1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217
|
/*
* Copyright The OpenTelemetry Authors
* SPDX-License-Identifier: Apache-2.0
*/
/*
* DO NOT EDIT, this is an Auto-generated file from:
* buildscripts/semantic-convention/templates/registry/semantic_attributes-h.j2
*/
#pragma once
#include "opentelemetry/common/macros.h"
#include "opentelemetry/version.h"
OPENTELEMETRY_BEGIN_NAMESPACE
namespace semconv
{
namespace tls
{
/**
String indicating the <a
href="https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5">cipher</a> used during the
current connection. <p> The values allowed for @code tls.cipher @endcode MUST be one of the @code
Descriptions @endcode of the <a
href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#table-tls-parameters-4">registered
TLS Cipher Suits</a>.
*/
static constexpr const char *kTlsCipher = "tls.cipher";
/**
PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive of
@code client.certificate_chain @endcode since this value also exists in that list.
*/
static constexpr const char *kTlsClientCertificate = "tls.client.certificate";
/**
Array of PEM-encoded certificates that make up the certificate chain offered by the client. This
is usually mutually-exclusive of @code client.certificate @endcode since that value should be the
first certificate in the chain.
*/
static constexpr const char *kTlsClientCertificateChain = "tls.client.certificate_chain";
/**
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the
client. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsClientHashMd5 = "tls.client.hash.md5";
/**
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the
client. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsClientHashSha1 = "tls.client.hash.sha1";
/**
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by
the client. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsClientHashSha256 = "tls.client.hash.sha256";
/**
Distinguished name of <a
href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject</a> of the issuer of
the x.509 certificate presented by the client.
*/
static constexpr const char *kTlsClientIssuer = "tls.client.issuer";
/**
A hash that identifies clients based on how they perform an SSL/TLS handshake.
*/
static constexpr const char *kTlsClientJa3 = "tls.client.ja3";
/**
Date/Time indicating when client certificate is no longer considered valid.
*/
static constexpr const char *kTlsClientNotAfter = "tls.client.not_after";
/**
Date/Time indicating when client certificate is first considered valid.
*/
static constexpr const char *kTlsClientNotBefore = "tls.client.not_before";
/**
Deprecated, use @code server.address @endcode instead.
@deprecated
{"note": "Replaced by @code server.address @endcode.", "reason": "renamed", "renamed_to":
"server.address"}
*/
OPENTELEMETRY_DEPRECATED static constexpr const char *kTlsClientServerName =
"tls.client.server_name";
/**
Distinguished name of subject of the x.509 certificate presented by the client.
*/
static constexpr const char *kTlsClientSubject = "tls.client.subject";
/**
Array of ciphers offered by the client during the client hello.
*/
static constexpr const char *kTlsClientSupportedCiphers = "tls.client.supported_ciphers";
/**
String indicating the curve used for the given cipher, when applicable
*/
static constexpr const char *kTlsCurve = "tls.curve";
/**
Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted
tunnel.
*/
static constexpr const char *kTlsEstablished = "tls.established";
/**
String indicating the protocol being tunneled. Per the values in the <a
href="https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids">IANA
registry</a>, this string should be lower case.
*/
static constexpr const char *kTlsNextProtocol = "tls.next_protocol";
/**
Normalized lowercase protocol name parsed from original string of the negotiated <a
href="https://docs.openssl.org/1.1.1/man3/SSL_get_version/#return-values">SSL/TLS protocol
version</a>
*/
static constexpr const char *kTlsProtocolName = "tls.protocol.name";
/**
Numeric part of the version parsed from the original string of the negotiated <a
href="https://docs.openssl.org/1.1.1/man3/SSL_get_version/#return-values">SSL/TLS protocol
version</a>
*/
static constexpr const char *kTlsProtocolVersion = "tls.protocol.version";
/**
Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation.
*/
static constexpr const char *kTlsResumed = "tls.resumed";
/**
PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive of
@code server.certificate_chain @endcode since this value also exists in that list.
*/
static constexpr const char *kTlsServerCertificate = "tls.server.certificate";
/**
Array of PEM-encoded certificates that make up the certificate chain offered by the server. This
is usually mutually-exclusive of @code server.certificate @endcode since that value should be the
first certificate in the chain.
*/
static constexpr const char *kTlsServerCertificateChain = "tls.server.certificate_chain";
/**
Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the
server. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsServerHashMd5 = "tls.server.hash.md5";
/**
Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the
server. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsServerHashSha1 = "tls.server.hash.sha1";
/**
Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by
the server. For consistency with other hash values, this value should be formatted as an uppercase
hash.
*/
static constexpr const char *kTlsServerHashSha256 = "tls.server.hash.sha256";
/**
Distinguished name of <a
href="https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6">subject</a> of the issuer of
the x.509 certificate presented by the client.
*/
static constexpr const char *kTlsServerIssuer = "tls.server.issuer";
/**
A hash that identifies servers based on how they perform an SSL/TLS handshake.
*/
static constexpr const char *kTlsServerJa3s = "tls.server.ja3s";
/**
Date/Time indicating when server certificate is no longer considered valid.
*/
static constexpr const char *kTlsServerNotAfter = "tls.server.not_after";
/**
Date/Time indicating when server certificate is first considered valid.
*/
static constexpr const char *kTlsServerNotBefore = "tls.server.not_before";
/**
Distinguished name of subject of the x.509 certificate presented by the server.
*/
static constexpr const char *kTlsServerSubject = "tls.server.subject";
namespace TlsProtocolNameValues
{
static constexpr const char *kSsl = "ssl";
static constexpr const char *kTls = "tls";
} // namespace TlsProtocolNameValues
} // namespace tls
} // namespace semconv
OPENTELEMETRY_END_NAMESPACE
|