All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.networkfirewall.model.ServerCertificateScope Maven / Gradle / Ivy

Go to download

The AWS Java SDK for AWS Network Firewall module holds the client classes that are used for communicating with AWS Network Firewall Service

There is a newer version: 1.12.780
Show newest version
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.networkfirewall.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* Settings that define the Secure Sockets Layer/Transport Layer Security (SSL/TLS) traffic that Network Firewall should * decrypt for inspection by the stateful rule engine. *

* * @see AWS API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class ServerCertificateScope implements Serializable, Cloneable, StructuredPojo { /** *

* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this * matches with any source address. *

*/ private java.util.List
sources; /** *

* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any destination address. *

*/ private java.util.List
destinations; /** *

* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this * matches with any source port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

*/ private java.util.List sourcePorts; /** *

* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, * this matches with any destination port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

*/ private java.util.List destinationPorts; /** *

* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. *

*/ private java.util.List protocols; /** *

* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this * matches with any source address. *

* * @return The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any source address. */ public java.util.List
getSources() { return sources; } /** *

* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this * matches with any source address. *

* * @param sources * The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any source address. */ public void setSources(java.util.Collection
sources) { if (sources == null) { this.sources = null; return; } this.sources = new java.util.ArrayList
(sources); } /** *

* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this * matches with any source address. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setSources(java.util.Collection)} or {@link #withSources(java.util.Collection)} if you want to override * the existing values. *

* * @param sources * The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any source address. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withSources(Address... sources) { if (this.sources == null) { setSources(new java.util.ArrayList
(sources.length)); } for (Address ele : sources) { this.sources.add(ele); } return this; } /** *

* The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this * matches with any source address. *

* * @param sources * The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any source address. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withSources(java.util.Collection
sources) { setSources(sources); return this; } /** *

* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any destination address. *

* * @return The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not * specified, this matches with any destination address. */ public java.util.List
getDestinations() { return destinations; } /** *

* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any destination address. *

* * @param destinations * The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not * specified, this matches with any destination address. */ public void setDestinations(java.util.Collection
destinations) { if (destinations == null) { this.destinations = null; return; } this.destinations = new java.util.ArrayList
(destinations); } /** *

* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any destination address. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setDestinations(java.util.Collection)} or {@link #withDestinations(java.util.Collection)} if you want to * override the existing values. *

* * @param destinations * The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not * specified, this matches with any destination address. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withDestinations(Address... destinations) { if (this.destinations == null) { setDestinations(new java.util.ArrayList
(destinations.length)); } for (Address ele : destinations) { this.destinations.add(ele); } return this; } /** *

* The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, * this matches with any destination address. *

* * @param destinations * The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not * specified, this matches with any destination address. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withDestinations(java.util.Collection
destinations) { setDestinations(destinations); return this; } /** *

* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this * matches with any source port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @return The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any source port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. */ public java.util.List getSourcePorts() { return sourcePorts; } /** *

* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this * matches with any source port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @param sourcePorts * The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any source port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. */ public void setSourcePorts(java.util.Collection sourcePorts) { if (sourcePorts == null) { this.sourcePorts = null; return; } this.sourcePorts = new java.util.ArrayList(sourcePorts); } /** *

* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this * matches with any source port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setSourcePorts(java.util.Collection)} or {@link #withSourcePorts(java.util.Collection)} if you want to * override the existing values. *

* * @param sourcePorts * The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any source port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withSourcePorts(PortRange... sourcePorts) { if (this.sourcePorts == null) { setSourcePorts(new java.util.ArrayList(sourcePorts.length)); } for (PortRange ele : sourcePorts) { this.sourcePorts.add(ele); } return this; } /** *

* The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this * matches with any source port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @param sourcePorts * The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any source port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withSourcePorts(java.util.Collection sourcePorts) { setSourcePorts(sourcePorts); return this; } /** *

* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, * this matches with any destination port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @return The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any destination port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. */ public java.util.List getDestinationPorts() { return destinationPorts; } /** *

* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, * this matches with any destination port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @param destinationPorts * The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any destination port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. */ public void setDestinationPorts(java.util.Collection destinationPorts) { if (destinationPorts == null) { this.destinationPorts = null; return; } this.destinationPorts = new java.util.ArrayList(destinationPorts); } /** *

* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, * this matches with any destination port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setDestinationPorts(java.util.Collection)} or {@link #withDestinationPorts(java.util.Collection)} if you * want to override the existing values. *

* * @param destinationPorts * The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any destination port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withDestinationPorts(PortRange... destinationPorts) { if (this.destinationPorts == null) { setDestinationPorts(new java.util.ArrayList(destinationPorts.length)); } for (PortRange ele : destinationPorts) { this.destinationPorts.add(ele); } return this; } /** *

* The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, * this matches with any destination port. *

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. *

* * @param destinationPorts * The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not * specified, this matches with any destination port.

*

* You can specify individual ports, for example 1994, and you can specify port ranges, such as * 1990:1994. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withDestinationPorts(java.util.Collection destinationPorts) { setDestinationPorts(destinationPorts); return this; } /** *

* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. *

* * @return The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol * number (IANA). Network Firewall currently supports only TCP. */ public java.util.List getProtocols() { return protocols; } /** *

* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. *

* * @param protocols * The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. */ public void setProtocols(java.util.Collection protocols) { if (protocols == null) { this.protocols = null; return; } this.protocols = new java.util.ArrayList(protocols); } /** *

* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setProtocols(java.util.Collection)} or {@link #withProtocols(java.util.Collection)} if you want to * override the existing values. *

* * @param protocols * The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withProtocols(Integer... protocols) { if (this.protocols == null) { setProtocols(new java.util.ArrayList(protocols.length)); } for (Integer ele : protocols) { this.protocols.add(ele); } return this; } /** *

* The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. *

* * @param protocols * The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number * (IANA). Network Firewall currently supports only TCP. * @return Returns a reference to this object so that method calls can be chained together. */ public ServerCertificateScope withProtocols(java.util.Collection protocols) { setProtocols(protocols); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getSources() != null) sb.append("Sources: ").append(getSources()).append(","); if (getDestinations() != null) sb.append("Destinations: ").append(getDestinations()).append(","); if (getSourcePorts() != null) sb.append("SourcePorts: ").append(getSourcePorts()).append(","); if (getDestinationPorts() != null) sb.append("DestinationPorts: ").append(getDestinationPorts()).append(","); if (getProtocols() != null) sb.append("Protocols: ").append(getProtocols()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof ServerCertificateScope == false) return false; ServerCertificateScope other = (ServerCertificateScope) obj; if (other.getSources() == null ^ this.getSources() == null) return false; if (other.getSources() != null && other.getSources().equals(this.getSources()) == false) return false; if (other.getDestinations() == null ^ this.getDestinations() == null) return false; if (other.getDestinations() != null && other.getDestinations().equals(this.getDestinations()) == false) return false; if (other.getSourcePorts() == null ^ this.getSourcePorts() == null) return false; if (other.getSourcePorts() != null && other.getSourcePorts().equals(this.getSourcePorts()) == false) return false; if (other.getDestinationPorts() == null ^ this.getDestinationPorts() == null) return false; if (other.getDestinationPorts() != null && other.getDestinationPorts().equals(this.getDestinationPorts()) == false) return false; if (other.getProtocols() == null ^ this.getProtocols() == null) return false; if (other.getProtocols() != null && other.getProtocols().equals(this.getProtocols()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getSources() == null) ? 0 : getSources().hashCode()); hashCode = prime * hashCode + ((getDestinations() == null) ? 0 : getDestinations().hashCode()); hashCode = prime * hashCode + ((getSourcePorts() == null) ? 0 : getSourcePorts().hashCode()); hashCode = prime * hashCode + ((getDestinationPorts() == null) ? 0 : getDestinationPorts().hashCode()); hashCode = prime * hashCode + ((getProtocols() == null) ? 0 : getProtocols().hashCode()); return hashCode; } @Override public ServerCertificateScope clone() { try { return (ServerCertificateScope) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.networkfirewall.model.transform.ServerCertificateScopeMarshaller.getInstance().marshall(this, protocolMarshaller); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy