
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext Maven / Gradle / Ivy
The newest version!
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: envoy/api/v2/auth/tls.proto
package io.envoyproxy.envoy.api.v2.auth;
/**
*
* [#next-free-field: 8]
*
*
* Protobuf type {@code envoy.api.v2.auth.DownstreamTlsContext}
*/
public final class DownstreamTlsContext extends
com.google.protobuf.GeneratedMessageV3 implements
// @@protoc_insertion_point(message_implements:envoy.api.v2.auth.DownstreamTlsContext)
DownstreamTlsContextOrBuilder {
private static final long serialVersionUID = 0L;
// Use DownstreamTlsContext.newBuilder() to construct.
private DownstreamTlsContext(com.google.protobuf.GeneratedMessageV3.Builder> builder) {
super(builder);
}
private DownstreamTlsContext() {
}
@java.lang.Override
@SuppressWarnings({"unused"})
protected java.lang.Object newInstance(
UnusedPrivateParameter unused) {
return new DownstreamTlsContext();
}
@java.lang.Override
public final com.google.protobuf.UnknownFieldSet
getUnknownFields() {
return this.unknownFields;
}
private DownstreamTlsContext(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
this();
if (extensionRegistry == null) {
throw new java.lang.NullPointerException();
}
com.google.protobuf.UnknownFieldSet.Builder unknownFields =
com.google.protobuf.UnknownFieldSet.newBuilder();
try {
boolean done = false;
while (!done) {
int tag = input.readTag();
switch (tag) {
case 0:
done = true;
break;
case 10: {
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder subBuilder = null;
if (commonTlsContext_ != null) {
subBuilder = commonTlsContext_.toBuilder();
}
commonTlsContext_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(commonTlsContext_);
commonTlsContext_ = subBuilder.buildPartial();
}
break;
}
case 18: {
com.google.protobuf.BoolValue.Builder subBuilder = null;
if (requireClientCertificate_ != null) {
subBuilder = requireClientCertificate_.toBuilder();
}
requireClientCertificate_ = input.readMessage(com.google.protobuf.BoolValue.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(requireClientCertificate_);
requireClientCertificate_ = subBuilder.buildPartial();
}
break;
}
case 26: {
com.google.protobuf.BoolValue.Builder subBuilder = null;
if (requireSni_ != null) {
subBuilder = requireSni_.toBuilder();
}
requireSni_ = input.readMessage(com.google.protobuf.BoolValue.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(requireSni_);
requireSni_ = subBuilder.buildPartial();
}
break;
}
case 34: {
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder subBuilder = null;
if (sessionTicketKeysTypeCase_ == 4) {
subBuilder = ((io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_).toBuilder();
}
sessionTicketKeysType_ =
input.readMessage(io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom((io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_);
sessionTicketKeysType_ = subBuilder.buildPartial();
}
sessionTicketKeysTypeCase_ = 4;
break;
}
case 42: {
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder subBuilder = null;
if (sessionTicketKeysTypeCase_ == 5) {
subBuilder = ((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_).toBuilder();
}
sessionTicketKeysType_ =
input.readMessage(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_);
sessionTicketKeysType_ = subBuilder.buildPartial();
}
sessionTicketKeysTypeCase_ = 5;
break;
}
case 50: {
com.google.protobuf.Duration.Builder subBuilder = null;
if (sessionTimeout_ != null) {
subBuilder = sessionTimeout_.toBuilder();
}
sessionTimeout_ = input.readMessage(com.google.protobuf.Duration.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(sessionTimeout_);
sessionTimeout_ = subBuilder.buildPartial();
}
break;
}
case 56: {
sessionTicketKeysType_ = input.readBool();
sessionTicketKeysTypeCase_ = 7;
break;
}
default: {
if (!parseUnknownField(
input, unknownFields, extensionRegistry, tag)) {
done = true;
}
break;
}
}
}
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.setUnfinishedMessage(this);
} catch (com.google.protobuf.UninitializedMessageException e) {
throw e.asInvalidProtocolBufferException().setUnfinishedMessage(this);
} catch (java.io.IOException e) {
throw new com.google.protobuf.InvalidProtocolBufferException(
e).setUnfinishedMessage(this);
} finally {
this.unknownFields = unknownFields.build();
makeExtensionsImmutable();
}
}
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return io.envoyproxy.envoy.api.v2.auth.TlsProto.internal_static_envoy_api_v2_auth_DownstreamTlsContext_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return io.envoyproxy.envoy.api.v2.auth.TlsProto.internal_static_envoy_api_v2_auth_DownstreamTlsContext_fieldAccessorTable
.ensureFieldAccessorsInitialized(
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.class, io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.Builder.class);
}
private int sessionTicketKeysTypeCase_ = 0;
private java.lang.Object sessionTicketKeysType_;
public enum SessionTicketKeysTypeCase
implements com.google.protobuf.Internal.EnumLite,
com.google.protobuf.AbstractMessage.InternalOneOfEnum {
SESSION_TICKET_KEYS(4),
SESSION_TICKET_KEYS_SDS_SECRET_CONFIG(5),
DISABLE_STATELESS_SESSION_RESUMPTION(7),
SESSIONTICKETKEYSTYPE_NOT_SET(0);
private final int value;
private SessionTicketKeysTypeCase(int value) {
this.value = value;
}
/**
* @param value The number of the enum to look for.
* @return The enum associated with the given number.
* @deprecated Use {@link #forNumber(int)} instead.
