All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.envoyproxy.envoy.api.v2.auth.CommonTlsContext Maven / Gradle / Ivy

There is a newer version: 1.0.47
Show newest version
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: envoy/api/v2/auth/cert.proto

package io.envoyproxy.envoy.api.v2.auth;

/**
 * 
 * TLS context shared by both client and server TLS contexts.
 * 
* * Protobuf type {@code envoy.api.v2.auth.CommonTlsContext} */ public final class CommonTlsContext extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:envoy.api.v2.auth.CommonTlsContext) CommonTlsContextOrBuilder { private static final long serialVersionUID = 0L; // Use CommonTlsContext.newBuilder() to construct. private CommonTlsContext(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CommonTlsContext() { tlsCertificates_ = java.util.Collections.emptyList(); tlsCertificateSdsSecretConfigs_ = java.util.Collections.emptyList(); alpnProtocols_ = com.google.protobuf.LazyStringArrayList.EMPTY; } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CommonTlsContext( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; default: { if (!parseUnknownFieldProto3( input, unknownFields, extensionRegistry, tag)) { done = true; } break; } case 10: { io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder subBuilder = null; if (tlsParams_ != null) { subBuilder = tlsParams_.toBuilder(); } tlsParams_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.TlsParameters.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(tlsParams_); tlsParams_ = subBuilder.buildPartial(); } break; } case 18: { if (!((mutable_bitField0_ & 0x00000002) == 0x00000002)) { tlsCertificates_ = new java.util.ArrayList(); mutable_bitField0_ |= 0x00000002; } tlsCertificates_.add( input.readMessage(io.envoyproxy.envoy.api.v2.auth.TlsCertificate.parser(), extensionRegistry)); break; } case 26: { io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder subBuilder = null; if (validationContextTypeCase_ == 3) { subBuilder = ((io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_).toBuilder(); } validationContextType_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom((io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_); validationContextType_ = subBuilder.buildPartial(); } validationContextTypeCase_ = 3; break; } case 34: { java.lang.String s = input.readStringRequireUtf8(); if (!((mutable_bitField0_ & 0x00000040) == 0x00000040)) { alpnProtocols_ = new com.google.protobuf.LazyStringArrayList(); mutable_bitField0_ |= 0x00000040; } alpnProtocols_.add(s); break; } case 50: { if (!((mutable_bitField0_ & 0x00000004) == 0x00000004)) { tlsCertificateSdsSecretConfigs_ = new java.util.ArrayList(); mutable_bitField0_ |= 0x00000004; } tlsCertificateSdsSecretConfigs_.add( input.readMessage(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.parser(), extensionRegistry)); break; } case 58: { io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder subBuilder = null; if (validationContextTypeCase_ == 7) { subBuilder = ((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_).toBuilder(); } validationContextType_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_); validationContextType_ = subBuilder.buildPartial(); } validationContextTypeCase_ = 7; break; } case 66: { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder subBuilder = null; if (validationContextTypeCase_ == 8) { subBuilder = ((io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_).toBuilder(); } validationContextType_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom((io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_); validationContextType_ = subBuilder.buildPartial(); } validationContextTypeCase_ = 8; break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException( e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000002) == 0x00000002)) { tlsCertificates_ = java.util.Collections.unmodifiableList(tlsCertificates_); } if (((mutable_bitField0_ & 0x00000040) == 0x00000040)) { alpnProtocols_ = alpnProtocols_.getUnmodifiableView(); } if (((mutable_bitField0_ & 0x00000004) == 0x00000004)) { tlsCertificateSdsSecretConfigs_ = java.util.Collections.unmodifiableList(tlsCertificateSdsSecretConfigs_); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_descriptor; } protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_fieldAccessorTable .ensureFieldAccessorsInitialized( io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.class, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder.class); } public interface CombinedCertificateValidationContextOrBuilder extends // @@protoc_insertion_point(interface_extends:envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) com.google.protobuf.MessageOrBuilder { /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ boolean hasDefaultValidationContext(); /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext getDefaultValidationContext(); /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder getDefaultValidationContextOrBuilder(); /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ boolean hasValidationContextSdsSecretConfig(); /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getValidationContextSdsSecretConfig(); /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder(); } /** * Protobuf type {@code envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext} */ public static final class CombinedCertificateValidationContext extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) CombinedCertificateValidationContextOrBuilder { private static final long serialVersionUID = 0L; // Use CombinedCertificateValidationContext.newBuilder() to construct. private CombinedCertificateValidationContext(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CombinedCertificateValidationContext() { } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CombinedCertificateValidationContext( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; default: { if (!parseUnknownFieldProto3( input, unknownFields, extensionRegistry, tag)) { done = true; } break; } case 10: { io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder subBuilder = null; if (defaultValidationContext_ != null) { subBuilder = defaultValidationContext_.toBuilder(); } defaultValidationContext_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(defaultValidationContext_); defaultValidationContext_ = subBuilder.buildPartial(); } break; } case 18: { io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder subBuilder = null; if (validationContextSdsSecretConfig_ != null) { subBuilder = validationContextSdsSecretConfig_.toBuilder(); } validationContextSdsSecretConfig_ = input.readMessage(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.parser(), extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(validationContextSdsSecretConfig_); validationContextSdsSecretConfig_ = subBuilder.buildPartial(); } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException( e).setUnfinishedMessage(this); } finally { this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_CombinedCertificateValidationContext_descriptor; } protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_CombinedCertificateValidationContext_fieldAccessorTable .ensureFieldAccessorsInitialized( io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.class, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder.class); } public static final int DEFAULT_VALIDATION_CONTEXT_FIELD_NUMBER = 1; private io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext defaultValidationContext_; /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public boolean hasDefaultValidationContext() { return defaultValidationContext_ != null; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext getDefaultValidationContext() { return defaultValidationContext_ == null ? io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance() : defaultValidationContext_; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder getDefaultValidationContextOrBuilder() { return getDefaultValidationContext(); } public static final int VALIDATION_CONTEXT_SDS_SECRET_CONFIG_FIELD_NUMBER = 2; private io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig validationContextSdsSecretConfig_; /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public boolean hasValidationContextSdsSecretConfig() { return validationContextSdsSecretConfig_ != null; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getValidationContextSdsSecretConfig() { return validationContextSdsSecretConfig_ == null ? io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance() : validationContextSdsSecretConfig_; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder() { return getValidationContextSdsSecretConfig(); } private byte memoizedIsInitialized = -1; public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (defaultValidationContext_ != null) { output.writeMessage(1, getDefaultValidationContext()); } if (validationContextSdsSecretConfig_ != null) { output.writeMessage(2, getValidationContextSdsSecretConfig()); } unknownFields.writeTo(output); } public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (defaultValidationContext_ != null) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(1, getDefaultValidationContext()); } if (validationContextSdsSecretConfig_ != null) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(2, getValidationContextSdsSecretConfig()); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext)) { return super.equals(obj); } io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext other = (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) obj; boolean result = true; result = result && (hasDefaultValidationContext() == other.hasDefaultValidationContext()); if (hasDefaultValidationContext()) { result = result && getDefaultValidationContext() .equals(other.getDefaultValidationContext()); } result = result && (hasValidationContextSdsSecretConfig() == other.hasValidationContextSdsSecretConfig()); if (hasValidationContextSdsSecretConfig()) { result = result && getValidationContextSdsSecretConfig() .equals(other.getValidationContextSdsSecretConfig()); } result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasDefaultValidationContext()) { hash = (37 * hash) + DEFAULT_VALIDATION_CONTEXT_FIELD_NUMBER; hash = (53 * hash) + getDefaultValidationContext().hashCode(); } if (hasValidationContextSdsSecretConfig()) { hash = (37 * hash) + VALIDATION_CONTEXT_SDS_SECRET_CONFIG_FIELD_NUMBER; hash = (53 * hash) + getValidationContextSdsSecretConfig().