Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: envoy/config/rbac/v3/rbac.proto
package io.envoyproxy.envoy.config.rbac.v3;
/**
*
* Policy specifies a role and the principals that are assigned/denied the role.
* A policy matches if and only if at least one of its permissions match the
* action taking place AND at least one of its principals match the downstream
* AND the condition is true if specified.
*
*
* Protobuf type {@code envoy.config.rbac.v3.Policy}
*/
public final class Policy extends
com.google.protobuf.GeneratedMessageV3 implements
// @@protoc_insertion_point(message_implements:envoy.config.rbac.v3.Policy)
PolicyOrBuilder {
private static final long serialVersionUID = 0L;
// Use Policy.newBuilder() to construct.
private Policy(com.google.protobuf.GeneratedMessageV3.Builder> builder) {
super(builder);
}
private Policy() {
permissions_ = java.util.Collections.emptyList();
principals_ = java.util.Collections.emptyList();
}
@java.lang.Override
@SuppressWarnings({"unused"})
protected java.lang.Object newInstance(
UnusedPrivateParameter unused) {
return new Policy();
}
@java.lang.Override
public final com.google.protobuf.UnknownFieldSet
getUnknownFields() {
return this.unknownFields;
}
private Policy(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
this();
if (extensionRegistry == null) {
throw new java.lang.NullPointerException();
}
int mutable_bitField0_ = 0;
com.google.protobuf.UnknownFieldSet.Builder unknownFields =
com.google.protobuf.UnknownFieldSet.newBuilder();
try {
boolean done = false;
while (!done) {
int tag = input.readTag();
switch (tag) {
case 0:
done = true;
break;
case 10: {
if (!((mutable_bitField0_ & 0x00000001) != 0)) {
permissions_ = new java.util.ArrayList();
mutable_bitField0_ |= 0x00000001;
}
permissions_.add(
input.readMessage(io.envoyproxy.envoy.config.rbac.v3.Permission.parser(), extensionRegistry));
break;
}
case 18: {
if (!((mutable_bitField0_ & 0x00000002) != 0)) {
principals_ = new java.util.ArrayList();
mutable_bitField0_ |= 0x00000002;
}
principals_.add(
input.readMessage(io.envoyproxy.envoy.config.rbac.v3.Principal.parser(), extensionRegistry));
break;
}
case 26: {
com.google.api.expr.v1alpha1.Expr.Builder subBuilder = null;
if (condition_ != null) {
subBuilder = condition_.toBuilder();
}
condition_ = input.readMessage(com.google.api.expr.v1alpha1.Expr.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(condition_);
condition_ = subBuilder.buildPartial();
}
break;
}
case 34: {
com.google.api.expr.v1alpha1.CheckedExpr.Builder subBuilder = null;
if (checkedCondition_ != null) {
subBuilder = checkedCondition_.toBuilder();
}
checkedCondition_ = input.readMessage(com.google.api.expr.v1alpha1.CheckedExpr.parser(), extensionRegistry);
if (subBuilder != null) {
subBuilder.mergeFrom(checkedCondition_);
checkedCondition_ = subBuilder.buildPartial();
}
break;
}
default: {
if (!parseUnknownField(
input, unknownFields, extensionRegistry, tag)) {
done = true;
}
break;
}
}
}
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.setUnfinishedMessage(this);
} catch (com.google.protobuf.UninitializedMessageException e) {
throw e.asInvalidProtocolBufferException().setUnfinishedMessage(this);
} catch (java.io.IOException e) {
throw new com.google.protobuf.InvalidProtocolBufferException(
e).setUnfinishedMessage(this);
} finally {
if (((mutable_bitField0_ & 0x00000001) != 0)) {
permissions_ = java.util.Collections.unmodifiableList(permissions_);
}
if (((mutable_bitField0_ & 0x00000002) != 0)) {
principals_ = java.util.Collections.unmodifiableList(principals_);
}
this.unknownFields = unknownFields.build();
makeExtensionsImmutable();
}
}
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return io.envoyproxy.envoy.config.rbac.v3.RbacProto.internal_static_envoy_config_rbac_v3_Policy_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return io.envoyproxy.envoy.config.rbac.v3.RbacProto.internal_static_envoy_config_rbac_v3_Policy_fieldAccessorTable
.ensureFieldAccessorsInitialized(
io.envoyproxy.envoy.config.rbac.v3.Policy.class, io.envoyproxy.envoy.config.rbac.v3.Policy.Builder.class);
}
public static final int PERMISSIONS_FIELD_NUMBER = 1;
private java.util.List permissions_;
/**
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
*
