Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
*
* TLS_AUTO = 0;
*/
public static final int TLS_AUTO_VALUE = 0;
/**
*
* TLS 1.0
*
*
* TLSv1_0 = 1;
*/
public static final int TLSv1_0_VALUE = 1;
/**
*
* TLS 1.1
*
*
* TLSv1_1 = 2;
*/
public static final int TLSv1_1_VALUE = 2;
/**
*
* TLS 1.2
*
*
* TLSv1_2 = 3;
*/
public static final int TLSv1_2_VALUE = 3;
/**
*
* TLS 1.3
*
*
* TLSv1_3 = 4;
*/
public static final int TLSv1_3_VALUE = 4;
public final int getNumber() {
if (this == UNRECOGNIZED) {
throw new java.lang.IllegalArgumentException(
"Can't get the number of an unknown enum value.");
}
return value;
}
/**
* @param value The numeric wire value of the corresponding enum entry.
* @return The enum associated with the given numeric wire value.
* @deprecated Use {@link #forNumber(int)} instead.
*/
@java.lang.Deprecated
public static TlsProtocol valueOf(int value) {
return forNumber(value);
}
/**
* @param value The numeric wire value of the corresponding enum entry.
* @return The enum associated with the given numeric wire value.
*/
public static TlsProtocol forNumber(int value) {
switch (value) {
case 0: return TLS_AUTO;
case 1: return TLSv1_0;
case 2: return TLSv1_1;
case 3: return TLSv1_2;
case 4: return TLSv1_3;
default: return null;
}
}
public static com.google.protobuf.Internal.EnumLiteMap
internalGetValueMap() {
return internalValueMap;
}
private static final com.google.protobuf.Internal.EnumLiteMap<
TlsProtocol> internalValueMap =
new com.google.protobuf.Internal.EnumLiteMap() {
public TlsProtocol findValueByNumber(int number) {
return TlsProtocol.forNumber(number);
}
};
public final com.google.protobuf.Descriptors.EnumValueDescriptor
getValueDescriptor() {
if (this == UNRECOGNIZED) {
throw new java.lang.IllegalStateException(
"Can't get the descriptor of an unrecognized enum value.");
}
return getDescriptor().getValues().get(ordinal());
}
public final com.google.protobuf.Descriptors.EnumDescriptor
getDescriptorForType() {
return getDescriptor();
}
public static final com.google.protobuf.Descriptors.EnumDescriptor
getDescriptor() {
return io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDescriptor().getEnumTypes().get(0);
}
private static final TlsProtocol[] VALUES = values();
public static TlsProtocol valueOf(
com.google.protobuf.Descriptors.EnumValueDescriptor desc) {
if (desc.getType() != getDescriptor()) {
throw new java.lang.IllegalArgumentException(
"EnumValueDescriptor is not for this type.");
}
if (desc.getIndex() == -1) {
return UNRECOGNIZED;
}
return VALUES[desc.getIndex()];
}
private final int value;
private TlsProtocol(int value) {
this.value = value;
}
// @@protoc_insertion_point(enum_scope:envoy.api.v2.auth.TlsParameters.TlsProtocol)
}
public static final int TLS_MINIMUM_PROTOCOL_VERSION_FIELD_NUMBER = 1;
private int tlsMinimumProtocolVersion_;
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMinimumProtocolVersion.
*/
@java.lang.Override public int getTlsMinimumProtocolVersionValue() {
return tlsMinimumProtocolVersion_;
}
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The tlsMinimumProtocolVersion.
*/
@java.lang.Override public io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMinimumProtocolVersion() {
@SuppressWarnings("deprecation")
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol result = io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.valueOf(tlsMinimumProtocolVersion_);
return result == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.UNRECOGNIZED : result;
}
public static final int TLS_MAXIMUM_PROTOCOL_VERSION_FIELD_NUMBER = 2;
private int tlsMaximumProtocolVersion_;
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMaximumProtocolVersion.
*/
@java.lang.Override public int getTlsMaximumProtocolVersionValue() {
return tlsMaximumProtocolVersion_;
}
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The tlsMaximumProtocolVersion.