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseDelimitedWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseDelimitedWithIOException(PARSER, input, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input, extensionRegistry); } public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * Protobuf type {@code envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_CombinedCertificateValidationContext_descriptor; } protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_CombinedCertificateValidationContext_fieldAccessorTable .ensureFieldAccessorsInitialized( io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.class, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder.class); } // Construct using io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3 .alwaysUseFieldBuilders) { } } public Builder clear() { super.clear(); if (defaultValidationContextBuilder_ == null) { defaultValidationContext_ = null; } else { defaultValidationContext_ = null; defaultValidationContextBuilder_ = null; } if (validationContextSdsSecretConfigBuilder_ == null) { validationContextSdsSecretConfig_ = null; } else { validationContextSdsSecretConfig_ = null; validationContextSdsSecretConfigBuilder_ = null; } return this; } public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_CombinedCertificateValidationContext_descriptor; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext getDefaultInstanceForType() { return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext build() { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext buildPartial() { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext result = new io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext(this); if (defaultValidationContextBuilder_ == null) { result.defaultValidationContext_ = defaultValidationContext_; } else { result.defaultValidationContext_ = defaultValidationContextBuilder_.build(); } if (validationContextSdsSecretConfigBuilder_ == null) { result.validationContextSdsSecretConfig_ = validationContextSdsSecretConfig_; } else { result.validationContextSdsSecretConfig_ = validationContextSdsSecretConfigBuilder_.build(); } onBuilt(); return result; } public Builder clone() { return (Builder) super.clone(); } public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } public Builder clearField( com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } public Builder clearOneof( com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) { return mergeFrom((io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext)other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext other) { if (other == io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance()) return this; if (other.hasDefaultValidationContext()) { mergeDefaultValidationContext(other.getDefaultValidationContext()); } if (other.hasValidationContextSdsSecretConfig()) { mergeValidationContextSdsSecretConfig(other.getValidationContextSdsSecretConfig()); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } public final boolean isInitialized() { return true; } public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext defaultValidationContext_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder> defaultValidationContextBuilder_; /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public boolean hasDefaultValidationContext() { return defaultValidationContextBuilder_ != null || defaultValidationContext_ != null; } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext getDefaultValidationContext() { if (defaultValidationContextBuilder_ == null) { return defaultValidationContext_ == null ? io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance() : defaultValidationContext_; } else { return defaultValidationContextBuilder_.getMessage(); } } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public Builder setDefaultValidationContext(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext value) { if (defaultValidationContextBuilder_ == null) { if (value == null) { throw new NullPointerException(); } defaultValidationContext_ = value; onChanged(); } else { defaultValidationContextBuilder_.setMessage(value); } return this; } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public Builder setDefaultValidationContext( io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder builderForValue) { if (defaultValidationContextBuilder_ == null) { defaultValidationContext_ = builderForValue.build(); onChanged(); } else { defaultValidationContextBuilder_.setMessage(builderForValue.build()); } return this; } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public Builder mergeDefaultValidationContext(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext value) { if (defaultValidationContextBuilder_ == null) { if (defaultValidationContext_ != null) { defaultValidationContext_ = io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.newBuilder(defaultValidationContext_).mergeFrom(value).buildPartial(); } else { defaultValidationContext_ = value; } onChanged(); } else { defaultValidationContextBuilder_.mergeFrom(value); } return this; } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public Builder clearDefaultValidationContext() { if (defaultValidationContextBuilder_ == null) { defaultValidationContext_ = null; onChanged(); } else { defaultValidationContext_ = null; defaultValidationContextBuilder_ = null; } return this; } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder getDefaultValidationContextBuilder() { onChanged(); return getDefaultValidationContextFieldBuilder().getBuilder(); } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder getDefaultValidationContextOrBuilder() { if (defaultValidationContextBuilder_ != null) { return defaultValidationContextBuilder_.getMessageOrBuilder(); } else { return defaultValidationContext_ == null ? io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance() : defaultValidationContext_; } } /** *
       * How to validate peer certificates.
       * 
* * .envoy.api.v2.auth.CertificateValidationContext default_validation_context = 1 [(.validate.rules) = { ... } */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder> getDefaultValidationContextFieldBuilder() { if (defaultValidationContextBuilder_ == null) { defaultValidationContextBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder>( getDefaultValidationContext(), getParentForChildren(), isClean()); defaultValidationContext_ = null; } return defaultValidationContextBuilder_; } private io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig validationContextSdsSecretConfig_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> validationContextSdsSecretConfigBuilder_; /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public boolean hasValidationContextSdsSecretConfig() { return validationContextSdsSecretConfigBuilder_ != null || validationContextSdsSecretConfig_ != null; } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getValidationContextSdsSecretConfig() { if (validationContextSdsSecretConfigBuilder_ == null) { return validationContextSdsSecretConfig_ == null ? io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance() : validationContextSdsSecretConfig_; } else { return validationContextSdsSecretConfigBuilder_.getMessage(); } } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public Builder setValidationContextSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (validationContextSdsSecretConfigBuilder_ == null) { if (value == null) { throw new NullPointerException(); } validationContextSdsSecretConfig_ = value; onChanged(); } else { validationContextSdsSecretConfigBuilder_.setMessage(value); } return this; } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public Builder setValidationContextSdsSecretConfig( io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) { if (validationContextSdsSecretConfigBuilder_ == null) { validationContextSdsSecretConfig_ = builderForValue.build(); onChanged(); } else { validationContextSdsSecretConfigBuilder_.setMessage(builderForValue.build()); } return this; } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public Builder mergeValidationContextSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (validationContextSdsSecretConfigBuilder_ == null) { if (validationContextSdsSecretConfig_ != null) { validationContextSdsSecretConfig_ = io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.newBuilder(validationContextSdsSecretConfig_).mergeFrom(value).buildPartial(); } else { validationContextSdsSecretConfig_ = value; } onChanged(); } else { validationContextSdsSecretConfigBuilder_.mergeFrom(value); } return this; } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public Builder clearValidationContextSdsSecretConfig() { if (validationContextSdsSecretConfigBuilder_ == null) { validationContextSdsSecretConfig_ = null; onChanged(); } else { validationContextSdsSecretConfig_ = null; validationContextSdsSecretConfigBuilder_ = null; } return this; } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder getValidationContextSdsSecretConfigBuilder() { onChanged(); return getValidationContextSdsSecretConfigFieldBuilder().getBuilder(); } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder() { if (validationContextSdsSecretConfigBuilder_ != null) { return validationContextSdsSecretConfigBuilder_.getMessageOrBuilder(); } else { return validationContextSdsSecretConfig_ == null ? io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance() : validationContextSdsSecretConfig_; } } /** *
       * Config for fetching validation context via SDS API.
       * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 2 [(.validate.rules) = { ... } */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> getValidationContextSdsSecretConfigFieldBuilder() { if (validationContextSdsSecretConfigBuilder_ == null) { validationContextSdsSecretConfigBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder>( getValidationContextSdsSecretConfig(), getParentForChildren(), isClean()); validationContextSdsSecretConfig_ = null; } return validationContextSdsSecretConfigBuilder_; } public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFieldsProto3(unknownFields); } public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) } // @@protoc_insertion_point(class_scope:envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) private static final io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext(); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext getDefaultInstance() { return DEFAULT_INSTANCE; } private static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { public CombinedCertificateValidationContext parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CombinedCertificateValidationContext(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } private int bitField0_; private int validationContextTypeCase_ = 0; private java.lang.Object validationContextType_; public enum ValidationContextTypeCase implements com.google.protobuf.Internal.EnumLite { VALIDATION_CONTEXT(3), VALIDATION_CONTEXT_SDS_SECRET_CONFIG(7), COMBINED_VALIDATION_CONTEXT(8), VALIDATIONCONTEXTTYPE_NOT_SET(0); private final int value; private ValidationContextTypeCase(int value) { this.value = value; } /** * @deprecated Use {@link #forNumber(int)} instead. */ @java.lang.Deprecated public static ValidationContextTypeCase valueOf(int value) { return forNumber(value); } public static ValidationContextTypeCase forNumber(int value) { switch (value) { case 3: return VALIDATION_CONTEXT; case 7: return VALIDATION_CONTEXT_SDS_SECRET_CONFIG; case 8: return COMBINED_VALIDATION_CONTEXT; case 0: return VALIDATIONCONTEXTTYPE_NOT_SET; default: return null; } } public int getNumber() { return this.value; } }; public ValidationContextTypeCase getValidationContextTypeCase() { return ValidationContextTypeCase.forNumber( validationContextTypeCase_); } public static final int TLS_PARAMS_FIELD_NUMBER = 1; private io.envoyproxy.envoy.api.v2.auth.TlsParameters tlsParams_; /** *
   * TLS protocol versions, cipher suites etc.
   * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public boolean hasTlsParams() { return tlsParams_ != null; } /** *
   * TLS protocol versions, cipher suites etc.
   * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public io.envoyproxy.envoy.api.v2.auth.TlsParameters getTlsParams() { return tlsParams_ == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDefaultInstance() : tlsParams_; } /** *
   * TLS protocol versions, cipher suites etc.
   * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder getTlsParamsOrBuilder() { return getTlsParams(); } public static final int TLS_CERTIFICATES_FIELD_NUMBER = 2; private java.util.List tlsCertificates_; /** *
   * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
   * same context to allow both RSA and ECDSA certificates.
   * Only a single TLS certificate is supported in client contexts. In server contexts, the first
   * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
   * used for clients that support ECDSA.
   * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public java.util.List getTlsCertificatesList() { return tlsCertificates_; } /** *
   * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
   * same context to allow both RSA and ECDSA certificates.
   * Only a single TLS certificate is supported in client contexts. In server contexts, the first
   * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
   * used for clients that support ECDSA.
   * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public java.util.List getTlsCertificatesOrBuilderList() { return tlsCertificates_; } /** *
   * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
   * same context to allow both RSA and ECDSA certificates.
   * Only a single TLS certificate is supported in client contexts. In server contexts, the first
   * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
   * used for clients that support ECDSA.
   * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public int getTlsCertificatesCount() { return tlsCertificates_.size(); } /** *
   * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
   * same context to allow both RSA and ECDSA certificates.
   * Only a single TLS certificate is supported in client contexts. In server contexts, the first
   * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
   * used for clients that support ECDSA.
   * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificate getTlsCertificates(int index) { return tlsCertificates_.get(index); } /** *
   * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
   * same context to allow both RSA and ECDSA certificates.
   * Only a single TLS certificate is supported in client contexts. In server contexts, the first
   * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
   * used for clients that support ECDSA.
   * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificateOrBuilder getTlsCertificatesOrBuilder( int index) { return tlsCertificates_.get(index); } public static final int TLS_CERTIFICATE_SDS_SECRET_CONFIGS_FIELD_NUMBER = 6; private java.util.List tlsCertificateSdsSecretConfigs_; /** *
   * Configs for fetching TLS certificates via SDS API.
   * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public java.util.List getTlsCertificateSdsSecretConfigsList() { return tlsCertificateSdsSecretConfigs_; } /** *
   * Configs for fetching TLS certificates via SDS API.
   * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public java.util.List getTlsCertificateSdsSecretConfigsOrBuilderList() { return tlsCertificateSdsSecretConfigs_; } /** *
   * Configs for fetching TLS certificates via SDS API.
   * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public int getTlsCertificateSdsSecretConfigsCount() { return tlsCertificateSdsSecretConfigs_.size(); } /** *
   * Configs for fetching TLS certificates via SDS API.
   * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getTlsCertificateSdsSecretConfigs(int index) { return tlsCertificateSdsSecretConfigs_.get(index); } /** *
   * Configs for fetching TLS certificates via SDS API.
   * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getTlsCertificateSdsSecretConfigsOrBuilder( int index) { return tlsCertificateSdsSecretConfigs_.get(index); } public static final int VALIDATION_CONTEXT_FIELD_NUMBER = 3; /** *
   * How to validate peer certificates.
   * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public boolean hasValidationContext() { return validationContextTypeCase_ == 3; } /** *
   * How to validate peer certificates.
   * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext getValidationContext() { if (validationContextTypeCase_ == 3) { return (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } /** *
   * How to validate peer certificates.
   * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder getValidationContextOrBuilder() { if (validationContextTypeCase_ == 3) { return (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } public static final int VALIDATION_CONTEXT_SDS_SECRET_CONFIG_FIELD_NUMBER = 7; /** *
   * Config for fetching validation context via SDS API.
   * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public boolean hasValidationContextSdsSecretConfig() { return validationContextTypeCase_ == 7; } /** *
   * Config for fetching validation context via SDS API.
   * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getValidationContextSdsSecretConfig() { if (validationContextTypeCase_ == 7) { return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } /** *
   * Config for fetching validation context via SDS API.
   * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder() { if (validationContextTypeCase_ == 7) { return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } public static final int COMBINED_VALIDATION_CONTEXT_FIELD_NUMBER = 8; /** *
   * Combined certificate validation context holds a default CertificateValidationContext
   * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
   * and default CertificateValidationContext are merged into a new CertificateValidationContext
   * for validation. This merge is done by Message::MergeFrom(), so dynamic
   * CertificateValidationContext overwrites singular fields in default
   * CertificateValidationContext, and concatenates repeated fields to default
   * CertificateValidationContext, and logical OR is applied to boolean fields.
   * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public boolean hasCombinedValidationContext() { return validationContextTypeCase_ == 8; } /** *
   * Combined certificate validation context holds a default CertificateValidationContext
   * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
   * and default CertificateValidationContext are merged into a new CertificateValidationContext
   * for validation. This merge is done by Message::MergeFrom(), so dynamic
   * CertificateValidationContext overwrites singular fields in default
   * CertificateValidationContext, and concatenates repeated fields to default
   * CertificateValidationContext, and logical OR is applied to boolean fields.
   * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext getCombinedValidationContext() { if (validationContextTypeCase_ == 8) { return (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } /** *
   * Combined certificate validation context holds a default CertificateValidationContext
   * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
   * and default CertificateValidationContext are merged into a new CertificateValidationContext
   * for validation. This merge is done by Message::MergeFrom(), so dynamic
   * CertificateValidationContext overwrites singular fields in default
   * CertificateValidationContext, and concatenates repeated fields to default
   * CertificateValidationContext, and logical OR is applied to boolean fields.
   * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder getCombinedValidationContextOrBuilder() { if (validationContextTypeCase_ == 8) { return (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } public static final int ALPN_PROTOCOLS_FIELD_NUMBER = 4; private com.google.protobuf.LazyStringList alpnProtocols_; /** *
   * Supplies the list of ALPN protocols that the listener should expose. In
   * practice this is likely to be set to one of two values (see the
   * :ref:`codec_type
   * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
   * parameter in the HTTP connection manager for more information):
   * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
   * * "http/1.1" If the listener is only going to support HTTP/1.1.
   * There is no default for this parameter. If empty, Envoy will not expose ALPN.
   * 
* * repeated string alpn_protocols = 4; */ public com.google.protobuf.ProtocolStringList getAlpnProtocolsList() { return alpnProtocols_; } /** *
   * Supplies the list of ALPN protocols that the listener should expose. In
   * practice this is likely to be set to one of two values (see the
   * :ref:`codec_type
   * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
   * parameter in the HTTP connection manager for more information):
   * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
   * * "http/1.1" If the listener is only going to support HTTP/1.1.
   * There is no default for this parameter. If empty, Envoy will not expose ALPN.
   * 
* * repeated string alpn_protocols = 4; */ public int getAlpnProtocolsCount() { return alpnProtocols_.size(); } /** *
   * Supplies the list of ALPN protocols that the listener should expose. In
   * practice this is likely to be set to one of two values (see the
   * :ref:`codec_type
   * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
   * parameter in the HTTP connection manager for more information):
   * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
   * * "http/1.1" If the listener is only going to support HTTP/1.1.
   * There is no default for this parameter. If empty, Envoy will not expose ALPN.
   * 
* * repeated string alpn_protocols = 4; */ public java.lang.String getAlpnProtocols(int index) { return alpnProtocols_.get(index); } /** *
   * Supplies the list of ALPN protocols that the listener should expose. In
   * practice this is likely to be set to one of two values (see the
   * :ref:`codec_type
   * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
   * parameter in the HTTP connection manager for more information):
   * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
   * * "http/1.1" If the listener is only going to support HTTP/1.1.
   * There is no default for this parameter. If empty, Envoy will not expose ALPN.
   * 
* * repeated string alpn_protocols = 4; */ public com.google.protobuf.ByteString getAlpnProtocolsBytes(int index) { return alpnProtocols_.getByteString(index); } private byte memoizedIsInitialized = -1; public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (tlsParams_ != null) { output.writeMessage(1, getTlsParams()); } for (int i = 0; i < tlsCertificates_.size(); i++) { output.writeMessage(2, tlsCertificates_.get(i)); } if (validationContextTypeCase_ == 3) { output.writeMessage(3, (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_); } for (int i = 0; i < alpnProtocols_.size(); i++) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, alpnProtocols_.getRaw(i)); } for (int i = 0; i < tlsCertificateSdsSecretConfigs_.size(); i++) { output.writeMessage(6, tlsCertificateSdsSecretConfigs_.get(i)); } if (validationContextTypeCase_ == 7) { output.writeMessage(7, (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_); } if (validationContextTypeCase_ == 8) { output.writeMessage(8, (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_); } unknownFields.writeTo(output); } public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (tlsParams_ != null) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(1, getTlsParams()); } for (int i = 0; i < tlsCertificates_.size(); i++) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(2, tlsCertificates_.get(i)); } if (validationContextTypeCase_ == 3) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(3, (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_); } { int dataSize = 0; for (int i = 0; i < alpnProtocols_.size(); i++) { dataSize += computeStringSizeNoTag(alpnProtocols_.getRaw(i)); } size += dataSize; size += 1 * getAlpnProtocolsList().size(); } for (int i = 0; i < tlsCertificateSdsSecretConfigs_.size(); i++) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(6, tlsCertificateSdsSecretConfigs_.get(i)); } if (validationContextTypeCase_ == 7) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(7, (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_); } if (validationContextTypeCase_ == 8) { size += com.google.protobuf.CodedOutputStream .computeMessageSize(8, (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.envoyproxy.envoy.api.v2.auth.CommonTlsContext)) { return super.equals(obj); } io.envoyproxy.envoy.api.v2.auth.CommonTlsContext other = (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext) obj; boolean result = true; result = result && (hasTlsParams() == other.hasTlsParams()); if (hasTlsParams()) { result = result && getTlsParams() .equals(other.getTlsParams()); } result = result && getTlsCertificatesList() .equals(other.getTlsCertificatesList()); result = result && getTlsCertificateSdsSecretConfigsList() .equals(other.getTlsCertificateSdsSecretConfigsList()); result = result && getAlpnProtocolsList() .equals(other.getAlpnProtocolsList()); result = result && getValidationContextTypeCase().equals( other.getValidationContextTypeCase()); if (!result) return false; switch (validationContextTypeCase_) { case 3: result = result && getValidationContext() .equals(other.getValidationContext()); break; case 7: result = result && getValidationContextSdsSecretConfig() .equals(other.getValidationContextSdsSecretConfig()); break; case 8: result = result && getCombinedValidationContext() .equals(other.getCombinedValidationContext()); break; case 0: default: } result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasTlsParams()) { hash = (37 * hash) + TLS_PARAMS_FIELD_NUMBER; hash = (53 * hash) + getTlsParams().hashCode(); } if (getTlsCertificatesCount() > 0) { hash = (37 * hash) + TLS_CERTIFICATES_FIELD_NUMBER; hash = (53 * hash) + getTlsCertificatesList().hashCode(); } if (getTlsCertificateSdsSecretConfigsCount() > 0) { hash = (37 * hash) + TLS_CERTIFICATE_SDS_SECRET_CONFIGS_FIELD_NUMBER; hash = (53 * hash) + getTlsCertificateSdsSecretConfigsList().hashCode(); } if (getAlpnProtocolsCount() > 0) { hash = (37 * hash) + ALPN_PROTOCOLS_FIELD_NUMBER; hash = (53 * hash) + getAlpnProtocolsList().hashCode(); } switch (validationContextTypeCase_) { case 3: hash = (37 * hash) + VALIDATION_CONTEXT_FIELD_NUMBER; hash = (53 * hash) + getValidationContext().hashCode(); break; case 7: hash = (37 * hash) + VALIDATION_CONTEXT_SDS_SECRET_CONFIG_FIELD_NUMBER; hash = (53 * hash) + getValidationContextSdsSecretConfig().hashCode(); break; case 8: hash = (37 * hash) + COMBINED_VALIDATION_CONTEXT_FIELD_NUMBER; hash = (53 * hash) + getCombinedValidationContext().hashCode(); break; case 0: default: } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseDelimitedWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseDelimitedWithIOException(PARSER, input, extensionRegistry); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3 .parseWithIOException(PARSER, input, extensionRegistry); } public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** *
   * TLS context shared by both client and server TLS contexts.