* repeated .envoy.config.rbac.v3.Permission permissions = 1 [(.validate.rules) = { ... }
*/
@java.lang.Override
public io.envoyproxy.envoy.config.rbac.v3.PermissionOrBuilder getPermissionsOrBuilder(
int index) {
return permissions_.get(index);
}
public static final int PRINCIPALS_FIELD_NUMBER = 2;
private java.util.List principals_;
/**
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
*
* repeated .envoy.config.rbac.v3.Principal principals = 2 [(.validate.rules) = { ... }
*/
@java.lang.Override
public io.envoyproxy.envoy.config.rbac.v3.PrincipalOrBuilder getPrincipalsOrBuilder(
int index) {
return principals_.get(index);
}
public static final int CONDITION_FIELD_NUMBER = 3;
private com.google.api.expr.v1alpha1.Expr condition_;
/**
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
*
* .google.api.expr.v1alpha1.Expr condition = 3 [(.udpa.annotations.field_migrate) = { ... }
* @return Whether the condition field is set.
*/
@java.lang.Override
public boolean hasCondition() {
return condition_ != null;
}
/**
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
*
* .google.api.expr.v1alpha1.Expr condition = 3 [(.udpa.annotations.field_migrate) = { ... }
*/
@java.lang.Override
public com.google.api.expr.v1alpha1.ExprOrBuilder getConditionOrBuilder() {
return getCondition();
}
public static final int CHECKED_CONDITION_FIELD_NUMBER = 4;
private com.google.api.expr.v1alpha1.CheckedExpr checkedCondition_;
/**
*
* [#not-implemented-hide:]
* An optional symbolic expression that has been successfully type checked.
* Only be used when condition is not used.
*
*
* .google.api.expr.v1alpha1.CheckedExpr checked_condition = 4 [(.udpa.annotations.field_migrate) = { ... }
* @return Whether the checkedCondition field is set.
*/
@java.lang.Override
public boolean hasCheckedCondition() {
return checkedCondition_ != null;
}
/**
*
* [#not-implemented-hide:]
* An optional symbolic expression that has been successfully type checked.
* Only be used when condition is not used.
*
* [#not-implemented-hide:]
* An optional symbolic expression that has been successfully type checked.
* Only be used when condition is not used.
*
*
* .google.api.expr.v1alpha1.CheckedExpr checked_condition = 4 [(.udpa.annotations.field_migrate) = { ... }
*/
@java.lang.Override
public com.google.api.expr.v1alpha1.CheckedExprOrBuilder getCheckedConditionOrBuilder() {
return getCheckedCondition();
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output)
throws java.io.IOException {
for (int i = 0; i < permissions_.size(); i++) {
output.writeMessage(1, permissions_.get(i));
}
for (int i = 0; i < principals_.size(); i++) {
output.writeMessage(2, principals_.get(i));
}
if (condition_ != null) {
output.writeMessage(3, getCondition());
}
if (checkedCondition_ != null) {
output.writeMessage(4, getCheckedCondition());
}
unknownFields.writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
for (int i = 0; i < permissions_.size(); i++) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(1, permissions_.get(i));
}
for (int i = 0; i < principals_.size(); i++) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(2, principals_.get(i));
}
if (condition_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(3, getCondition());
}
if (checkedCondition_ != null) {
size += com.google.protobuf.CodedOutputStream
.computeMessageSize(4, getCheckedCondition());
}
size += unknownFields.getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof io.envoyproxy.envoy.config.rbac.v3.Policy)) {
return super.equals(obj);
}
io.envoyproxy.envoy.config.rbac.v3.Policy other = (io.envoyproxy.envoy.config.rbac.v3.Policy) obj;
if (!getPermissionsList()
.equals(other.getPermissionsList())) return false;
if (!getPrincipalsList()
.equals(other.getPrincipalsList())) return false;
if (hasCondition() != other.hasCondition()) return false;
if (hasCondition()) {
if (!getCondition()
.equals(other.getCondition())) return false;
}
if (hasCheckedCondition() != other.hasCheckedCondition()) return false;
if (hasCheckedCondition()) {
if (!getCheckedCondition()
.equals(other.getCheckedCondition())) return false;
}
if (!unknownFields.equals(other.unknownFields)) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
if (getPermissionsCount() > 0) {
hash = (37 * hash) + PERMISSIONS_FIELD_NUMBER;
hash = (53 * hash) + getPermissionsList().hashCode();
}
if (getPrincipalsCount() > 0) {
hash = (37 * hash) + PRINCIPALS_FIELD_NUMBER;
hash = (53 * hash) + getPrincipalsList().hashCode();
}
if (hasCondition()) {
hash = (37 * hash) + CONDITION_FIELD_NUMBER;
hash = (53 * hash) + getCondition().hashCode();
}
if (hasCheckedCondition()) {
hash = (37 * hash) + CHECKED_CONDITION_FIELD_NUMBER;
hash = (53 * hash) + getCheckedCondition().hashCode();
}
hash = (29 * hash) + unknownFields.hashCode();
memoizedHashCode = hash;
return hash;
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.config.rbac.v3.Policy parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() { return newBuilder(); }
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(io.envoyproxy.envoy.config.rbac.v3.Policy prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE
? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(
com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
*
* Policy specifies a role and the principals that are assigned/denied the role.
* A policy matches if and only if at least one of its permissions match the
* action taking place AND at least one of its principals match the downstream
* AND the condition is true if specified.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
*
* repeated .envoy.config.rbac.v3.Permission permissions = 1 [(.validate.rules) = { ... }
*/
public Builder setPermissions(
int index, io.envoyproxy.envoy.config.rbac.v3.Permission value) {
if (permissionsBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
ensurePermissionsIsMutable();
permissions_.set(index, value);
onChanged();
} else {
permissionsBuilder_.setMessage(index, value);
}
return this;
}
/**
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
*
* repeated .envoy.config.rbac.v3.Permission permissions = 1 [(.validate.rules) = { ... }
*/
public Builder addPermissions(
int index, io.envoyproxy.envoy.config.rbac.v3.Permission value) {
if (permissionsBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
ensurePermissionsIsMutable();
permissions_.add(index, value);
onChanged();
} else {
permissionsBuilder_.addMessage(index, value);
}
return this;
}
/**
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of permissions that define a role. Each permission is
* matched with OR semantics. To match all actions for this policy, a single
* Permission with the ``any`` field set to true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
*
* repeated .envoy.config.rbac.v3.Principal principals = 2 [(.validate.rules) = { ... }
*/
public Builder setPrincipals(
int index, io.envoyproxy.envoy.config.rbac.v3.Principal value) {
if (principalsBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
ensurePrincipalsIsMutable();
principals_.set(index, value);
onChanged();
} else {
principalsBuilder_.setMessage(index, value);
}
return this;
}
/**
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
*
* repeated .envoy.config.rbac.v3.Principal principals = 2 [(.validate.rules) = { ... }
*/
public Builder addPrincipals(
int index, io.envoyproxy.envoy.config.rbac.v3.Principal value) {
if (principalsBuilder_ == null) {
if (value == null) {
throw new NullPointerException();
}
ensurePrincipalsIsMutable();
principals_.add(index, value);
onChanged();
} else {
principalsBuilder_.addMessage(index, value);
}
return this;
}
/**
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* Required. The set of principals that are assigned/denied the role based on
* “action”. Each principal is matched with OR semantics. To match all
* downstreams for this policy, a single Principal with the ``any`` field set to
* true should be used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
*
* .google.api.expr.v1alpha1.Expr condition = 3 [(.udpa.annotations.field_migrate) = { ... }
* @return Whether the condition field is set.
*/
public boolean hasCondition() {
return conditionBuilder_ != null || condition_ != null;
}
/**
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*
* An optional symbolic expression specifying an access control
* :ref:`condition <arch_overview_condition>`. The condition is combined
* with the permissions and the principals as a clause with AND semantics.
* Only be used when checked_condition is not used.
*