*/
@java.lang.Deprecated
public static SessionTicketKeysTypeCase valueOf(int value) {
return forNumber(value);
}
public static SessionTicketKeysTypeCase forNumber(int value) {
switch (value) {
case 4: return SESSION_TICKET_KEYS;
case 5: return SESSION_TICKET_KEYS_SDS_SECRET_CONFIG;
case 7: return DISABLE_STATELESS_SESSION_RESUMPTION;
case 0: return SESSIONTICKETKEYSTYPE_NOT_SET;
default: return null;
}
}
public int getNumber() {
return this.value;
}
};
public SessionTicketKeysTypeCase
getSessionTicketKeysTypeCase() {
return SessionTicketKeysTypeCase.forNumber(
sessionTicketKeysTypeCase_);
}
public static final int COMMON_TLS_CONTEXT_FIELD_NUMBER = 1;
private io.envoyproxy.envoy.api.v2.auth.CommonTlsContext commonTlsContext_;
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
* @return Whether the commonTlsContext field is set.
*/
@java.lang.Override
public boolean hasCommonTlsContext() {
return commonTlsContext_ != null;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
* @return The commonTlsContext.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getCommonTlsContext() {
return commonTlsContext_ == null ? io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.getDefaultInstance() : commonTlsContext_;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder getCommonTlsContextOrBuilder() {
return getCommonTlsContext();
}
public static final int REQUIRE_CLIENT_CERTIFICATE_FIELD_NUMBER = 2;
private com.google.protobuf.BoolValue requireClientCertificate_;
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
* @return Whether the requireClientCertificate field is set.
*/
@java.lang.Override
public boolean hasRequireClientCertificate() {
return requireClientCertificate_ != null;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
* @return The requireClientCertificate.
*/
@java.lang.Override
public com.google.protobuf.BoolValue getRequireClientCertificate() {
return requireClientCertificate_ == null ? com.google.protobuf.BoolValue.getDefaultInstance() : requireClientCertificate_;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
@java.lang.Override
public com.google.protobuf.BoolValueOrBuilder getRequireClientCertificateOrBuilder() {
return getRequireClientCertificate();
}
public static final int REQUIRE_SNI_FIELD_NUMBER = 3;
private com.google.protobuf.BoolValue requireSni_;
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
* @return Whether the requireSni field is set.
*/
@java.lang.Override
public boolean hasRequireSni() {
return requireSni_ != null;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
* @return The requireSni.
*/
@java.lang.Override
public com.google.protobuf.BoolValue getRequireSni() {
return requireSni_ == null ? com.google.protobuf.BoolValue.getDefaultInstance() : requireSni_;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
@java.lang.Override
public com.google.protobuf.BoolValueOrBuilder getRequireSniOrBuilder() {
return getRequireSni();
}
public static final int SESSION_TICKET_KEYS_FIELD_NUMBER = 4;
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
* @return Whether the sessionTicketKeys field is set.
*/
@java.lang.Override
public boolean hasSessionTicketKeys() {
return sessionTicketKeysTypeCase_ == 4;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
* @return The sessionTicketKeys.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys getSessionTicketKeys() {
if (sessionTicketKeysTypeCase_ == 4) {
return (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder getSessionTicketKeysOrBuilder() {
if (sessionTicketKeysTypeCase_ == 4) {
return (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
}
public static final int SESSION_TICKET_KEYS_SDS_SECRET_CONFIG_FIELD_NUMBER = 5;
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
* @return Whether the sessionTicketKeysSdsSecretConfig field is set.
*/
@java.lang.Override
public boolean hasSessionTicketKeysSdsSecretConfig() {
return sessionTicketKeysTypeCase_ == 5;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
* @return The sessionTicketKeysSdsSecretConfig.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getSessionTicketKeysSdsSecretConfig() {
if (sessionTicketKeysTypeCase_ == 5) {
return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getSessionTicketKeysSdsSecretConfigOrBuilder() {
if (sessionTicketKeysTypeCase_ == 5) {
return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
}
public static final int DISABLE_STATELESS_SESSION_RESUMPTION_FIELD_NUMBER = 7;
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @return Whether the disableStatelessSessionResumption field is set.
*/
@java.lang.Override
public boolean hasDisableStatelessSessionResumption() {
return sessionTicketKeysTypeCase_ == 7;
}
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @return The disableStatelessSessionResumption.
*/
@java.lang.Override
public boolean getDisableStatelessSessionResumption() {
if (sessionTicketKeysTypeCase_ == 7) {
return (java.lang.Boolean) sessionTicketKeysType_;
}
return false;
}
public static final int SESSION_TIMEOUT_FIELD_NUMBER = 6;
private com.google.protobuf.Duration sessionTimeout_;
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
* @return Whether the sessionTimeout field is set.
*/
@java.lang.Override
public boolean hasSessionTimeout() {
return sessionTimeout_ != null;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
* @return The sessionTimeout.