   * 
* * Protobuf type {@code envoy.api.v2.auth.CommonTlsContext} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:envoy.api.v2.auth.CommonTlsContext) io.envoyproxy.envoy.api.v2.auth.CommonTlsContextOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_descriptor; } protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_fieldAccessorTable .ensureFieldAccessorsInitialized( io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.class, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.Builder.class); } // Construct using io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3 .alwaysUseFieldBuilders) { getTlsCertificatesFieldBuilder(); getTlsCertificateSdsSecretConfigsFieldBuilder(); } } public Builder clear() { super.clear(); if (tlsParamsBuilder_ == null) { tlsParams_ = null; } else { tlsParams_ = null; tlsParamsBuilder_ = null; } if (tlsCertificatesBuilder_ == null) { tlsCertificates_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000002); } else { tlsCertificatesBuilder_.clear(); } if (tlsCertificateSdsSecretConfigsBuilder_ == null) { tlsCertificateSdsSecretConfigs_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000004); } else { tlsCertificateSdsSecretConfigsBuilder_.clear(); } alpnProtocols_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000040); validationContextTypeCase_ = 0; validationContextType_ = null; return this; } public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.envoyproxy.envoy.api.v2.auth.CertProto.internal_static_envoy_api_v2_auth_CommonTlsContext_descriptor; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getDefaultInstanceForType() { return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.getDefaultInstance(); } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext build() { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext buildPartial() { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext result = new io.envoyproxy.envoy.api.v2.auth.CommonTlsContext(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (tlsParamsBuilder_ == null) { result.tlsParams_ = tlsParams_; } else { result.tlsParams_ = tlsParamsBuilder_.build(); } if (tlsCertificatesBuilder_ == null) { if (((bitField0_ & 0x00000002) == 0x00000002)) { tlsCertificates_ = java.util.Collections.unmodifiableList(tlsCertificates_); bitField0_ = (bitField0_ & ~0x00000002); } result.tlsCertificates_ = tlsCertificates_; } else { result.tlsCertificates_ = tlsCertificatesBuilder_.build(); } if (tlsCertificateSdsSecretConfigsBuilder_ == null) { if (((bitField0_ & 0x00000004) == 0x00000004)) { tlsCertificateSdsSecretConfigs_ = java.util.Collections.unmodifiableList(tlsCertificateSdsSecretConfigs_); bitField0_ = (bitField0_ & ~0x00000004); } result.tlsCertificateSdsSecretConfigs_ = tlsCertificateSdsSecretConfigs_; } else { result.tlsCertificateSdsSecretConfigs_ = tlsCertificateSdsSecretConfigsBuilder_.build(); } if (validationContextTypeCase_ == 3) { if (validationContextBuilder_ == null) { result.validationContextType_ = validationContextType_; } else { result.validationContextType_ = validationContextBuilder_.build(); } } if (validationContextTypeCase_ == 7) { if (validationContextSdsSecretConfigBuilder_ == null) { result.validationContextType_ = validationContextType_; } else { result.validationContextType_ = validationContextSdsSecretConfigBuilder_.build(); } } if (validationContextTypeCase_ == 8) { if (combinedValidationContextBuilder_ == null) { result.validationContextType_ = validationContextType_; } else { result.validationContextType_ = combinedValidationContextBuilder_.build(); } } if (((bitField0_ & 0x00000040) == 0x00000040)) { alpnProtocols_ = alpnProtocols_.getUnmodifiableView(); bitField0_ = (bitField0_ & ~0x00000040); } result.alpnProtocols_ = alpnProtocols_; result.bitField0_ = to_bitField0_; result.validationContextTypeCase_ = validationContextTypeCase_; onBuilt(); return result; } public Builder clone() { return (Builder) super.clone(); } public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } public Builder clearField( com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } public Builder clearOneof( com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.envoyproxy.envoy.api.v2.auth.CommonTlsContext) { return mergeFrom((io.envoyproxy.envoy.api.v2.auth.CommonTlsContext)other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext other) { if (other == io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.getDefaultInstance()) return this; if (other.hasTlsParams()) { mergeTlsParams(other.getTlsParams()); } if (tlsCertificatesBuilder_ == null) { if (!other.tlsCertificates_.isEmpty()) { if (tlsCertificates_.isEmpty()) { tlsCertificates_ = other.tlsCertificates_; bitField0_ = (bitField0_ & ~0x00000002); } else { ensureTlsCertificatesIsMutable(); tlsCertificates_.addAll(other.tlsCertificates_); } onChanged(); } } else { if (!other.tlsCertificates_.isEmpty()) { if (tlsCertificatesBuilder_.isEmpty()) { tlsCertificatesBuilder_.dispose(); tlsCertificatesBuilder_ = null; tlsCertificates_ = other.tlsCertificates_; bitField0_ = (bitField0_ & ~0x00000002); tlsCertificatesBuilder_ = com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders ? getTlsCertificatesFieldBuilder() : null; } else { tlsCertificatesBuilder_.addAllMessages(other.tlsCertificates_); } } } if (tlsCertificateSdsSecretConfigsBuilder_ == null) { if (!other.tlsCertificateSdsSecretConfigs_.isEmpty()) { if (tlsCertificateSdsSecretConfigs_.isEmpty()) { tlsCertificateSdsSecretConfigs_ = other.tlsCertificateSdsSecretConfigs_; bitField0_ = (bitField0_ & ~0x00000004); } else { ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.addAll(other.tlsCertificateSdsSecretConfigs_); } onChanged(); } } else { if (!other.tlsCertificateSdsSecretConfigs_.isEmpty()) { if (tlsCertificateSdsSecretConfigsBuilder_.isEmpty()) { tlsCertificateSdsSecretConfigsBuilder_.dispose(); tlsCertificateSdsSecretConfigsBuilder_ = null; tlsCertificateSdsSecretConfigs_ = other.tlsCertificateSdsSecretConfigs_; bitField0_ = (bitField0_ & ~0x00000004); tlsCertificateSdsSecretConfigsBuilder_ = com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders ? getTlsCertificateSdsSecretConfigsFieldBuilder() : null; } else { tlsCertificateSdsSecretConfigsBuilder_.addAllMessages(other.tlsCertificateSdsSecretConfigs_); } } } if (!other.alpnProtocols_.isEmpty()) { if (alpnProtocols_.isEmpty()) { alpnProtocols_ = other.alpnProtocols_; bitField0_ = (bitField0_ & ~0x00000040); } else { ensureAlpnProtocolsIsMutable(); alpnProtocols_.addAll(other.alpnProtocols_); } onChanged(); } switch (other.getValidationContextTypeCase()) { case VALIDATION_CONTEXT: { mergeValidationContext(other.getValidationContext()); break; } case VALIDATION_CONTEXT_SDS_SECRET_CONFIG: { mergeValidationContextSdsSecretConfig(other.getValidationContextSdsSecretConfig()); break; } case COMBINED_VALIDATION_CONTEXT: { mergeCombinedValidationContext(other.getCombinedValidationContext()); break; } case VALIDATIONCONTEXTTYPE_NOT_SET: { break; } } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } public final boolean isInitialized() { return true; } public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.envoyproxy.envoy.api.v2.auth.CommonTlsContext parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int validationContextTypeCase_ = 0; private java.lang.Object validationContextType_; public ValidationContextTypeCase getValidationContextTypeCase() { return ValidationContextTypeCase.forNumber( validationContextTypeCase_); } public Builder clearValidationContextType() { validationContextTypeCase_ = 0; validationContextType_ = null; onChanged(); return this; } private int bitField0_; private io.envoyproxy.envoy.api.v2.auth.TlsParameters tlsParams_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsParameters, io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder, io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder> tlsParamsBuilder_; /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public boolean hasTlsParams() { return tlsParamsBuilder_ != null || tlsParams_ != null; } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public io.envoyproxy.envoy.api.v2.auth.TlsParameters getTlsParams() { if (tlsParamsBuilder_ == null) { return tlsParams_ == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDefaultInstance() : tlsParams_; } else { return tlsParamsBuilder_.getMessage(); } } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public Builder setTlsParams(io.envoyproxy.envoy.api.v2.auth.TlsParameters value) { if (tlsParamsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } tlsParams_ = value; onChanged(); } else { tlsParamsBuilder_.setMessage(value); } return this; } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public Builder setTlsParams( io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder builderForValue) { if (tlsParamsBuilder_ == null) { tlsParams_ = builderForValue.build(); onChanged(); } else { tlsParamsBuilder_.setMessage(builderForValue.build()); } return this; } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public Builder mergeTlsParams(io.envoyproxy.envoy.api.v2.auth.TlsParameters value) { if (tlsParamsBuilder_ == null) { if (tlsParams_ != null) { tlsParams_ = io.envoyproxy.envoy.api.v2.auth.TlsParameters.newBuilder(tlsParams_).mergeFrom(value).buildPartial(); } else { tlsParams_ = value; } onChanged(); } else { tlsParamsBuilder_.mergeFrom(value); } return this; } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public Builder clearTlsParams() { if (tlsParamsBuilder_ == null) { tlsParams_ = null; onChanged(); } else { tlsParams_ = null; tlsParamsBuilder_ = null; } return this; } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder getTlsParamsBuilder() { onChanged(); return getTlsParamsFieldBuilder().getBuilder(); } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ public io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder getTlsParamsOrBuilder() { if (tlsParamsBuilder_ != null) { return tlsParamsBuilder_.getMessageOrBuilder(); } else { return tlsParams_ == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDefaultInstance() : tlsParams_; } } /** *
     * TLS protocol versions, cipher suites etc.
