case class SecurityConfig(tlsEnabled: Option[Boolean] = None, nativeTlsEnabled: Option[Boolean] = None, trustCertificates: Option[Seq[X509Certificate]] = None, trustManagerFactory: Option[TrustManagerFactory] = None, enableHostnameVerification: Option[Boolean] = None, trustCertificate: Option[Path] = None, ciphers: Option[Seq[String]] = None, trustKeyStore: Option[KeyStore] = None, trustStoreFile: Option[TrustStoreFile] = None) extends Product with Serializable

Linear Supertypes
Serializable, Product, Equals, AnyRef, Any
Ordering
  1. Alphabetic
  2. By Inheritance
Inherited
  1. SecurityConfig
  2. Serializable
  3. Product
  4. Equals
  5. AnyRef
  6. Any
  1. Hide All
  2. Show All
Visibility
  1. Public
  2. Protected

Instance Constructors

  1. new SecurityConfig(tlsEnabled: Option[Boolean] = None, nativeTlsEnabled: Option[Boolean] = None, trustCertificates: Option[Seq[X509Certificate]] = None, trustManagerFactory: Option[TrustManagerFactory] = None, enableHostnameVerification: Option[Boolean] = None, trustCertificate: Option[Path] = None, ciphers: Option[Seq[String]] = None, trustKeyStore: Option[KeyStore] = None, trustStoreFile: Option[TrustStoreFile] = None)

Value Members

  1. def ciphers(value: Seq[String]): SecurityConfig

    Customize the list of ciphers that is negotiated with the cluster.

    Customize the list of ciphers that is negotiated with the cluster.

    Note that this method is considered advanced API, please only customize the cipher list if you know what you are doing (for example if you want to shrink the cipher list down to a very specific subset for security or compliance reasons).

    If no custom ciphers are configured, the default set will be used.

    returns

    this for chaining purposes.

  2. def enableHostnameVerification(value: Boolean): SecurityConfig

    Enables or disable hostname verification (enabled by default).

    Enables or disable hostname verification (enabled by default).

    Note that disabling hostname verification will cause the TLS connection to not verify that the hostname/ip is actually part of the certificate and as a result not detect certain kinds of attacks. Only disable if you understand the impact and risks!

    returns

    this for chaining purposes.

  3. def enableNativeTls(value: Boolean): SecurityConfig

    Enables/disables native TLS (enabled by default).

    Enables/disables native TLS (enabled by default).

    returns

    this for chaining purposes.

  4. def enableTls(value: Boolean): SecurityConfig

    Enables TLS for all client/server communication (disabled by default).

    Enables TLS for all client/server communication (disabled by default).

    returns

    this for chaining purposes.

  5. def productElementNames: Iterator[String]
    Definition Classes
    Product
  6. def productIterator: Iterator[Any]
    Definition Classes
    Product
  7. def trustCertificate(value: Path): SecurityConfig

    Loads a X.509 trust certificate from the given path and uses it.

    Loads a X.509 trust certificate from the given path and uses it.

    returns

    this for chaining purposes.

  8. def trustCertificates(values: Seq[X509Certificate]): SecurityConfig

    Loads the given list of X.509 certificates into the trust store.

    Loads the given list of X.509 certificates into the trust store.

    returns

    this for chaining purposes.

  9. def trustManagerFactory(value: TrustManagerFactory): SecurityConfig

    Provide a trust manager factory directly for maximum flexibility.

    Provide a trust manager factory directly for maximum flexibility.

    While providing the most flexibility, most users will find the other overloads more convenient, like passing in a trustStore directly or via filepath String, Optional).

    returns

    this for chaining purposes.

  10. def trustStore(trustStorePath: Path, trustStorePassword: String, trustStoreType: Option[String] = None): SecurityConfig
  11. def trustStore(value: KeyStore): SecurityConfig