*/
@java.lang.Override
public com.google.protobuf.Duration getSessionTimeout() {
return sessionTimeout_ == null ? com.google.protobuf.Duration.getDefaultInstance() : sessionTimeout_;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
@java.lang.Override
public com.google.protobuf.DurationOrBuilder getSessionTimeoutOrBuilder() {
return getSessionTimeout();
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output)
throws java.io.IOException {
if (commonTlsContext_ != null) {
output.writeMessage(1, getCommonTlsContext());
}
if (requireClientCertificate_ != null) {
output.writeMessage(2, getRequireClientCertificate());
}
if (requireSni_ != null) {
output.writeMessage(3, getRequireSni());
}
if (sessionTicketKeysTypeCase_ == 4) {
output.writeMessage(4, (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_);
}
if (sessionTicketKeysTypeCase_ == 5) {
output.writeMessage(5, (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_);
}
if (sessionTimeout_ != null) {
output.writeMessage(6, getSessionTimeout());
}
if (sessionTicketKeysTypeCase_ == 7) {
output.writeBool(
7, (boolean)((java.lang.Boolean) sessionTicketKeysType_));
}
unknownFields.writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
if (commonTlsContext_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(1, getCommonTlsContext());
}
if (requireClientCertificate_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(2, getRequireClientCertificate());
}
if (requireSni_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(3, getRequireSni());
}
if (sessionTicketKeysTypeCase_ == 4) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(4, (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_);
}
if (sessionTicketKeysTypeCase_ == 5) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(5, (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_);
}
if (sessionTimeout_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(6, getSessionTimeout());
}
if (sessionTicketKeysTypeCase_ == 7) {
size += com.google.protobuf.CodedOutputStream
.computeBoolSize(
7, (boolean)((java.lang.Boolean) sessionTicketKeysType_));
}
size += unknownFields.getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext)) {
return super.equals(obj);
}
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext other = (io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext) obj;
if (hasCommonTlsContext() != other.hasCommonTlsContext()) return false;
if (hasCommonTlsContext()) {
if (!getCommonTlsContext()
.equals(other.getCommonTlsContext())) return false;
}
if (hasRequireClientCertificate() != other.hasRequireClientCertificate()) return false;
if (hasRequireClientCertificate()) {
if (!getRequireClientCertificate()
.equals(other.getRequireClientCertificate())) return false;
}
if (hasRequireSni() != other.hasRequireSni()) return false;
if (hasRequireSni()) {
if (!getRequireSni()
.equals(other.getRequireSni())) return false;
}
if (hasSessionTimeout() != other.hasSessionTimeout()) return false;
if (hasSessionTimeout()) {
if (!getSessionTimeout()
.equals(other.getSessionTimeout())) return false;
}
if (!getSessionTicketKeysTypeCase().equals(other.getSessionTicketKeysTypeCase())) return false;
switch (sessionTicketKeysTypeCase_) {
case 4:
if (!getSessionTicketKeys()
.equals(other.getSessionTicketKeys())) return false;
break;
case 5:
if (!getSessionTicketKeysSdsSecretConfig()
.equals(other.getSessionTicketKeysSdsSecretConfig())) return false;
break;
case 7:
if (getDisableStatelessSessionResumption()
!= other.getDisableStatelessSessionResumption()) return false;
break;
case 0:
default:
}
if (!unknownFields.equals(other.unknownFields)) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
if (hasCommonTlsContext()) {
hash = (37 * hash) + COMMON_TLS_CONTEXT_FIELD_NUMBER;
hash = (53 * hash) + getCommonTlsContext().hashCode();
}
if (hasRequireClientCertificate()) {
hash = (37 * hash) + REQUIRE_CLIENT_CERTIFICATE_FIELD_NUMBER;
hash = (53 * hash) + getRequireClientCertificate().hashCode();
}
if (hasRequireSni()) {
hash = (37 * hash) + REQUIRE_SNI_FIELD_NUMBER;
hash = (53 * hash) + getRequireSni().hashCode();
}
if (hasSessionTimeout()) {
hash = (37 * hash) + SESSION_TIMEOUT_FIELD_NUMBER;
hash = (53 * hash) + getSessionTimeout().hashCode();
}
switch (sessionTicketKeysTypeCase_) {
case 4:
hash = (37 * hash) + SESSION_TICKET_KEYS_FIELD_NUMBER;
hash = (53 * hash) + getSessionTicketKeys().hashCode();
break;
case 5:
hash = (37 * hash) + SESSION_TICKET_KEYS_SDS_SECRET_CONFIG_FIELD_NUMBER;
hash = (53 * hash) + getSessionTicketKeysSdsSecretConfig().hashCode();
break;
case 7:
hash = (37 * hash) + DISABLE_STATELESS_SESSION_RESUMPTION_FIELD_NUMBER;
hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(
getDisableStatelessSessionResumption());
break;
case 0:
default:
}
hash = (29 * hash) + unknownFields.hashCode();
memoizedHashCode = hash;
return hash;
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() { return newBuilder(); }
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE
? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(
com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
*
* [#next-free-field: 8]
*
*
* Protobuf type {@code envoy.api.v2.auth.DownstreamTlsContext}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessageV3.Builder implements
// @@protoc_insertion_point(builder_implements:envoy.api.v2.auth.DownstreamTlsContext)
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContextOrBuilder {
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return io.envoyproxy.envoy.api.v2.auth.TlsProto.internal_static_envoy_api_v2_auth_DownstreamTlsContext_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return io.envoyproxy.envoy.api.v2.auth.TlsProto.internal_static_envoy_api_v2_auth_DownstreamTlsContext_fieldAccessorTable
.ensureFieldAccessorsInitialized(
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.class, io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.Builder.class);
}
// Construct using io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.newBuilder()
private Builder() {
maybeForceBuilderInitialization();
}
private Builder(
com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
super(parent);
maybeForceBuilderInitialization();
}
private void maybeForceBuilderInitialization() {
if (com.google.protobuf.GeneratedMessageV3