*/
@java.lang.Override public io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMaximumProtocolVersion() {
@SuppressWarnings("deprecation")
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol result = io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.valueOf(tlsMaximumProtocolVersion_);
return result == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.UNRECOGNIZED : result;
}
public static final int CIPHER_SUITES_FIELD_NUMBER = 3;
private com.google.protobuf.LazyStringList cipherSuites_;
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return A list containing the cipherSuites.
*/
public com.google.protobuf.ProtocolStringList
getCipherSuitesList() {
return cipherSuites_;
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return The count of cipherSuites.
*/
public int getCipherSuitesCount() {
return cipherSuites_.size();
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the element to return.
* @return The cipherSuites at the given index.
*/
public java.lang.String getCipherSuites(int index) {
return cipherSuites_.get(index);
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the value to return.
* @return The bytes of the cipherSuites at the given index.
*/
public com.google.protobuf.ByteString
getCipherSuitesBytes(int index) {
return cipherSuites_.getByteString(index);
}
public static final int ECDH_CURVES_FIELD_NUMBER = 4;
private com.google.protobuf.LazyStringList ecdhCurves_;
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return A list containing the ecdhCurves.
*/
public com.google.protobuf.ProtocolStringList
getEcdhCurvesList() {
return ecdhCurves_;
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return The count of ecdhCurves.
*/
public int getEcdhCurvesCount() {
return ecdhCurves_.size();
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the element to return.
* @return The ecdhCurves at the given index.
*/
public java.lang.String getEcdhCurves(int index) {
return ecdhCurves_.get(index);
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the value to return.
* @return The bytes of the ecdhCurves at the given index.
*/
public com.google.protobuf.ByteString
getEcdhCurvesBytes(int index) {
return ecdhCurves_.getByteString(index);
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output)
throws java.io.IOException {
if (tlsMinimumProtocolVersion_ != io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.TLS_AUTO.getNumber()) {
output.writeEnum(1, tlsMinimumProtocolVersion_);
}
if (tlsMaximumProtocolVersion_ != io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.TLS_AUTO.getNumber()) {
output.writeEnum(2, tlsMaximumProtocolVersion_);
}
for (int i = 0; i < cipherSuites_.size(); i++) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 3, cipherSuites_.getRaw(i));
}
for (int i = 0; i < ecdhCurves_.size(); i++) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 4, ecdhCurves_.getRaw(i));
}
unknownFields.writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
if (tlsMinimumProtocolVersion_ != io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.TLS_AUTO.getNumber()) {
size += com.google.protobuf.CodedOutputStream
.computeEnumSize(1, tlsMinimumProtocolVersion_);
}
if (tlsMaximumProtocolVersion_ != io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.TLS_AUTO.getNumber()) {
size += com.google.protobuf.CodedOutputStream
.computeEnumSize(2, tlsMaximumProtocolVersion_);
}
{
int dataSize = 0;
for (int i = 0; i < cipherSuites_.size(); i++) {
dataSize += computeStringSizeNoTag(cipherSuites_.getRaw(i));
}
size += dataSize;
size += 1 * getCipherSuitesList().size();
}
{
int dataSize = 0;
for (int i = 0; i < ecdhCurves_.size(); i++) {
dataSize += computeStringSizeNoTag(ecdhCurves_.getRaw(i));
}
size += dataSize;
size += 1 * getEcdhCurvesList().size();
}
size += unknownFields.getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof io.envoyproxy.envoy.api.v2.auth.TlsParameters)) {
return super.equals(obj);
}
io.envoyproxy.envoy.api.v2.auth.TlsParameters other = (io.envoyproxy.envoy.api.v2.auth.TlsParameters) obj;
if (tlsMinimumProtocolVersion_ != other.tlsMinimumProtocolVersion_) return false;
if (tlsMaximumProtocolVersion_ != other.tlsMaximumProtocolVersion_) return false;
if (!getCipherSuitesList()
.equals(other.getCipherSuitesList())) return false;
if (!getEcdhCurvesList()
.equals(other.getEcdhCurvesList())) return false;
if (!unknownFields.equals(other.unknownFields)) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
hash = (37 * hash) + TLS_MINIMUM_PROTOCOL_VERSION_FIELD_NUMBER;
hash = (53 * hash) + tlsMinimumProtocolVersion_;
hash = (37 * hash) + TLS_MAXIMUM_PROTOCOL_VERSION_FIELD_NUMBER;
hash = (53 * hash) + tlsMaximumProtocolVersion_;
if (getCipherSuitesCount() > 0) {
hash = (37 * hash) + CIPHER_SUITES_FIELD_NUMBER;
hash = (53 * hash) + getCipherSuitesList().hashCode();
}
if (getEcdhCurvesCount() > 0) {
hash = (37 * hash) + ECDH_CURVES_FIELD_NUMBER;
hash = (53 * hash) + getEcdhCurvesList().hashCode();
}
hash = (29 * hash) + unknownFields.hashCode();
memoizedHashCode = hash;
return hash;
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseDelimitedWithIOException(PARSER, input, extensionRegistry);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input);
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3
.parseWithIOException(PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() { return newBuilder(); }
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(io.envoyproxy.envoy.api.v2.auth.TlsParameters prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE
? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(
com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
* Protobuf type {@code envoy.api.v2.auth.TlsParameters}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessageV3.Builder implements
// @@protoc_insertion_point(builder_implements:envoy.api.v2.auth.TlsParameters)
io.envoyproxy.envoy.api.v2.auth.TlsParametersOrBuilder {
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return io.envoyproxy.envoy.api.v2.auth.CommonProto.internal_static_envoy_api_v2_auth_TlsParameters_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return io.envoyproxy.envoy.api.v2.auth.CommonProto.internal_static_envoy_api_v2_auth_TlsParameters_fieldAccessorTable
.ensureFieldAccessorsInitialized(
io.envoyproxy.envoy.api.v2.auth.TlsParameters.class, io.envoyproxy.envoy.api.v2.auth.TlsParameters.Builder.class);
}
// Construct using io.envoyproxy.envoy.api.v2.auth.TlsParameters.newBuilder()
private Builder() {
maybeForceBuilderInitialization();
}
private Builder(
com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
super(parent);
maybeForceBuilderInitialization();
}
private void maybeForceBuilderInitialization() {
if (com.google.protobuf.GeneratedMessageV3
.alwaysUseFieldBuilders) {
}
}
@java.lang.Override
public Builder clear() {
super.clear();
tlsMinimumProtocolVersion_ = 0;
tlsMaximumProtocolVersion_ = 0;
cipherSuites_ = com.google.protobuf.LazyStringArrayList.EMPTY;
bitField0_ = (bitField0_ & ~0x00000001);
ecdhCurves_ = com.google.protobuf.LazyStringArrayList.EMPTY;
bitField0_ = (bitField0_ & ~0x00000002);
return this;
}
@java.lang.Override
public com.google.protobuf.Descriptors.Descriptor
getDescriptorForType() {
return io.envoyproxy.envoy.api.v2.auth.CommonProto.internal_static_envoy_api_v2_auth_TlsParameters_descriptor;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters getDefaultInstanceForType() {
return io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDefaultInstance();
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters build() {
io.envoyproxy.envoy.api.v2.auth.TlsParameters result = buildPartial();
if (!result.isInitialized()) {
throw newUninitializedMessageException(result);
}
return result;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters buildPartial() {
io.envoyproxy.envoy.api.v2.auth.TlsParameters result = new io.envoyproxy.envoy.api.v2.auth.TlsParameters(this);
int from_bitField0_ = bitField0_;
result.tlsMinimumProtocolVersion_ = tlsMinimumProtocolVersion_;
result.tlsMaximumProtocolVersion_ = tlsMaximumProtocolVersion_;
if (((bitField0_ & 0x00000001) != 0)) {
cipherSuites_ = cipherSuites_.getUnmodifiableView();
bitField0_ = (bitField0_ & ~0x00000001);
}
result.cipherSuites_ = cipherSuites_;
if (((bitField0_ & 0x00000002) != 0)) {
ecdhCurves_ = ecdhCurves_.getUnmodifiableView();
bitField0_ = (bitField0_ & ~0x00000002);
}
result.ecdhCurves_ = ecdhCurves_;
onBuilt();
return result;
}
@java.lang.Override
public Builder clone() {
return super.clone();
}
@java.lang.Override
public Builder setField(
com.google.protobuf.Descriptors.FieldDescriptor field,
java.lang.Object value) {
return super.setField(field, value);
}
@java.lang.Override
public Builder clearField(
com.google.protobuf.Descriptors.FieldDescriptor field) {
return super.clearField(field);
}
@java.lang.Override
public Builder clearOneof(
com.google.protobuf.Descriptors.OneofDescriptor oneof) {
return super.clearOneof(oneof);
}
@java.lang.Override
public Builder setRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field,
int index, java.lang.Object value) {
return super.setRepeatedField(field, index, value);
}
@java.lang.Override
public Builder addRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field,
java.lang.Object value) {
return super.addRepeatedField(field, value);
}
@java.lang.Override
public Builder mergeFrom(com.google.protobuf.Message other) {
if (other instanceof io.envoyproxy.envoy.api.v2.auth.TlsParameters) {
return mergeFrom((io.envoyproxy.envoy.api.v2.auth.TlsParameters)other);
} else {
super.mergeFrom(other);
return this;
}
}
public Builder mergeFrom(io.envoyproxy.envoy.api.v2.auth.TlsParameters other) {
if (other == io.envoyproxy.envoy.api.v2.auth.TlsParameters.getDefaultInstance()) return this;
if (other.tlsMinimumProtocolVersion_ != 0) {
setTlsMinimumProtocolVersionValue(other.getTlsMinimumProtocolVersionValue());
}
if (other.tlsMaximumProtocolVersion_ != 0) {
setTlsMaximumProtocolVersionValue(other.getTlsMaximumProtocolVersionValue());
}
if (!other.cipherSuites_.isEmpty()) {
if (cipherSuites_.isEmpty()) {
cipherSuites_ = other.cipherSuites_;
bitField0_ = (bitField0_ & ~0x00000001);
} else {
ensureCipherSuitesIsMutable();
cipherSuites_.addAll(other.cipherSuites_);
}
onChanged();
}
if (!other.ecdhCurves_.isEmpty()) {
if (ecdhCurves_.isEmpty()) {
ecdhCurves_ = other.ecdhCurves_;
bitField0_ = (bitField0_ & ~0x00000002);
} else {
ensureEcdhCurvesIsMutable();
ecdhCurves_.addAll(other.ecdhCurves_);
}
onChanged();
}
this.mergeUnknownFields(other.unknownFields);
onChanged();
return this;
}
@java.lang.Override
public final boolean isInitialized() {
return true;
}
@java.lang.Override
public Builder mergeFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
io.envoyproxy.envoy.api.v2.auth.TlsParameters parsedMessage = null;
try {
parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry);
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
parsedMessage = (io.envoyproxy.envoy.api.v2.auth.TlsParameters) e.getUnfinishedMessage();
throw e.unwrapIOException();
} finally {
if (parsedMessage != null) {
mergeFrom(parsedMessage);
}
}
return this;
}
private int bitField0_;
private int tlsMinimumProtocolVersion_ = 0;
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMinimumProtocolVersion.
*/
@java.lang.Override public int getTlsMinimumProtocolVersionValue() {
return tlsMinimumProtocolVersion_;
}
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @param value The enum numeric value on the wire for tlsMinimumProtocolVersion to set.
* @return This builder for chaining.
*/
public Builder setTlsMinimumProtocolVersionValue(int value) {
tlsMinimumProtocolVersion_ = value;
onChanged();
return this;
}
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return The tlsMinimumProtocolVersion.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMinimumProtocolVersion() {
@SuppressWarnings("deprecation")
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol result = io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.valueOf(tlsMinimumProtocolVersion_);
return result == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.UNRECOGNIZED : result;
}
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @param value The tlsMinimumProtocolVersion to set.
* @return This builder for chaining.
*/
public Builder setTlsMinimumProtocolVersion(io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol value) {
if (value == null) {
throw new NullPointerException();
}
tlsMinimumProtocolVersion_ = value.getNumber();
onChanged();
return this;
}
/**
*
* Minimum TLS protocol version. By default, it's ``TLSv1_2`` for both clients and servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_minimum_protocol_version = 1 [(.validate.rules) = { ... }
* @return This builder for chaining.