     * 
* * .envoy.api.v2.auth.TlsParameters tls_params = 1; */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsParameters, io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder, io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder> getTlsParamsFieldBuilder() { if (tlsParamsBuilder_ == null) { tlsParamsBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsParameters, io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder, io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder>( getTlsParams(), getParentForChildren(), isClean()); tlsParams_ = null; } return tlsParamsBuilder_; } private java.util.List tlsCertificates_ = java.util.Collections.emptyList(); private void ensureTlsCertificatesIsMutable() { if (!((bitField0_ & 0x00000002) == 0x00000002)) { tlsCertificates_ = new java.util.ArrayList(tlsCertificates_); bitField0_ |= 0x00000002; } } private com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsCertificate, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder, io.envoyproxy.envoy.api.v2.auth.TlsCertificateOrBuilder> tlsCertificatesBuilder_; /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public java.util.List getTlsCertificatesList() { if (tlsCertificatesBuilder_ == null) { return java.util.Collections.unmodifiableList(tlsCertificates_); } else { return tlsCertificatesBuilder_.getMessageList(); } } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public int getTlsCertificatesCount() { if (tlsCertificatesBuilder_ == null) { return tlsCertificates_.size(); } else { return tlsCertificatesBuilder_.getCount(); } } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificate getTlsCertificates(int index) { if (tlsCertificatesBuilder_ == null) { return tlsCertificates_.get(index); } else { return tlsCertificatesBuilder_.getMessage(index); } } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder setTlsCertificates( int index, io.envoyproxy.envoy.api.v2.auth.TlsCertificate value) { if (tlsCertificatesBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificatesIsMutable(); tlsCertificates_.set(index, value); onChanged(); } else { tlsCertificatesBuilder_.setMessage(index, value); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder setTlsCertificates( int index, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder builderForValue) { if (tlsCertificatesBuilder_ == null) { ensureTlsCertificatesIsMutable(); tlsCertificates_.set(index, builderForValue.build()); onChanged(); } else { tlsCertificatesBuilder_.setMessage(index, builderForValue.build()); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder addTlsCertificates(io.envoyproxy.envoy.api.v2.auth.TlsCertificate value) { if (tlsCertificatesBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificatesIsMutable(); tlsCertificates_.add(value); onChanged(); } else { tlsCertificatesBuilder_.addMessage(value); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder addTlsCertificates( int index, io.envoyproxy.envoy.api.v2.auth.TlsCertificate value) { if (tlsCertificatesBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificatesIsMutable(); tlsCertificates_.add(index, value); onChanged(); } else { tlsCertificatesBuilder_.addMessage(index, value); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder addTlsCertificates( io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder builderForValue) { if (tlsCertificatesBuilder_ == null) { ensureTlsCertificatesIsMutable(); tlsCertificates_.add(builderForValue.build()); onChanged(); } else { tlsCertificatesBuilder_.addMessage(builderForValue.build()); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder addTlsCertificates( int index, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder builderForValue) { if (tlsCertificatesBuilder_ == null) { ensureTlsCertificatesIsMutable(); tlsCertificates_.add(index, builderForValue.build()); onChanged(); } else { tlsCertificatesBuilder_.addMessage(index, builderForValue.build()); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder addAllTlsCertificates( java.lang.Iterable values) { if (tlsCertificatesBuilder_ == null) { ensureTlsCertificatesIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll( values, tlsCertificates_); onChanged(); } else { tlsCertificatesBuilder_.addAllMessages(values); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder clearTlsCertificates() { if (tlsCertificatesBuilder_ == null) { tlsCertificates_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000002); onChanged(); } else { tlsCertificatesBuilder_.clear(); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public Builder removeTlsCertificates(int index) { if (tlsCertificatesBuilder_ == null) { ensureTlsCertificatesIsMutable(); tlsCertificates_.remove(index); onChanged(); } else { tlsCertificatesBuilder_.remove(index); } return this; } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder getTlsCertificatesBuilder( int index) { return getTlsCertificatesFieldBuilder().getBuilder(index); } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificateOrBuilder getTlsCertificatesOrBuilder( int index) { if (tlsCertificatesBuilder_ == null) { return tlsCertificates_.get(index); } else { return tlsCertificatesBuilder_.getMessageOrBuilder(index); } } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public java.util.List getTlsCertificatesOrBuilderList() { if (tlsCertificatesBuilder_ != null) { return tlsCertificatesBuilder_.getMessageOrBuilderList(); } else { return java.util.Collections.unmodifiableList(tlsCertificates_); } } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder addTlsCertificatesBuilder() { return getTlsCertificatesFieldBuilder().addBuilder( io.envoyproxy.envoy.api.v2.auth.TlsCertificate.getDefaultInstance()); } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder addTlsCertificatesBuilder( int index) { return getTlsCertificatesFieldBuilder().addBuilder( index, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.getDefaultInstance()); } /** *
     * :ref:`Multiple TLS certificates <arch_overview_ssl_cert_select>` can be associated with the
     * same context to allow both RSA and ECDSA certificates.
     * Only a single TLS certificate is supported in client contexts. In server contexts, the first
     * RSA certificate is used for clients that only support RSA and the first ECDSA certificate is
     * used for clients that support ECDSA.