.alwaysUseFieldBuilders) {
}
}
@java.lang.Override
public Builder clear() {
super.clear();
if (commonTlsContextBuilder_ == null) {
commonTlsContext_ = null;
} else {
commonTlsContext_ = null;
commonTlsContextBuilder_ = null;
}
if (requireClientCertificateBuilder_ == null) {
requireClientCertificate_ = null;
} else {
requireClientCertificate_ = null;
requireClientCertificateBuilder_ = null;
}
if (requireSniBuilder_ == null) {
requireSni_ = null;
} else {
requireSni_ = null;
requireSniBuilder_ = null;
}
if (sessionTimeoutBuilder_ == null) {
sessionTimeout_ = null;
} else {
sessionTimeout_ = null;
sessionTimeoutBuilder_ = null;
}
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
return this;
}
@java.lang.Override
public com.google.protobuf.Descriptors.Descriptor
getDescriptorForType() {
return io.envoyproxy.envoy.api.v2.auth.TlsProto.internal_static_envoy_api_v2_auth_DownstreamTlsContext_descriptor;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext getDefaultInstanceForType() {
return io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.getDefaultInstance();
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext build() {
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext result = buildPartial();
if (!result.isInitialized()) {
throw newUninitializedMessageException(result);
}
return result;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext buildPartial() {
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext result = new io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext(this);
if (commonTlsContextBuilder_ == null) {
result.commonTlsContext_ = commonTlsContext_;
} else {
result.commonTlsContext_ = commonTlsContextBuilder_.build();
}
if (requireClientCertificateBuilder_ == null) {
result.requireClientCertificate_ = requireClientCertificate_;
} else {
result.requireClientCertificate_ = requireClientCertificateBuilder_.build();
}
if (requireSniBuilder_ == null) {
result.requireSni_ = requireSni_;
} else {
result.requireSni_ = requireSniBuilder_.build();
}
if (sessionTicketKeysTypeCase_ == 4) {
if (sessionTicketKeysBuilder_ == null) {
result.sessionTicketKeysType_ = sessionTicketKeysType_;
} else {
result.sessionTicketKeysType_ = sessionTicketKeysBuilder_.build();
}
}
if (sessionTicketKeysTypeCase_ == 5) {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
result.sessionTicketKeysType_ = sessionTicketKeysType_;
} else {
result.sessionTicketKeysType_ = sessionTicketKeysSdsSecretConfigBuilder_.build();
}
}
if (sessionTicketKeysTypeCase_ == 7) {
result.sessionTicketKeysType_ = sessionTicketKeysType_;
}
if (sessionTimeoutBuilder_ == null) {
result.sessionTimeout_ = sessionTimeout_;
} else {
result.sessionTimeout_ = sessionTimeoutBuilder_.build();
}
result.sessionTicketKeysTypeCase_ = sessionTicketKeysTypeCase_;
onBuilt();
return result;
}
@java.lang.Override
public Builder clone() {
return super.clone();
}
@java.lang.Override
public Builder setField(
com.google.protobuf.Descriptors.FieldDescriptor field,
java.lang.Object value) {
return super.setField(field, value);
}
@java.lang.Override
public Builder clearField(
com.google.protobuf.Descriptors.FieldDescriptor field) {
return super.clearField(field);
}
@java.lang.Override
public Builder clearOneof(
com.google.protobuf.Descriptors.OneofDescriptor oneof) {
return super.clearOneof(oneof);
}
@java.lang.Override
public Builder setRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field,
int index, java.lang.Object value) {
return super.setRepeatedField(field, index, value);
}
@java.lang.Override
public Builder addRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field,
java.lang.Object value) {
return super.addRepeatedField(field, value);
}
@java.lang.Override
public Builder mergeFrom(com.google.protobuf.Message other) {
if (other instanceof io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext) {
return mergeFrom((io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext)other);
} else {
super.mergeFrom(other);
return this;
}
}
public Builder mergeFrom(io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext other) {
if (other == io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext.getDefaultInstance()) return this;
if (other.hasCommonTlsContext()) {
mergeCommonTlsContext(other.getCommonTlsContext());
}
if (other.hasRequireClientCertificate()) {
mergeRequireClientCertificate(other.getRequireClientCertificate());
}
if (other.hasRequireSni()) {
mergeRequireSni(other.getRequireSni());
}
if (other.hasSessionTimeout()) {
mergeSessionTimeout(other.getSessionTimeout());
}
switch (other.getSessionTicketKeysTypeCase()) {
case SESSION_TICKET_KEYS: {
mergeSessionTicketKeys(other.getSessionTicketKeys());
break;
}
case SESSION_TICKET_KEYS_SDS_SECRET_CONFIG: {
mergeSessionTicketKeysSdsSecretConfig(other.getSessionTicketKeysSdsSecretConfig());
break;
}
case DISABLE_STATELESS_SESSION_RESUMPTION: {
setDisableStatelessSessionResumption(other.getDisableStatelessSessionResumption());
break;
}
case SESSIONTICKETKEYSTYPE_NOT_SET: {
break;
}
}
this.mergeUnknownFields(other.unknownFields);
onChanged();
return this;
}
@java.lang.Override
public final boolean isInitialized() {
return true;
}
@java.lang.Override
public Builder mergeFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext parsedMessage = null;
try {
parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry);
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
parsedMessage = (io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext) e.getUnfinishedMessage();
throw e.unwrapIOException();
} finally {
if (parsedMessage != null) {
mergeFrom(parsedMessage);
}
}
return this;
}
private int sessionTicketKeysTypeCase_ = 0;
private java.lang.Object sessionTicketKeysType_;
public SessionTicketKeysTypeCase
getSessionTicketKeysTypeCase() {
return SessionTicketKeysTypeCase.forNumber(
sessionTicketKeysTypeCase_);
}
public Builder clearSessionTicketKeysType() {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
onChanged();
return this;
}
private io.envoyproxy.envoy.api.v2.auth.CommonTlsContext commonTlsContext_;
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder> commonTlsContextBuilder_;
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
* @return Whether the commonTlsContext field is set.
*/
public boolean hasCommonTlsContext() {
return commonTlsContextBuilder_ != null || commonTlsContext_ != null;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
* @return The commonTlsContext.
*/
public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getCommonTlsContext() {
if (commonTlsContextBuilder_ == null) {
return commonTlsContext_ == null ? io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.getDefaultInstance() : commonTlsContext_;
} else {
return commonTlsContextBuilder_.getMessage();
}
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public Builder setCommonTlsContext(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext value) {
if (commonTlsContextBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
commonTlsContext_ = value;
onChanged();
} else {
commonTlsContextBuilder_.setMessage(value);
}
return this;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public Builder setCommonTlsContext(
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder builderForValue) {
if (commonTlsContextBuilder_ == null) {
commonTlsContext_ = builderForValue.build();
onChanged();
} else {
commonTlsContextBuilder_.setMessage(builderForValue.build());
}
return this;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public Builder mergeCommonTlsContext(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext value) {
if (commonTlsContextBuilder_ == null) {
if (commonTlsContext_ != null) {
commonTlsContext_ =
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.newBuilder(commonTlsContext_).mergeFrom(value).buildPartial();
} else {
commonTlsContext_ = value;
}
onChanged();
} else {
commonTlsContextBuilder_.mergeFrom(value);
}
return this;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public Builder clearCommonTlsContext() {
if (commonTlsContextBuilder_ == null) {
commonTlsContext_ = null;
onChanged();
} else {
commonTlsContext_ = null;
commonTlsContextBuilder_ = null;
}
return this;
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder getCommonTlsContextBuilder() {
onChanged();
return getCommonTlsContextFieldBuilder().getBuilder();
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
public io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder getCommonTlsContextOrBuilder() {
if (commonTlsContextBuilder_ != null) {
return commonTlsContextBuilder_.getMessageOrBuilder();
} else {
return commonTlsContext_ == null ?
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.getDefaultInstance() : commonTlsContext_;
}
}
/**
*
* Common TLS context settings.
*
*
* .envoy.api.v2.auth.CommonTlsContext common_tls_context = 1;
*/
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder>
getCommonTlsContextFieldBuilder() {
if (commonTlsContextBuilder_ == null) {
commonTlsContextBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.CommonTlsContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder>(
getCommonTlsContext(),
getParentForChildren(),
isClean());
commonTlsContext_ = null;
}
return commonTlsContextBuilder_;
}
private com.google.protobuf.BoolValue requireClientCertificate_;
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> requireClientCertificateBuilder_;
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
* @return Whether the requireClientCertificate field is set.
*/
public boolean hasRequireClientCertificate() {
return requireClientCertificateBuilder_ != null || requireClientCertificate_ != null;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
* @return The requireClientCertificate.
*/
public com.google.protobuf.BoolValue getRequireClientCertificate() {
if (requireClientCertificateBuilder_ == null) {
return requireClientCertificate_ == null ? com.google.protobuf.BoolValue.getDefaultInstance() : requireClientCertificate_;
} else {
return requireClientCertificateBuilder_.getMessage();
}
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public Builder setRequireClientCertificate(com.google.protobuf.BoolValue value) {
if (requireClientCertificateBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
requireClientCertificate_ = value;
onChanged();
} else {
requireClientCertificateBuilder_.setMessage(value);
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public Builder setRequireClientCertificate(
com.google.protobuf.BoolValue.Builder builderForValue) {
if (requireClientCertificateBuilder_ == null) {
requireClientCertificate_ = builderForValue.build();
onChanged();
} else {
requireClientCertificateBuilder_.setMessage(builderForValue.build());
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public Builder mergeRequireClientCertificate(com.google.protobuf.BoolValue value) {
if (requireClientCertificateBuilder_ == null) {
if (requireClientCertificate_ != null) {
requireClientCertificate_ =
com.google.protobuf.BoolValue.newBuilder(requireClientCertificate_).mergeFrom(value).buildPartial();
} else {
requireClientCertificate_ = value;
}
onChanged();
} else {
requireClientCertificateBuilder_.mergeFrom(value);
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public Builder clearRequireClientCertificate() {
if (requireClientCertificateBuilder_ == null) {
requireClientCertificate_ = null;
onChanged();
} else {
requireClientCertificate_ = null;
requireClientCertificateBuilder_ = null;
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public com.google.protobuf.BoolValue.Builder getRequireClientCertificateBuilder() {
onChanged();
return getRequireClientCertificateFieldBuilder().getBuilder();
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
public com.google.protobuf.BoolValueOrBuilder getRequireClientCertificateOrBuilder() {
if (requireClientCertificateBuilder_ != null) {
return requireClientCertificateBuilder_.getMessageOrBuilder();
} else {
return requireClientCertificate_ == null ?
com.google.protobuf.BoolValue.getDefaultInstance() : requireClientCertificate_;
}
}
/**
*
* If specified, Envoy will reject connections without a valid client
* certificate.
*
*
* .google.protobuf.BoolValue require_client_certificate = 2;
*/
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder>
getRequireClientCertificateFieldBuilder() {
if (requireClientCertificateBuilder_ == null) {
requireClientCertificateBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder>(
getRequireClientCertificate(),
getParentForChildren(),
isClean());
requireClientCertificate_ = null;
}
return requireClientCertificateBuilder_;
}
private com.google.protobuf.BoolValue requireSni_;
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder> requireSniBuilder_;
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
* @return Whether the requireSni field is set.
*/
public boolean hasRequireSni() {
return requireSniBuilder_ != null || requireSni_ != null;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
* @return The requireSni.
*/
public com.google.protobuf.BoolValue getRequireSni() {
if (requireSniBuilder_ == null) {
return requireSni_ == null ? com.google.protobuf.BoolValue.getDefaultInstance() : requireSni_;
} else {
return requireSniBuilder_.getMessage();
}
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public Builder setRequireSni(com.google.protobuf.BoolValue value) {
if (requireSniBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
requireSni_ = value;
onChanged();
} else {
requireSniBuilder_.setMessage(value);
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public Builder setRequireSni(
com.google.protobuf.BoolValue.Builder builderForValue) {
if (requireSniBuilder_ == null) {
requireSni_ = builderForValue.build();
onChanged();
} else {
requireSniBuilder_.setMessage(builderForValue.build());
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public Builder mergeRequireSni(com.google.protobuf.BoolValue value) {
if (requireSniBuilder_ == null) {
if (requireSni_ != null) {
requireSni_ =
com.google.protobuf.BoolValue.newBuilder(requireSni_).mergeFrom(value).buildPartial();
} else {
requireSni_ = value;
}
onChanged();
} else {
requireSniBuilder_.mergeFrom(value);
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public Builder clearRequireSni() {
if (requireSniBuilder_ == null) {
requireSni_ = null;
onChanged();
} else {
requireSni_ = null;
requireSniBuilder_ = null;
}
return this;
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public com.google.protobuf.BoolValue.Builder getRequireSniBuilder() {
onChanged();
return getRequireSniFieldBuilder().getBuilder();
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
public com.google.protobuf.BoolValueOrBuilder getRequireSniOrBuilder() {
if (requireSniBuilder_ != null) {
return requireSniBuilder_.getMessageOrBuilder();
} else {
return requireSni_ == null ?
com.google.protobuf.BoolValue.getDefaultInstance() : requireSni_;
}
}
/**
*
* If specified, Envoy will reject connections without a valid and matching SNI.
* [#not-implemented-hide:]
*
*
* .google.protobuf.BoolValue require_sni = 3;
*/
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder>
getRequireSniFieldBuilder() {
if (requireSniBuilder_ == null) {
requireSniBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.BoolValue, com.google.protobuf.BoolValue.Builder, com.google.protobuf.BoolValueOrBuilder>(
getRequireSni(),
getParentForChildren(),
isClean());
requireSni_ = null;
}
return requireSniBuilder_;
}
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder> sessionTicketKeysBuilder_;
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
* @return Whether the sessionTicketKeys field is set.
*/
@java.lang.Override
public boolean hasSessionTicketKeys() {
return sessionTicketKeysTypeCase_ == 4;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
* @return The sessionTicketKeys.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys getSessionTicketKeys() {
if (sessionTicketKeysBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 4) {
return (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
} else {
if (sessionTicketKeysTypeCase_ == 4) {
return sessionTicketKeysBuilder_.getMessage();
}
return io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
}
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
public Builder setSessionTicketKeys(io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys value) {
if (sessionTicketKeysBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
sessionTicketKeysType_ = value;
onChanged();
} else {
sessionTicketKeysBuilder_.setMessage(value);
}
sessionTicketKeysTypeCase_ = 4;
return this;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
public Builder setSessionTicketKeys(
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder builderForValue) {
if (sessionTicketKeysBuilder_ == null) {
sessionTicketKeysType_ = builderForValue.build();
onChanged();
} else {
sessionTicketKeysBuilder_.setMessage(builderForValue.build());
}
sessionTicketKeysTypeCase_ = 4;
return this;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
public Builder mergeSessionTicketKeys(io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys value) {
if (sessionTicketKeysBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 4 &&
sessionTicketKeysType_ != io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance()) {
sessionTicketKeysType_ = io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.newBuilder((io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_)
.mergeFrom(value).buildPartial();
} else {
sessionTicketKeysType_ = value;
}
onChanged();
} else {
if (sessionTicketKeysTypeCase_ == 4) {
sessionTicketKeysBuilder_.mergeFrom(value);
} else {
sessionTicketKeysBuilder_.setMessage(value);
}
}
sessionTicketKeysTypeCase_ = 4;
return this;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
public Builder clearSessionTicketKeys() {
if (sessionTicketKeysBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 4) {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
onChanged();
}
} else {
if (sessionTicketKeysTypeCase_ == 4) {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
}
sessionTicketKeysBuilder_.clear();
}
return this;
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
public io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder getSessionTicketKeysBuilder() {
return getSessionTicketKeysFieldBuilder().getBuilder();
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder getSessionTicketKeysOrBuilder() {
if ((sessionTicketKeysTypeCase_ == 4) && (sessionTicketKeysBuilder_ != null)) {
return sessionTicketKeysBuilder_.getMessageOrBuilder();
} else {
if (sessionTicketKeysTypeCase_ == 4) {
return (io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
}
}
/**
*
* TLS session ticket key settings.