*/
public Builder clearTlsMinimumProtocolVersion() {
tlsMinimumProtocolVersion_ = 0;
onChanged();
return this;
}
private int tlsMaximumProtocolVersion_ = 0;
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The enum numeric value on the wire for tlsMaximumProtocolVersion.
*/
@java.lang.Override public int getTlsMaximumProtocolVersionValue() {
return tlsMaximumProtocolVersion_;
}
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @param value The enum numeric value on the wire for tlsMaximumProtocolVersion to set.
* @return This builder for chaining.
*/
public Builder setTlsMaximumProtocolVersionValue(int value) {
tlsMaximumProtocolVersion_ = value;
onChanged();
return this;
}
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @return The tlsMaximumProtocolVersion.
*/
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol getTlsMaximumProtocolVersion() {
@SuppressWarnings("deprecation")
io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol result = io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.valueOf(tlsMaximumProtocolVersion_);
return result == null ? io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol.UNRECOGNIZED : result;
}
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
*
* .envoy.api.v2.auth.TlsParameters.TlsProtocol tls_maximum_protocol_version = 2 [(.validate.rules) = { ... }
* @param value The tlsMaximumProtocolVersion to set.
* @return This builder for chaining.
*/
public Builder setTlsMaximumProtocolVersion(io.envoyproxy.envoy.api.v2.auth.TlsParameters.TlsProtocol value) {
if (value == null) {
throw new NullPointerException();
}
tlsMaximumProtocolVersion_ = value.getNumber();
onChanged();
return this;
}
/**
*
* Maximum TLS protocol version. By default, it's ``TLSv1_2`` for clients and ``TLSv1_3`` for
* servers.
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return A list containing the cipherSuites.
*/
public com.google.protobuf.ProtocolStringList
getCipherSuitesList() {
return cipherSuites_.getUnmodifiableView();
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @return The count of cipherSuites.
*/
public int getCipherSuitesCount() {
return cipherSuites_.size();
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the element to return.
* @return The cipherSuites at the given index.
*/
public java.lang.String getCipherSuites(int index) {
return cipherSuites_.get(index);
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index of the value to return.
* @return The bytes of the cipherSuites at the given index.
*/
public com.google.protobuf.ByteString
getCipherSuitesBytes(int index) {
return cipherSuites_.getByteString(index);
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param index The index to set the value at.
* @param value The cipherSuites to set.
* @return This builder for chaining.
*/
public Builder setCipherSuites(
int index, java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
ensureCipherSuitesIsMutable();
cipherSuites_.set(index, value);
onChanged();
return this;
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param value The cipherSuites to add.
* @return This builder for chaining.
*/
public Builder addCipherSuites(
java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
ensureCipherSuitesIsMutable();
cipherSuites_.add(value);
onChanged();
return this;
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param values The cipherSuites to add.
* @return This builder for chaining.
*/
public Builder addAllCipherSuites(
java.lang.Iterable values) {
ensureCipherSuitesIsMutable();
com.google.protobuf.AbstractMessageLite.Builder.addAll(
values, cipherSuites_);
onChanged();
return this;
}
/**
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
* If specified, the TLS listener will only support the specified `cipher list
* <https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration>`_
* when negotiating TLS 1.0-1.2 (this setting has no effect when negotiating TLS 1.3). If not
* specified, the default list will be used.
* In non-FIPS builds, the default cipher list is:
* .. code-block:: none
* [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305]
* [ECDHE-RSA-AES128-GCM-SHA256|ECDHE-RSA-CHACHA20-POLY1305]
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default cipher list is:
* .. code-block:: none
* ECDHE-ECDSA-AES128-GCM-SHA256
* ECDHE-RSA-AES128-GCM-SHA256
* ECDHE-ECDSA-AES128-SHA
* ECDHE-RSA-AES128-SHA
* AES128-GCM-SHA256
* AES128-SHA
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-SHA
* ECDHE-RSA-AES256-SHA
* AES256-GCM-SHA384
* AES256-SHA
*
*
* repeated string cipher_suites = 3;
* @param value The bytes of the cipherSuites to add.
* @return This builder for chaining.
*/
public Builder addCipherSuitesBytes(
com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
ensureCipherSuitesIsMutable();
cipherSuites_.add(value);
onChanged();
return this;
}
private com.google.protobuf.LazyStringList ecdhCurves_ = com.google.protobuf.LazyStringArrayList.EMPTY;
private void ensureEcdhCurvesIsMutable() {
if (!((bitField0_ & 0x00000002) != 0)) {
ecdhCurves_ = new com.google.protobuf.LazyStringArrayList(ecdhCurves_);
bitField0_ |= 0x00000002;
}
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return A list containing the ecdhCurves.
*/
public com.google.protobuf.ProtocolStringList
getEcdhCurvesList() {
return ecdhCurves_.getUnmodifiableView();
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @return The count of ecdhCurves.
*/
public int getEcdhCurvesCount() {
return ecdhCurves_.size();
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the element to return.
* @return The ecdhCurves at the given index.
*/
public java.lang.String getEcdhCurves(int index) {
return ecdhCurves_.get(index);
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index of the value to return.
* @return The bytes of the ecdhCurves at the given index.
*/
public com.google.protobuf.ByteString
getEcdhCurvesBytes(int index) {
return ecdhCurves_.getByteString(index);
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param index The index to set the value at.
* @param value The ecdhCurves to set.
* @return This builder for chaining.
*/
public Builder setEcdhCurves(
int index, java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
ensureEcdhCurvesIsMutable();
ecdhCurves_.set(index, value);
onChanged();
return this;
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param value The ecdhCurves to add.
* @return This builder for chaining.
*/
public Builder addEcdhCurves(
java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
ensureEcdhCurvesIsMutable();
ecdhCurves_.add(value);
onChanged();
return this;
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param values The ecdhCurves to add.
* @return This builder for chaining.
*/
public Builder addAllEcdhCurves(
java.lang.Iterable values) {
ensureEcdhCurvesIsMutable();
com.google.protobuf.AbstractMessageLite.Builder.addAll(
values, ecdhCurves_);
onChanged();
return this;
}
/**
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
* If specified, the TLS connection will only support the specified ECDH
* curves. If not specified, the default curves will be used.
* In non-FIPS builds, the default curves are:
* .. code-block:: none
* X25519
* P-256
* In builds using :ref:`BoringSSL FIPS <arch_overview_ssl_fips>`, the default curve is:
* .. code-block:: none
* P-256
*
*
* repeated string ecdh_curves = 4;
* @param value The bytes of the ecdhCurves to add.
* @return This builder for chaining.
*/
public Builder addEcdhCurvesBytes(
com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
ensureEcdhCurvesIsMutable();
ecdhCurves_.add(value);
onChanged();
return this;
}
@java.lang.Override
public final Builder setUnknownFields(
final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
}
@java.lang.Override
public final Builder mergeUnknownFields(
final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.mergeUnknownFields(unknownFields);
}
// @@protoc_insertion_point(builder_scope:envoy.api.v2.auth.TlsParameters)
}
// @@protoc_insertion_point(class_scope:envoy.api.v2.auth.TlsParameters)
private static final io.envoyproxy.envoy.api.v2.auth.TlsParameters DEFAULT_INSTANCE;
static {
DEFAULT_INSTANCE = new io.envoyproxy.envoy.api.v2.auth.TlsParameters();
}
public static io.envoyproxy.envoy.api.v2.auth.TlsParameters getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static final com.google.protobuf.Parser
PARSER = new com.google.protobuf.AbstractParser() {
@java.lang.Override
public TlsParameters parsePartialFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return new TlsParameters(input, extensionRegistry);
}
};
public static com.google.protobuf.Parser parser() {
return PARSER;
}
@java.lang.Override
public com.google.protobuf.Parser getParserForType() {
return PARSER;
}
@java.lang.Override
public io.envoyproxy.envoy.api.v2.auth.TlsParameters getDefaultInstanceForType() {
return DEFAULT_INSTANCE;
}
}