     * 
* * repeated .envoy.api.v2.auth.TlsCertificate tls_certificates = 2; */ public java.util.List getTlsCertificatesBuilderList() { return getTlsCertificatesFieldBuilder().getBuilderList(); } private com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsCertificate, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder, io.envoyproxy.envoy.api.v2.auth.TlsCertificateOrBuilder> getTlsCertificatesFieldBuilder() { if (tlsCertificatesBuilder_ == null) { tlsCertificatesBuilder_ = new com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.TlsCertificate, io.envoyproxy.envoy.api.v2.auth.TlsCertificate.Builder, io.envoyproxy.envoy.api.v2.auth.TlsCertificateOrBuilder>( tlsCertificates_, ((bitField0_ & 0x00000002) == 0x00000002), getParentForChildren(), isClean()); tlsCertificates_ = null; } return tlsCertificatesBuilder_; } private java.util.List tlsCertificateSdsSecretConfigs_ = java.util.Collections.emptyList(); private void ensureTlsCertificateSdsSecretConfigsIsMutable() { if (!((bitField0_ & 0x00000004) == 0x00000004)) { tlsCertificateSdsSecretConfigs_ = new java.util.ArrayList(tlsCertificateSdsSecretConfigs_); bitField0_ |= 0x00000004; } } private com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> tlsCertificateSdsSecretConfigsBuilder_; /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public java.util.List getTlsCertificateSdsSecretConfigsList() { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { return java.util.Collections.unmodifiableList(tlsCertificateSdsSecretConfigs_); } else { return tlsCertificateSdsSecretConfigsBuilder_.getMessageList(); } } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public int getTlsCertificateSdsSecretConfigsCount() { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { return tlsCertificateSdsSecretConfigs_.size(); } else { return tlsCertificateSdsSecretConfigsBuilder_.getCount(); } } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getTlsCertificateSdsSecretConfigs(int index) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { return tlsCertificateSdsSecretConfigs_.get(index); } else { return tlsCertificateSdsSecretConfigsBuilder_.getMessage(index); } } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder setTlsCertificateSdsSecretConfigs( int index, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.set(index, value); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.setMessage(index, value); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder setTlsCertificateSdsSecretConfigs( int index, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.set(index, builderForValue.build()); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.setMessage(index, builderForValue.build()); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder addTlsCertificateSdsSecretConfigs(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.add(value); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.addMessage(value); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder addTlsCertificateSdsSecretConfigs( int index, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.add(index, value); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.addMessage(index, value); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder addTlsCertificateSdsSecretConfigs( io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.add(builderForValue.build()); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.addMessage(builderForValue.build()); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder addTlsCertificateSdsSecretConfigs( int index, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.add(index, builderForValue.build()); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.addMessage(index, builderForValue.build()); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder addAllTlsCertificateSdsSecretConfigs( java.lang.Iterable values) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { ensureTlsCertificateSdsSecretConfigsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll( values, tlsCertificateSdsSecretConfigs_); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.addAllMessages(values); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder clearTlsCertificateSdsSecretConfigs() { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { tlsCertificateSdsSecretConfigs_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000004); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.clear(); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public Builder removeTlsCertificateSdsSecretConfigs(int index) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { ensureTlsCertificateSdsSecretConfigsIsMutable(); tlsCertificateSdsSecretConfigs_.remove(index); onChanged(); } else { tlsCertificateSdsSecretConfigsBuilder_.remove(index); } return this; } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder getTlsCertificateSdsSecretConfigsBuilder( int index) { return getTlsCertificateSdsSecretConfigsFieldBuilder().getBuilder(index); } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getTlsCertificateSdsSecretConfigsOrBuilder( int index) { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { return tlsCertificateSdsSecretConfigs_.get(index); } else { return tlsCertificateSdsSecretConfigsBuilder_.getMessageOrBuilder(index); } } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public java.util.List getTlsCertificateSdsSecretConfigsOrBuilderList() { if (tlsCertificateSdsSecretConfigsBuilder_ != null) { return tlsCertificateSdsSecretConfigsBuilder_.getMessageOrBuilderList(); } else { return java.util.Collections.unmodifiableList(tlsCertificateSdsSecretConfigs_); } } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder addTlsCertificateSdsSecretConfigsBuilder() { return getTlsCertificateSdsSecretConfigsFieldBuilder().addBuilder( io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance()); } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder addTlsCertificateSdsSecretConfigsBuilder( int index) { return getTlsCertificateSdsSecretConfigsFieldBuilder().addBuilder( index, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance()); } /** *
     * Configs for fetching TLS certificates via SDS API.
     * 
* * repeated .envoy.api.v2.auth.SdsSecretConfig tls_certificate_sds_secret_configs = 6 [(.validate.rules) = { ... } */ public java.util.List getTlsCertificateSdsSecretConfigsBuilderList() { return getTlsCertificateSdsSecretConfigsFieldBuilder().getBuilderList(); } private com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> getTlsCertificateSdsSecretConfigsFieldBuilder() { if (tlsCertificateSdsSecretConfigsBuilder_ == null) { tlsCertificateSdsSecretConfigsBuilder_ = new com.google.protobuf.RepeatedFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder>( tlsCertificateSdsSecretConfigs_, ((bitField0_ & 0x00000004) == 0x00000004), getParentForChildren(), isClean()); tlsCertificateSdsSecretConfigs_ = null; } return tlsCertificateSdsSecretConfigsBuilder_; } private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder> validationContextBuilder_; /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public boolean hasValidationContext() { return validationContextTypeCase_ == 3; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext getValidationContext() { if (validationContextBuilder_ == null) { if (validationContextTypeCase_ == 3) { return (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } else { if (validationContextTypeCase_ == 3) { return validationContextBuilder_.getMessage(); } return io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public Builder setValidationContext(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext value) { if (validationContextBuilder_ == null) { if (value == null) { throw new NullPointerException(); } validationContextType_ = value; onChanged(); } else { validationContextBuilder_.setMessage(value); } validationContextTypeCase_ = 3; return this; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public Builder setValidationContext( io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder builderForValue) { if (validationContextBuilder_ == null) { validationContextType_ = builderForValue.build(); onChanged(); } else { validationContextBuilder_.setMessage(builderForValue.build()); } validationContextTypeCase_ = 3; return this; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public Builder mergeValidationContext(io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext value) { if (validationContextBuilder_ == null) { if (validationContextTypeCase_ == 3 && validationContextType_ != io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance()) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.newBuilder((io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_) .mergeFrom(value).buildPartial(); } else { validationContextType_ = value; } onChanged(); } else { if (validationContextTypeCase_ == 3) { validationContextBuilder_.mergeFrom(value); } validationContextBuilder_.setMessage(value); } validationContextTypeCase_ = 3; return this; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public Builder clearValidationContext() { if (validationContextBuilder_ == null) { if (validationContextTypeCase_ == 3) { validationContextTypeCase_ = 0; validationContextType_ = null; onChanged(); } } else { if (validationContextTypeCase_ == 3) { validationContextTypeCase_ = 0; validationContextType_ = null; } validationContextBuilder_.clear(); } return this; } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder getValidationContextBuilder() { return getValidationContextFieldBuilder().getBuilder(); } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ public io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder getValidationContextOrBuilder() { if ((validationContextTypeCase_ == 3) && (validationContextBuilder_ != null)) { return validationContextBuilder_.getMessageOrBuilder(); } else { if (validationContextTypeCase_ == 3) { return (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } } /** *
     * How to validate peer certificates.
     * 
* * .envoy.api.v2.auth.CertificateValidationContext validation_context = 3; */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder> getValidationContextFieldBuilder() { if (validationContextBuilder_ == null) { if (!(validationContextTypeCase_ == 3)) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.getDefaultInstance(); } validationContextBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CertificateValidationContextOrBuilder>( (io.envoyproxy.envoy.api.v2.auth.CertificateValidationContext) validationContextType_, getParentForChildren(), isClean()); validationContextType_ = null; } validationContextTypeCase_ = 3; onChanged();; return validationContextBuilder_; } private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> validationContextSdsSecretConfigBuilder_; /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public boolean hasValidationContextSdsSecretConfig() { return validationContextTypeCase_ == 7; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig getValidationContextSdsSecretConfig() { if (validationContextSdsSecretConfigBuilder_ == null) { if (validationContextTypeCase_ == 7) { return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } else { if (validationContextTypeCase_ == 7) { return validationContextSdsSecretConfigBuilder_.getMessage(); } return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public Builder setValidationContextSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (validationContextSdsSecretConfigBuilder_ == null) { if (value == null) { throw new NullPointerException(); } validationContextType_ = value; onChanged(); } else { validationContextSdsSecretConfigBuilder_.setMessage(value); } validationContextTypeCase_ = 7; return this; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public Builder setValidationContextSdsSecretConfig( io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder builderForValue) { if (validationContextSdsSecretConfigBuilder_ == null) { validationContextType_ = builderForValue.build(); onChanged(); } else { validationContextSdsSecretConfigBuilder_.setMessage(builderForValue.build()); } validationContextTypeCase_ = 7; return this; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public Builder mergeValidationContextSdsSecretConfig(io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig value) { if (validationContextSdsSecretConfigBuilder_ == null) { if (validationContextTypeCase_ == 7 && validationContextType_ != io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance()) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.newBuilder((io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_) .mergeFrom(value).buildPartial(); } else { validationContextType_ = value; } onChanged(); } else { if (validationContextTypeCase_ == 7) { validationContextSdsSecretConfigBuilder_.mergeFrom(value); } validationContextSdsSecretConfigBuilder_.setMessage(value); } validationContextTypeCase_ = 7; return this; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public Builder clearValidationContextSdsSecretConfig() { if (validationContextSdsSecretConfigBuilder_ == null) { if (validationContextTypeCase_ == 7) { validationContextTypeCase_ = 0; validationContextType_ = null; onChanged(); } } else { if (validationContextTypeCase_ == 7) { validationContextTypeCase_ = 0; validationContextType_ = null; } validationContextSdsSecretConfigBuilder_.clear(); } return this; } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder getValidationContextSdsSecretConfigBuilder() { return getValidationContextSdsSecretConfigFieldBuilder().getBuilder(); } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ public io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder getValidationContextSdsSecretConfigOrBuilder() { if ((validationContextTypeCase_ == 7) && (validationContextSdsSecretConfigBuilder_ != null)) { return validationContextSdsSecretConfigBuilder_.getMessageOrBuilder(); } else { if (validationContextTypeCase_ == 7) { return (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } } /** *
     * Config for fetching validation context via SDS API.
     * 
* * .envoy.api.v2.auth.SdsSecretConfig validation_context_sds_secret_config = 7; */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder> getValidationContextSdsSecretConfigFieldBuilder() { if (validationContextSdsSecretConfigBuilder_ == null) { if (!(validationContextTypeCase_ == 7)) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.getDefaultInstance(); } validationContextSdsSecretConfigBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig.Builder, io.envoyproxy.envoy.api.v2.auth.SdsSecretConfigOrBuilder>( (io.envoyproxy.envoy.api.v2.auth.SdsSecretConfig) validationContextType_, getParentForChildren(), isClean()); validationContextType_ = null; } validationContextTypeCase_ = 7; onChanged();; return validationContextSdsSecretConfigBuilder_; } private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder> combinedValidationContextBuilder_; /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public boolean hasCombinedValidationContext() { return validationContextTypeCase_ == 8; } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext getCombinedValidationContext() { if (combinedValidationContextBuilder_ == null) { if (validationContextTypeCase_ == 8) { return (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } else { if (validationContextTypeCase_ == 8) { return combinedValidationContextBuilder_.getMessage(); } return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public Builder setCombinedValidationContext(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext value) { if (combinedValidationContextBuilder_ == null) { if (value == null) { throw new NullPointerException(); } validationContextType_ = value; onChanged(); } else { combinedValidationContextBuilder_.setMessage(value); } validationContextTypeCase_ = 8; return this; } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public Builder setCombinedValidationContext( io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder builderForValue) { if (combinedValidationContextBuilder_ == null) { validationContextType_ = builderForValue.build(); onChanged(); } else { combinedValidationContextBuilder_.setMessage(builderForValue.build()); } validationContextTypeCase_ = 8; return this; } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public Builder mergeCombinedValidationContext(io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext value) { if (combinedValidationContextBuilder_ == null) { if (validationContextTypeCase_ == 8 && validationContextType_ != io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance()) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.newBuilder((io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_) .mergeFrom(value).buildPartial(); } else { validationContextType_ = value; } onChanged(); } else { if (validationContextTypeCase_ == 8) { combinedValidationContextBuilder_.mergeFrom(value); } combinedValidationContextBuilder_.setMessage(value); } validationContextTypeCase_ = 8; return this; } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public Builder clearCombinedValidationContext() { if (combinedValidationContextBuilder_ == null) { if (validationContextTypeCase_ == 8) { validationContextTypeCase_ = 0; validationContextType_ = null; onChanged(); } } else { if (validationContextTypeCase_ == 8) { validationContextTypeCase_ = 0; validationContextType_ = null; } combinedValidationContextBuilder_.clear(); } return this; } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder getCombinedValidationContextBuilder() { return getCombinedValidationContextFieldBuilder().getBuilder(); } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder getCombinedValidationContextOrBuilder() { if ((validationContextTypeCase_ == 8) && (combinedValidationContextBuilder_ != null)) { return combinedValidationContextBuilder_.getMessageOrBuilder(); } else { if (validationContextTypeCase_ == 8) { return (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_; } return io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } } /** *
     * Combined certificate validation context holds a default CertificateValidationContext
     * and SDS config. When SDS server returns dynamic CertificateValidationContext, both dynamic
     * and default CertificateValidationContext are merged into a new CertificateValidationContext
     * for validation. This merge is done by Message::MergeFrom(), so dynamic
     * CertificateValidationContext overwrites singular fields in default
     * CertificateValidationContext, and concatenates repeated fields to default
     * CertificateValidationContext, and logical OR is applied to boolean fields.
     * 
* * .envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext combined_validation_context = 8; */ private com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder> getCombinedValidationContextFieldBuilder() { if (combinedValidationContextBuilder_ == null) { if (!(validationContextTypeCase_ == 8)) { validationContextType_ = io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.getDefaultInstance(); } combinedValidationContextBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext.Builder, io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContextOrBuilder>( (io.envoyproxy.envoy.api.v2.auth.CommonTlsContext.CombinedCertificateValidationContext) validationContextType_, getParentForChildren(), isClean()); validationContextType_ = null; } validationContextTypeCase_ = 8; onChanged();; return combinedValidationContextBuilder_; } private com.google.protobuf.LazyStringList alpnProtocols_ = com.google.protobuf.LazyStringArrayList.EMPTY; private void ensureAlpnProtocolsIsMutable() { if (!((bitField0_ & 0x00000040) == 0x00000040)) { alpnProtocols_ = new com.google.protobuf.LazyStringArrayList(alpnProtocols_); bitField0_ |= 0x00000040; } } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public com.google.protobuf.ProtocolStringList getAlpnProtocolsList() { return alpnProtocols_.getUnmodifiableView(); } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public int getAlpnProtocolsCount() { return alpnProtocols_.size(); } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public java.lang.String getAlpnProtocols(int index) { return alpnProtocols_.get(index); } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public com.google.protobuf.ByteString getAlpnProtocolsBytes(int index) { return alpnProtocols_.getByteString(index); } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public Builder setAlpnProtocols( int index, java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureAlpnProtocolsIsMutable(); alpnProtocols_.set(index, value); onChanged(); return this; } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public Builder addAlpnProtocols( java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureAlpnProtocolsIsMutable(); alpnProtocols_.add(value); onChanged(); return this; } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public Builder addAllAlpnProtocols( java.lang.Iterable values) { ensureAlpnProtocolsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll( values, alpnProtocols_); onChanged(); return this; } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public Builder clearAlpnProtocols() { alpnProtocols_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000040); onChanged(); return this; } /** *
     * Supplies the list of ALPN protocols that the listener should expose. In
     * practice this is likely to be set to one of two values (see the
     * :ref:`codec_type
     * <envoy_api_field_config.filter.network.http_connection_manager.v2.HttpConnectionManager.codec_type>`
     * parameter in the HTTP connection manager for more information):
     * * "h2,http/1.1" If the listener is going to support both HTTP/2 and HTTP/1.1.
     * * "http/1.1" If the listener is only going to support HTTP/1.1.
     * There is no default for this parameter. If empty, Envoy will not expose ALPN.
     * 
* * repeated string alpn_protocols = 4; */ public Builder addAlpnProtocolsBytes( com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); ensureAlpnProtocolsIsMutable(); alpnProtocols_.add(value); onChanged(); return this; } public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFieldsProto3(unknownFields); } public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:envoy.api.v2.auth.CommonTlsContext) } // @@protoc_insertion_point(class_scope:envoy.api.v2.auth.CommonTlsContext) private static final io.envoyproxy.envoy.api.v2.auth.CommonTlsContext DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.envoyproxy.envoy.api.v2.auth.CommonTlsContext(); } public static io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getDefaultInstance() { return DEFAULT_INSTANCE; } private static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { public CommonTlsContext parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CommonTlsContext(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } public io.envoyproxy.envoy.api.v2.auth.CommonTlsContext getDefaultInstanceForType() { return DEFAULT_INSTANCE; } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy