set to DISABLE, the
  #    load balancer doesn't use QUIC.
  #    - If the quic-override flag is not specified,NONE is implied.
  module QuicOverride
    # A value indicating that the enum field is not set.
    UNDEFINED_QUIC_OVERRIDE = 0

    # The load balancer will not attempt to negotiate QUIC with clients.
    DISABLE = 241_807_048

    # The load balancer will attempt to negotiate QUIC with clients.
    ENABLE = 438_835_587

    # No overrides to the default QUIC policy. This option is implicit if
    # no QUIC override has been specified in the request.
    NONE = 2_402_104
  end

  # Specifies whether TLS 1.3 0-RTT Data ("Early Data") should be accepted
  # for this service. Early Data allows a TLS resumption handshake to include
  # the initial application payload (a HTTP request) alongside the handshake,
  # reducing the effective round trips to "zero". This applies to TLS 1.3
  # connections over TCP (HTTP/2) as well as over UDP (QUIC/h3).
  #
  #
  # This can improve application performance, especially on networks where
  # interruptions may be common, such as on mobile.
  #
  #
  # Requests with Early Data will have the "Early-Data" HTTP header set on
  # the request, with a value of "1", to allow the backend to determine whether
  # Early Data was included.
  #
  #
  # Note: TLS Early Data may allow requests to be replayed, as the data is
  # sent to the backend before the handshake has fully completed. Applications
  # that allow idempotent HTTP methods to make non-idempotent changes, such as
  # a GET request updating a database, should not accept Early Data on those
  # requests, and reject requests with the "Early-Data: 1" HTTP header by
  # returning a HTTP 425 (Too Early) status code, in order to remain RFC
  # compliant.
  #
  #
  # The default value is DISABLED.
  module TlsEarlyData
    # A value indicating that the enum field is not set.
    UNDEFINED_TLS_EARLY_DATA = 0

    # TLS 1.3 Early Data is not advertised, and any (invalid) attempts to send
    # Early Data will be rejected by closing the connection.
    DISABLED = 516_696_700

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE). This mode
    # does not enforce any other limitations for requests with Early Data. The
    # application owner should validate that Early Data is acceptable for a
    # given request path.
    PERMISSIVE = 504_345_247

    # This enables TLS 1.3 0-RTT, and only allows Early Data to be included on
    # requests with safe HTTP methods (GET, HEAD, OPTIONS, TRACE) without query
    # parameters. Requests that send Early Data with non-idempotent HTTP
    # methods or with query parameters will be rejected with a HTTP 425.
    STRICT = 308_826_825

    # This enables TLS 1.3 Early Data for requests with any HTTP method
    # including non-idempotent methods list POST. This mode does not enforce
    # any other limitations. This may be valuable for gRPC use cases. However,
    # we do not recommend this method unless you have evaluated your security
    # stance and mitigated the risk of replay attacks using other mechanisms.
    UNRESTRICTED = 457_266_100
  end
end