*
*
* .envoy.api.v2.auth.TlsSessionTicketKeys session_ticket_keys = 4;
*/
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder>
getSessionTicketKeysFieldBuilder() {
if (sessionTicketKeysBuilder_ == null) {
if (!(sessionTicketKeysTypeCase_ == 4)) {
sessionTicketKeysType_ = io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.getDefaultInstance();
}
sessionTicketKeysBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys.Builder, io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeysOrBuilder>(
(io.envoyproxy.envoy.api.v2.auth.TlsSessionTicketKeys) sessionTicketKeysType_,
getParentForChildren(),
isClean());
sessionTicketKeysType_ = null;
}
sessionTicketKeysTypeCase_ = 4;
onChanged();;
return sessionTicketKeysBuilder_;
}
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> sessionTicketKeysSdsSecretConfigBuilder_;
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
* @return Whether the sessionTicketKeysSdsSecretConfig field is set.
*/
@java.lang.Override
public boolean hasSessionTicketKeysSdsSecretConfig() {
return sessionTicketKeysTypeCase_ == 5;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
* @return The sessionTicketKeysSdsSecretConfig.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getSessionTicketKeysSdsSecretConfig() {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 5) {
return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
} else {
if (sessionTicketKeysTypeCase_ == 5) {
return sessionTicketKeysSdsSecretConfigBuilder_.getMessage();
}
return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
}
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
public Builder setSessionTicketKeysSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
sessionTicketKeysType_ = value;
onChanged();
} else {
sessionTicketKeysSdsSecretConfigBuilder_.setMessage(value);
}
sessionTicketKeysTypeCase_ = 5;
return this;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
public Builder setSessionTicketKeysSdsSecretConfig(
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
sessionTicketKeysType_ = builderForValue.build();
onChanged();
} else {
sessionTicketKeysSdsSecretConfigBuilder_.setMessage(builderForValue.build());
}
sessionTicketKeysTypeCase_ = 5;
return this;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
public Builder mergeSessionTicketKeysSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 5 &&
sessionTicketKeysType_ != io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance()) {
sessionTicketKeysType_ = io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.newBuilder((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_)
.mergeFrom(value).buildPartial();
} else {
sessionTicketKeysType_ = value;
}
onChanged();
} else {
if (sessionTicketKeysTypeCase_ == 5) {
sessionTicketKeysSdsSecretConfigBuilder_.mergeFrom(value);
} else {
sessionTicketKeysSdsSecretConfigBuilder_.setMessage(value);
}
}
sessionTicketKeysTypeCase_ = 5;
return this;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
public Builder clearSessionTicketKeysSdsSecretConfig() {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
if (sessionTicketKeysTypeCase_ == 5) {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
onChanged();
}
} else {
if (sessionTicketKeysTypeCase_ == 5) {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
}
sessionTicketKeysSdsSecretConfigBuilder_.clear();
}
return this;
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder getSessionTicketKeysSdsSecretConfigBuilder() {
return getSessionTicketKeysSdsSecretConfigFieldBuilder().getBuilder();
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getSessionTicketKeysSdsSecretConfigOrBuilder() {
if ((sessionTicketKeysTypeCase_ == 5) && (sessionTicketKeysSdsSecretConfigBuilder_ != null)) {
return sessionTicketKeysSdsSecretConfigBuilder_.getMessageOrBuilder();
} else {
if (sessionTicketKeysTypeCase_ == 5) {
return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_;
}
return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
}
}
/**
*
* Config for fetching TLS session ticket keys via SDS API.
*
*
* .envoy.api.v2.auth.SdsSecretConfig session_ticket_keys_sds_secret_config = 5;
*/
private com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder>
getSessionTicketKeysSdsSecretConfigFieldBuilder() {
if (sessionTicketKeysSdsSecretConfigBuilder_ == null) {
if (!(sessionTicketKeysTypeCase_ == 5)) {
sessionTicketKeysType_ = io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance();
}
sessionTicketKeysSdsSecretConfigBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder>(
(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) sessionTicketKeysType_,
getParentForChildren(),
isClean());
sessionTicketKeysType_ = null;
}
sessionTicketKeysTypeCase_ = 5;
onChanged();;
return sessionTicketKeysSdsSecretConfigBuilder_;
}
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @return Whether the disableStatelessSessionResumption field is set.
*/
public boolean hasDisableStatelessSessionResumption() {
return sessionTicketKeysTypeCase_ == 7;
}
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @return The disableStatelessSessionResumption.
*/
public boolean getDisableStatelessSessionResumption() {
if (sessionTicketKeysTypeCase_ == 7) {
return (java.lang.Boolean) sessionTicketKeysType_;
}
return false;
}
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @param value The disableStatelessSessionResumption to set.
* @return This builder for chaining.
*/
public Builder setDisableStatelessSessionResumption(boolean value) {
sessionTicketKeysTypeCase_ = 7;
sessionTicketKeysType_ = value;
onChanged();
return this;
}
/**
*
* Config for controlling stateless TLS session resumption: setting this to true will cause the TLS
* server to not issue TLS session tickets for the purposes of stateless TLS session resumption.
* If set to false, the TLS server will issue TLS session tickets and encrypt/decrypt them using
* the keys specified through either :ref:`session_ticket_keys <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys>`
* or :ref:`session_ticket_keys_sds_secret_config <envoy_api_field_auth.DownstreamTlsContext.session_ticket_keys_sds_secret_config>`.
* If this config is set to false and no keys are explicitly configured, the TLS server will issue
* TLS session tickets and encrypt/decrypt them using an internally-generated and managed key, with the
* implication that sessions cannot be resumed across hot restarts or on different hosts.
*
*
* bool disable_stateless_session_resumption = 7;
* @return This builder for chaining.
*/
public Builder clearDisableStatelessSessionResumption() {
if (sessionTicketKeysTypeCase_ == 7) {
sessionTicketKeysTypeCase_ = 0;
sessionTicketKeysType_ = null;
onChanged();
}
return this;
}
private com.google.protobuf.Duration sessionTimeout_;
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.Duration, com.google.protobuf.Duration.Builder, com.google.protobuf.DurationOrBuilder> sessionTimeoutBuilder_;
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
* @return Whether the sessionTimeout field is set.
*/
public boolean hasSessionTimeout() {
return sessionTimeoutBuilder_ != null || sessionTimeout_ != null;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
* @return The sessionTimeout.
*/
public com.google.protobuf.Duration getSessionTimeout() {
if (sessionTimeoutBuilder_ == null) {
return sessionTimeout_ == null ? com.google.protobuf.Duration.getDefaultInstance() : sessionTimeout_;
} else {
return sessionTimeoutBuilder_.getMessage();
}
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public Builder setSessionTimeout(com.google.protobuf.Duration value) {
if (sessionTimeoutBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
sessionTimeout_ = value;
onChanged();
} else {
sessionTimeoutBuilder_.setMessage(value);
}
return this;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public Builder setSessionTimeout(
com.google.protobuf.Duration.Builder builderForValue) {
if (sessionTimeoutBuilder_ == null) {
sessionTimeout_ = builderForValue.build();
onChanged();
} else {
sessionTimeoutBuilder_.setMessage(builderForValue.build());
}
return this;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public Builder mergeSessionTimeout(com.google.protobuf.Duration value) {
if (sessionTimeoutBuilder_ == null) {
if (sessionTimeout_ != null) {
sessionTimeout_ =
com.google.protobuf.Duration.newBuilder(sessionTimeout_).mergeFrom(value).buildPartial();
} else {
sessionTimeout_ = value;
}
onChanged();
} else {
sessionTimeoutBuilder_.mergeFrom(value);
}
return this;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public Builder clearSessionTimeout() {
if (sessionTimeoutBuilder_ == null) {
sessionTimeout_ = null;
onChanged();
} else {
sessionTimeout_ = null;
sessionTimeoutBuilder_ = null;
}
return this;
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public com.google.protobuf.Duration.Builder getSessionTimeoutBuilder() {
onChanged();
return getSessionTimeoutFieldBuilder().getBuilder();
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
public com.google.protobuf.DurationOrBuilder getSessionTimeoutOrBuilder() {
if (sessionTimeoutBuilder_ != null) {
return sessionTimeoutBuilder_.getMessageOrBuilder();
} else {
return sessionTimeout_ == null ?
com.google.protobuf.Duration.getDefaultInstance() : sessionTimeout_;
}
}
/**
*
* If specified, ``session_timeout`` will change the maximum lifetime (in seconds) of the TLS session.
* Currently this value is used as a hint for the `TLS session ticket lifetime (for TLSv1.2) <https://tools.ietf.org/html/rfc5077#section-5.6>`_.
* Only seconds can be specified (fractional seconds are ignored).
*
*
* .google.protobuf.Duration session_timeout = 6 [(.validate.rules) = { ... }
*/
private com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.Duration, com.google.protobuf.Duration.Builder, com.google.protobuf.DurationOrBuilder>
getSessionTimeoutFieldBuilder() {
if (sessionTimeoutBuilder_ == null) {
sessionTimeoutBuilder_ = new com.google.protobuf.SingleFieldBuilderV3<
com.google.protobuf.Duration, com.google.protobuf.Duration.Builder, com.google.protobuf.DurationOrBuilder>(
getSessionTimeout(),
getParentForChildren(),
isClean());
sessionTimeout_ = null;
}
return sessionTimeoutBuilder_;
}
@java.lang.Override
public final Builder setUnknownFields(
final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
}
@java.lang.Override
public final Builder mergeUnknownFields(
final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.mergeUnknownFields(unknownFields);
}
// @@protoc_insertion_point(builder_scope:envoy.api.v2.auth.DownstreamTlsContext)
}
// @@protoc_insertion_point(class_scope:envoy.api.v2.auth.DownstreamTlsContext)
private static final io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext DEFAULT_INSTANCE;
static {
DEFAULT_INSTANCE = new io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext();
}
public static io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static final com.google.protobuf.Parser
PARSER = new com.google.protobuf.AbstractParser() {
@java.lang.Override
public DownstreamTlsContext parsePartialFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return new DownstreamTlsContext(input, extensionRegistry);
}
};
public static com.google.protobuf.Parser parser() {
return PARSER;
}
@java.lang.Override
public com.google.protobuf.Parser getParserForType() {
return PARSER;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.DownstreamTlsContext getDefaultInstanceForType() {
return DEFAULT_INSTANCE;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy