All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.kubernetes.client.proto.V1Certificates Maven / Gradle / Ivy

/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package io.kubernetes.client.proto;

public final class V1Certificates {
  private V1Certificates() {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistryLite registry) {}

  public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry registry) {
    registerAllExtensions((com.google.protobuf.ExtensionRegistryLite) registry);
  }

  public interface CertificateSigningRequestOrBuilder
      extends
      // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.CertificateSigningRequest)
      com.google.protobuf.MessageOrBuilder {

    /**
     *
     *
     * 
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ boolean hasMetadata(); /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ io.kubernetes.client.proto.Meta.ObjectMeta getMetadata(); /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder getMetadataOrBuilder(); /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ boolean hasSpec(); /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getSpec(); /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder getSpecOrBuilder(); /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ boolean hasStatus(); /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getStatus(); /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder getStatusOrBuilder(); } /** * * *
   * CertificateSigningRequest objects provide a mechanism to obtain x509 certificates
   * by submitting a certificate signing request, and having it asynchronously approved and issued.
   * Kubelets use this API to obtain:
   *  1. client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client-kubelet" signerName).
   *  2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the "kubernetes.io/kubelet-serving" signerName).
   * This API can be used to request client certificates to authenticate to kube-apiserver
   * (with the "kubernetes.io/kube-apiserver-client" signerName),
   * or to obtain certificates from custom non-Kubernetes signers.
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequest} */ public static final class CertificateSigningRequest extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.CertificateSigningRequest) CertificateSigningRequestOrBuilder { private static final long serialVersionUID = 0L; // Use CertificateSigningRequest.newBuilder() to construct. private CertificateSigningRequest(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CertificateSigningRequest() {} @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CertificateSigningRequest( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { io.kubernetes.client.proto.Meta.ObjectMeta.Builder subBuilder = null; if (((bitField0_ & 0x00000001) == 0x00000001)) { subBuilder = metadata_.toBuilder(); } metadata_ = input.readMessage( io.kubernetes.client.proto.Meta.ObjectMeta.PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(metadata_); metadata_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000001; break; } case 18: { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder subBuilder = null; if (((bitField0_ & 0x00000002) == 0x00000002)) { subBuilder = spec_.toBuilder(); } spec_ = input.readMessage( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(spec_); spec_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000002; break; } case 26: { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder subBuilder = null; if (((bitField0_ & 0x00000004) == 0x00000004)) { subBuilder = status_.toBuilder(); } status_ = input.readMessage( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(status_); status_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000004; break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder.class); } private int bitField0_; public static final int METADATA_FIELD_NUMBER = 1; private io.kubernetes.client.proto.Meta.ObjectMeta metadata_; /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public boolean hasMetadata() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ObjectMeta getMetadata() { return metadata_ == null ? io.kubernetes.client.proto.Meta.ObjectMeta.getDefaultInstance() : metadata_; } /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder getMetadataOrBuilder() { return metadata_ == null ? io.kubernetes.client.proto.Meta.ObjectMeta.getDefaultInstance() : metadata_; } public static final int SPEC_FIELD_NUMBER = 2; private io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec spec_; /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public boolean hasSpec() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getSpec() { return spec_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance() : spec_; } /** * * *
     * spec contains the certificate request, and is immutable after creation.
     * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
     * Other fields are derived by Kubernetes and cannot be modified by users.
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder getSpecOrBuilder() { return spec_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance() : spec_; } public static final int STATUS_FIELD_NUMBER = 3; private io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus status_; /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ public boolean hasStatus() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getStatus() { return status_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance() : status_; } /** * * *
     * status contains information about whether the request is approved or denied,
     * and the certificate issued by the signer, or the failure condition indicating signer failure.
     * +optional
     * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder getStatusOrBuilder() { return status_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance() : status_; } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (((bitField0_ & 0x00000001) == 0x00000001)) { output.writeMessage(1, getMetadata()); } if (((bitField0_ & 0x00000002) == 0x00000002)) { output.writeMessage(2, getSpec()); } if (((bitField0_ & 0x00000004) == 0x00000004)) { output.writeMessage(3, getStatus()); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (((bitField0_ & 0x00000001) == 0x00000001)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, getMetadata()); } if (((bitField0_ & 0x00000002) == 0x00000002)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, getSpec()); } if (((bitField0_ & 0x00000004) == 0x00000004)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(3, getStatus()); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest other = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest) obj; boolean result = true; result = result && (hasMetadata() == other.hasMetadata()); if (hasMetadata()) { result = result && getMetadata().equals(other.getMetadata()); } result = result && (hasSpec() == other.hasSpec()); if (hasSpec()) { result = result && getSpec().equals(other.getSpec()); } result = result && (hasStatus() == other.hasStatus()); if (hasStatus()) { result = result && getStatus().equals(other.getStatus()); } result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasMetadata()) { hash = (37 * hash) + METADATA_FIELD_NUMBER; hash = (53 * hash) + getMetadata().hashCode(); } if (hasSpec()) { hash = (37 * hash) + SPEC_FIELD_NUMBER; hash = (53 * hash) + getSpec().hashCode(); } if (hasStatus()) { hash = (37 * hash) + STATUS_FIELD_NUMBER; hash = (53 * hash) + getStatus().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * CertificateSigningRequest objects provide a mechanism to obtain x509 certificates
     * by submitting a certificate signing request, and having it asynchronously approved and issued.
     * Kubelets use this API to obtain:
     *  1. client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client-kubelet" signerName).
     *  2. serving certificates for TLS endpoints kube-apiserver can connect to securely (with the "kubernetes.io/kubelet-serving" signerName).
     * This API can be used to request client certificates to authenticate to kube-apiserver
     * (with the "kubernetes.io/kube-apiserver-client" signerName),
     * or to obtain certificates from custom non-Kubernetes signers.
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequest} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.CertificateSigningRequest) io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder.class); } // Construct using // io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getMetadataFieldBuilder(); getSpecFieldBuilder(); getStatusFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); if (metadataBuilder_ == null) { metadata_ = null; } else { metadataBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000001); if (specBuilder_ == null) { spec_ = null; } else { specBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000002); if (statusBuilder_ == null) { status_ = null; } else { statusBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000004); return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest .getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest build() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest buildPartial() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest result = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (((from_bitField0_ & 0x00000001) == 0x00000001)) { to_bitField0_ |= 0x00000001; } if (metadataBuilder_ == null) { result.metadata_ = metadata_; } else { result.metadata_ = metadataBuilder_.build(); } if (((from_bitField0_ & 0x00000002) == 0x00000002)) { to_bitField0_ |= 0x00000002; } if (specBuilder_ == null) { result.spec_ = spec_; } else { result.spec_ = specBuilder_.build(); } if (((from_bitField0_ & 0x00000004) == 0x00000004)) { to_bitField0_ |= 0x00000004; } if (statusBuilder_ == null) { result.status_ = status_; } else { result.status_ = statusBuilder_.build(); } result.bitField0_ = to_bitField0_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest) { return mergeFrom( (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest other) { if (other == io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest .getDefaultInstance()) return this; if (other.hasMetadata()) { mergeMetadata(other.getMetadata()); } if (other.hasSpec()) { mergeSpec(other.getSpec()); } if (other.hasStatus()) { mergeStatus(other.getStatus()); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private io.kubernetes.client.proto.Meta.ObjectMeta metadata_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ObjectMeta, io.kubernetes.client.proto.Meta.ObjectMeta.Builder, io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder> metadataBuilder_; /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public boolean hasMetadata() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ObjectMeta getMetadata() { if (metadataBuilder_ == null) { return metadata_ == null ? io.kubernetes.client.proto.Meta.ObjectMeta.getDefaultInstance() : metadata_; } else { return metadataBuilder_.getMessage(); } } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public Builder setMetadata(io.kubernetes.client.proto.Meta.ObjectMeta value) { if (metadataBuilder_ == null) { if (value == null) { throw new NullPointerException(); } metadata_ = value; onChanged(); } else { metadataBuilder_.setMessage(value); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public Builder setMetadata( io.kubernetes.client.proto.Meta.ObjectMeta.Builder builderForValue) { if (metadataBuilder_ == null) { metadata_ = builderForValue.build(); onChanged(); } else { metadataBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public Builder mergeMetadata(io.kubernetes.client.proto.Meta.ObjectMeta value) { if (metadataBuilder_ == null) { if (((bitField0_ & 0x00000001) == 0x00000001) && metadata_ != null && metadata_ != io.kubernetes.client.proto.Meta.ObjectMeta.getDefaultInstance()) { metadata_ = io.kubernetes.client.proto.Meta.ObjectMeta.newBuilder(metadata_) .mergeFrom(value) .buildPartial(); } else { metadata_ = value; } onChanged(); } else { metadataBuilder_.mergeFrom(value); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public Builder clearMetadata() { if (metadataBuilder_ == null) { metadata_ = null; onChanged(); } else { metadataBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000001); return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ObjectMeta.Builder getMetadataBuilder() { bitField0_ |= 0x00000001; onChanged(); return getMetadataFieldBuilder().getBuilder(); } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder getMetadataOrBuilder() { if (metadataBuilder_ != null) { return metadataBuilder_.getMessageOrBuilder(); } else { return metadata_ == null ? io.kubernetes.client.proto.Meta.ObjectMeta.getDefaultInstance() : metadata_; } } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1; */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ObjectMeta, io.kubernetes.client.proto.Meta.ObjectMeta.Builder, io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder> getMetadataFieldBuilder() { if (metadataBuilder_ == null) { metadataBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ObjectMeta, io.kubernetes.client.proto.Meta.ObjectMeta.Builder, io.kubernetes.client.proto.Meta.ObjectMetaOrBuilder>( getMetadata(), getParentForChildren(), isClean()); metadata_ = null; } return metadataBuilder_; } private io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec spec_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder> specBuilder_; /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public boolean hasSpec() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getSpec() { if (specBuilder_ == null) { return spec_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance() : spec_; } else { return specBuilder_.getMessage(); } } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public Builder setSpec( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec value) { if (specBuilder_ == null) { if (value == null) { throw new NullPointerException(); } spec_ = value; onChanged(); } else { specBuilder_.setMessage(value); } bitField0_ |= 0x00000002; return this; } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public Builder setSpec( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder builderForValue) { if (specBuilder_ == null) { spec_ = builderForValue.build(); onChanged(); } else { specBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000002; return this; } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public Builder mergeSpec( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec value) { if (specBuilder_ == null) { if (((bitField0_ & 0x00000002) == 0x00000002) && spec_ != null && spec_ != io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance()) { spec_ = io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.newBuilder( spec_) .mergeFrom(value) .buildPartial(); } else { spec_ = value; } onChanged(); } else { specBuilder_.mergeFrom(value); } bitField0_ |= 0x00000002; return this; } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public Builder clearSpec() { if (specBuilder_ == null) { spec_ = null; onChanged(); } else { specBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000002); return this; } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder getSpecBuilder() { bitField0_ |= 0x00000002; onChanged(); return getSpecFieldBuilder().getBuilder(); } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder getSpecOrBuilder() { if (specBuilder_ != null) { return specBuilder_.getMessageOrBuilder(); } else { return spec_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance() : spec_; } } /** * * *
       * spec contains the certificate request, and is immutable after creation.
       * Only the request, signerName, expirationSeconds, and usages fields can be set on creation.
       * Other fields are derived by Kubernetes and cannot be modified by users.
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestSpec spec = 2; */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder> getSpecFieldBuilder() { if (specBuilder_ == null) { specBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder>( getSpec(), getParentForChildren(), isClean()); spec_ = null; } return specBuilder_; } private io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus status_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder> statusBuilder_; /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public boolean hasStatus() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getStatus() { if (statusBuilder_ == null) { return status_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance() : status_; } else { return statusBuilder_.getMessage(); } } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public Builder setStatus( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus value) { if (statusBuilder_ == null) { if (value == null) { throw new NullPointerException(); } status_ = value; onChanged(); } else { statusBuilder_.setMessage(value); } bitField0_ |= 0x00000004; return this; } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public Builder setStatus( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder builderForValue) { if (statusBuilder_ == null) { status_ = builderForValue.build(); onChanged(); } else { statusBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000004; return this; } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public Builder mergeStatus( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus value) { if (statusBuilder_ == null) { if (((bitField0_ & 0x00000004) == 0x00000004) && status_ != null && status_ != io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance()) { status_ = io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .newBuilder(status_) .mergeFrom(value) .buildPartial(); } else { status_ = value; } onChanged(); } else { statusBuilder_.mergeFrom(value); } bitField0_ |= 0x00000004; return this; } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public Builder clearStatus() { if (statusBuilder_ == null) { status_ = null; onChanged(); } else { statusBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000004); return this; } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder getStatusBuilder() { bitField0_ |= 0x00000004; onChanged(); return getStatusFieldBuilder().getBuilder(); } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder getStatusOrBuilder() { if (statusBuilder_ != null) { return statusBuilder_.getMessageOrBuilder(); } else { return status_ == null ? io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance() : status_; } } /** * * *
       * status contains information about whether the request is approved or denied,
       * and the certificate issued by the signer, or the failure condition indicating signer failure.
       * +optional
       * 
* * optional .k8s.io.api.certificates.v1.CertificateSigningRequestStatus status = 3; * */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder> getStatusFieldBuilder() { if (statusBuilder_ == null) { statusBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder, io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestStatusOrBuilder>( getStatus(), getParentForChildren(), isClean()); status_ = null; } return statusBuilder_; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.CertificateSigningRequest) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.CertificateSigningRequest) private static final io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest(); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public CertificateSigningRequest parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CertificateSigningRequest(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } public interface CertificateSigningRequestConditionOrBuilder extends // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.CertificateSigningRequestCondition) com.google.protobuf.MessageOrBuilder { /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ boolean hasType(); /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ java.lang.String getType(); /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ com.google.protobuf.ByteString getTypeBytes(); /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ boolean hasStatus(); /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ java.lang.String getStatus(); /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ com.google.protobuf.ByteString getStatusBytes(); /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ boolean hasReason(); /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ java.lang.String getReason(); /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ com.google.protobuf.ByteString getReasonBytes(); /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ boolean hasMessage(); /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ java.lang.String getMessage(); /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ com.google.protobuf.ByteString getMessageBytes(); /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ boolean hasLastUpdateTime(); /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ io.kubernetes.client.proto.Meta.Time getLastUpdateTime(); /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ io.kubernetes.client.proto.Meta.TimeOrBuilder getLastUpdateTimeOrBuilder(); /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ boolean hasLastTransitionTime(); /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ io.kubernetes.client.proto.Meta.Time getLastTransitionTime(); /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ io.kubernetes.client.proto.Meta.TimeOrBuilder getLastTransitionTimeOrBuilder(); } /** * * *
   * CertificateSigningRequestCondition describes a condition of a CertificateSigningRequest object
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestCondition} */ public static final class CertificateSigningRequestCondition extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.CertificateSigningRequestCondition) CertificateSigningRequestConditionOrBuilder { private static final long serialVersionUID = 0L; // Use CertificateSigningRequestCondition.newBuilder() to construct. private CertificateSigningRequestCondition( com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CertificateSigningRequestCondition() { type_ = ""; status_ = ""; reason_ = ""; message_ = ""; } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CertificateSigningRequestCondition( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000001; type_ = bs; break; } case 18: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000004; reason_ = bs; break; } case 26: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000008; message_ = bs; break; } case 34: { io.kubernetes.client.proto.Meta.Time.Builder subBuilder = null; if (((bitField0_ & 0x00000010) == 0x00000010)) { subBuilder = lastUpdateTime_.toBuilder(); } lastUpdateTime_ = input.readMessage( io.kubernetes.client.proto.Meta.Time.PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(lastUpdateTime_); lastUpdateTime_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000010; break; } case 42: { io.kubernetes.client.proto.Meta.Time.Builder subBuilder = null; if (((bitField0_ & 0x00000020) == 0x00000020)) { subBuilder = lastTransitionTime_.toBuilder(); } lastTransitionTime_ = input.readMessage( io.kubernetes.client.proto.Meta.Time.PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(lastTransitionTime_); lastTransitionTime_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000020; break; } case 50: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000002; status_ = bs; break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder .class); } private int bitField0_; public static final int TYPE_FIELD_NUMBER = 1; private volatile java.lang.Object type_; /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ public boolean hasType() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ public java.lang.String getType() { java.lang.Object ref = type_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { type_ = s; } return s; } } /** * * *
     * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
     * An "Approved" condition is added via the /approval subresource,
     * indicating the request was approved and should be issued by the signer.
     * A "Denied" condition is added via the /approval subresource,
     * indicating the request was denied and should not be issued by the signer.
     * A "Failed" condition is added via the /status subresource,
     * indicating the signer failed to issue the certificate.
     * Approved and Denied conditions are mutually exclusive.
     * Approved, Denied, and Failed conditions cannot be removed once added.
     * Only one condition of a given type is allowed.
     * 
* * optional string type = 1; */ public com.google.protobuf.ByteString getTypeBytes() { java.lang.Object ref = type_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); type_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int STATUS_FIELD_NUMBER = 6; private volatile java.lang.Object status_; /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ public boolean hasStatus() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ public java.lang.String getStatus() { java.lang.Object ref = status_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { status_ = s; } return s; } } /** * * *
     * status of the condition, one of True, False, Unknown.
     * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
     * 
* * optional string status = 6; */ public com.google.protobuf.ByteString getStatusBytes() { java.lang.Object ref = status_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); status_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int REASON_FIELD_NUMBER = 2; private volatile java.lang.Object reason_; /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ public boolean hasReason() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ public java.lang.String getReason() { java.lang.Object ref = reason_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { reason_ = s; } return s; } } /** * * *
     * reason indicates a brief reason for the request state
     * +optional
     * 
* * optional string reason = 2; */ public com.google.protobuf.ByteString getReasonBytes() { java.lang.Object ref = reason_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); reason_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int MESSAGE_FIELD_NUMBER = 3; private volatile java.lang.Object message_; /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ public boolean hasMessage() { return ((bitField0_ & 0x00000008) == 0x00000008); } /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ public java.lang.String getMessage() { java.lang.Object ref = message_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { message_ = s; } return s; } } /** * * *
     * message contains a human readable message with details about the request state
     * +optional
     * 
* * optional string message = 3; */ public com.google.protobuf.ByteString getMessageBytes() { java.lang.Object ref = message_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); message_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int LASTUPDATETIME_FIELD_NUMBER = 4; private io.kubernetes.client.proto.Meta.Time lastUpdateTime_; /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public boolean hasLastUpdateTime() { return ((bitField0_ & 0x00000010) == 0x00000010); } /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public io.kubernetes.client.proto.Meta.Time getLastUpdateTime() { return lastUpdateTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastUpdateTime_; } /** * * *
     * lastUpdateTime is the time of the last update to this condition
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public io.kubernetes.client.proto.Meta.TimeOrBuilder getLastUpdateTimeOrBuilder() { return lastUpdateTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastUpdateTime_; } public static final int LASTTRANSITIONTIME_FIELD_NUMBER = 5; private io.kubernetes.client.proto.Meta.Time lastTransitionTime_; /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public boolean hasLastTransitionTime() { return ((bitField0_ & 0x00000020) == 0x00000020); } /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public io.kubernetes.client.proto.Meta.Time getLastTransitionTime() { return lastTransitionTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastTransitionTime_; } /** * * *
     * lastTransitionTime is the time the condition last transitioned from one status to another.
     * If unset, when a new condition type is added or an existing condition's status is changed,
     * the server defaults this to the current time.
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public io.kubernetes.client.proto.Meta.TimeOrBuilder getLastTransitionTimeOrBuilder() { return lastTransitionTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastTransitionTime_; } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (((bitField0_ & 0x00000001) == 0x00000001)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, type_); } if (((bitField0_ & 0x00000004) == 0x00000004)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, reason_); } if (((bitField0_ & 0x00000008) == 0x00000008)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, message_); } if (((bitField0_ & 0x00000010) == 0x00000010)) { output.writeMessage(4, getLastUpdateTime()); } if (((bitField0_ & 0x00000020) == 0x00000020)) { output.writeMessage(5, getLastTransitionTime()); } if (((bitField0_ & 0x00000002) == 0x00000002)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 6, status_); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (((bitField0_ & 0x00000001) == 0x00000001)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, type_); } if (((bitField0_ & 0x00000004) == 0x00000004)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, reason_); } if (((bitField0_ & 0x00000008) == 0x00000008)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, message_); } if (((bitField0_ & 0x00000010) == 0x00000010)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(4, getLastUpdateTime()); } if (((bitField0_ & 0x00000020) == 0x00000020)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(5, getLastTransitionTime()); } if (((bitField0_ & 0x00000002) == 0x00000002)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, status_); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition other = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition) obj; boolean result = true; result = result && (hasType() == other.hasType()); if (hasType()) { result = result && getType().equals(other.getType()); } result = result && (hasStatus() == other.hasStatus()); if (hasStatus()) { result = result && getStatus().equals(other.getStatus()); } result = result && (hasReason() == other.hasReason()); if (hasReason()) { result = result && getReason().equals(other.getReason()); } result = result && (hasMessage() == other.hasMessage()); if (hasMessage()) { result = result && getMessage().equals(other.getMessage()); } result = result && (hasLastUpdateTime() == other.hasLastUpdateTime()); if (hasLastUpdateTime()) { result = result && getLastUpdateTime().equals(other.getLastUpdateTime()); } result = result && (hasLastTransitionTime() == other.hasLastTransitionTime()); if (hasLastTransitionTime()) { result = result && getLastTransitionTime().equals(other.getLastTransitionTime()); } result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasType()) { hash = (37 * hash) + TYPE_FIELD_NUMBER; hash = (53 * hash) + getType().hashCode(); } if (hasStatus()) { hash = (37 * hash) + STATUS_FIELD_NUMBER; hash = (53 * hash) + getStatus().hashCode(); } if (hasReason()) { hash = (37 * hash) + REASON_FIELD_NUMBER; hash = (53 * hash) + getReason().hashCode(); } if (hasMessage()) { hash = (37 * hash) + MESSAGE_FIELD_NUMBER; hash = (53 * hash) + getMessage().hashCode(); } if (hasLastUpdateTime()) { hash = (37 * hash) + LASTUPDATETIME_FIELD_NUMBER; hash = (53 * hash) + getLastUpdateTime().hashCode(); } if (hasLastTransitionTime()) { hash = (37 * hash) + LASTTRANSITIONTIME_FIELD_NUMBER; hash = (53 * hash) + getLastTransitionTime().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom(com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * CertificateSigningRequestCondition describes a condition of a CertificateSigningRequest object
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestCondition} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.CertificateSigningRequestCondition) io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder .class); } // Construct using // io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getLastUpdateTimeFieldBuilder(); getLastTransitionTimeFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); type_ = ""; bitField0_ = (bitField0_ & ~0x00000001); status_ = ""; bitField0_ = (bitField0_ & ~0x00000002); reason_ = ""; bitField0_ = (bitField0_ & ~0x00000004); message_ = ""; bitField0_ = (bitField0_ & ~0x00000008); if (lastUpdateTimeBuilder_ == null) { lastUpdateTime_ = null; } else { lastUpdateTimeBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000010); if (lastTransitionTimeBuilder_ == null) { lastTransitionTime_ = null; } else { lastTransitionTimeBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000020); return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition build() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition buildPartial() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition result = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (((from_bitField0_ & 0x00000001) == 0x00000001)) { to_bitField0_ |= 0x00000001; } result.type_ = type_; if (((from_bitField0_ & 0x00000002) == 0x00000002)) { to_bitField0_ |= 0x00000002; } result.status_ = status_; if (((from_bitField0_ & 0x00000004) == 0x00000004)) { to_bitField0_ |= 0x00000004; } result.reason_ = reason_; if (((from_bitField0_ & 0x00000008) == 0x00000008)) { to_bitField0_ |= 0x00000008; } result.message_ = message_; if (((from_bitField0_ & 0x00000010) == 0x00000010)) { to_bitField0_ |= 0x00000010; } if (lastUpdateTimeBuilder_ == null) { result.lastUpdateTime_ = lastUpdateTime_; } else { result.lastUpdateTime_ = lastUpdateTimeBuilder_.build(); } if (((from_bitField0_ & 0x00000020) == 0x00000020)) { to_bitField0_ |= 0x00000020; } if (lastTransitionTimeBuilder_ == null) { result.lastTransitionTime_ = lastTransitionTime_; } else { result.lastTransitionTime_ = lastTransitionTimeBuilder_.build(); } result.bitField0_ = to_bitField0_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition) { return mergeFrom( (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition other) { if (other == io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .getDefaultInstance()) return this; if (other.hasType()) { bitField0_ |= 0x00000001; type_ = other.type_; onChanged(); } if (other.hasStatus()) { bitField0_ |= 0x00000002; status_ = other.status_; onChanged(); } if (other.hasReason()) { bitField0_ |= 0x00000004; reason_ = other.reason_; onChanged(); } if (other.hasMessage()) { bitField0_ |= 0x00000008; message_ = other.message_; onChanged(); } if (other.hasLastUpdateTime()) { mergeLastUpdateTime(other.getLastUpdateTime()); } if (other.hasLastTransitionTime()) { mergeLastTransitionTime(other.getLastTransitionTime()); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private java.lang.Object type_ = ""; /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public boolean hasType() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public java.lang.String getType() { java.lang.Object ref = type_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { type_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public com.google.protobuf.ByteString getTypeBytes() { java.lang.Object ref = type_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); type_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public Builder setType(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000001; type_ = value; onChanged(); return this; } /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public Builder clearType() { bitField0_ = (bitField0_ & ~0x00000001); type_ = getDefaultInstance().getType(); onChanged(); return this; } /** * * *
       * type of the condition. Known conditions are "Approved", "Denied", and "Failed".
       * An "Approved" condition is added via the /approval subresource,
       * indicating the request was approved and should be issued by the signer.
       * A "Denied" condition is added via the /approval subresource,
       * indicating the request was denied and should not be issued by the signer.
       * A "Failed" condition is added via the /status subresource,
       * indicating the signer failed to issue the certificate.
       * Approved and Denied conditions are mutually exclusive.
       * Approved, Denied, and Failed conditions cannot be removed once added.
       * Only one condition of a given type is allowed.
       * 
* * optional string type = 1; */ public Builder setTypeBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000001; type_ = value; onChanged(); return this; } private java.lang.Object status_ = ""; /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public boolean hasStatus() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public java.lang.String getStatus() { java.lang.Object ref = status_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { status_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public com.google.protobuf.ByteString getStatusBytes() { java.lang.Object ref = status_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); status_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public Builder setStatus(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000002; status_ = value; onChanged(); return this; } /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public Builder clearStatus() { bitField0_ = (bitField0_ & ~0x00000002); status_ = getDefaultInstance().getStatus(); onChanged(); return this; } /** * * *
       * status of the condition, one of True, False, Unknown.
       * Approved, Denied, and Failed conditions may not be "False" or "Unknown".
       * 
* * optional string status = 6; */ public Builder setStatusBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000002; status_ = value; onChanged(); return this; } private java.lang.Object reason_ = ""; /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public boolean hasReason() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public java.lang.String getReason() { java.lang.Object ref = reason_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { reason_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public com.google.protobuf.ByteString getReasonBytes() { java.lang.Object ref = reason_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); reason_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public Builder setReason(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000004; reason_ = value; onChanged(); return this; } /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public Builder clearReason() { bitField0_ = (bitField0_ & ~0x00000004); reason_ = getDefaultInstance().getReason(); onChanged(); return this; } /** * * *
       * reason indicates a brief reason for the request state
       * +optional
       * 
* * optional string reason = 2; */ public Builder setReasonBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000004; reason_ = value; onChanged(); return this; } private java.lang.Object message_ = ""; /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public boolean hasMessage() { return ((bitField0_ & 0x00000008) == 0x00000008); } /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public java.lang.String getMessage() { java.lang.Object ref = message_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { message_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public com.google.protobuf.ByteString getMessageBytes() { java.lang.Object ref = message_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); message_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public Builder setMessage(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000008; message_ = value; onChanged(); return this; } /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public Builder clearMessage() { bitField0_ = (bitField0_ & ~0x00000008); message_ = getDefaultInstance().getMessage(); onChanged(); return this; } /** * * *
       * message contains a human readable message with details about the request state
       * +optional
       * 
* * optional string message = 3; */ public Builder setMessageBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000008; message_ = value; onChanged(); return this; } private io.kubernetes.client.proto.Meta.Time lastUpdateTime_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder> lastUpdateTimeBuilder_; /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public boolean hasLastUpdateTime() { return ((bitField0_ & 0x00000010) == 0x00000010); } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public io.kubernetes.client.proto.Meta.Time getLastUpdateTime() { if (lastUpdateTimeBuilder_ == null) { return lastUpdateTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastUpdateTime_; } else { return lastUpdateTimeBuilder_.getMessage(); } } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public Builder setLastUpdateTime(io.kubernetes.client.proto.Meta.Time value) { if (lastUpdateTimeBuilder_ == null) { if (value == null) { throw new NullPointerException(); } lastUpdateTime_ = value; onChanged(); } else { lastUpdateTimeBuilder_.setMessage(value); } bitField0_ |= 0x00000010; return this; } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public Builder setLastUpdateTime( io.kubernetes.client.proto.Meta.Time.Builder builderForValue) { if (lastUpdateTimeBuilder_ == null) { lastUpdateTime_ = builderForValue.build(); onChanged(); } else { lastUpdateTimeBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000010; return this; } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public Builder mergeLastUpdateTime(io.kubernetes.client.proto.Meta.Time value) { if (lastUpdateTimeBuilder_ == null) { if (((bitField0_ & 0x00000010) == 0x00000010) && lastUpdateTime_ != null && lastUpdateTime_ != io.kubernetes.client.proto.Meta.Time.getDefaultInstance()) { lastUpdateTime_ = io.kubernetes.client.proto.Meta.Time.newBuilder(lastUpdateTime_) .mergeFrom(value) .buildPartial(); } else { lastUpdateTime_ = value; } onChanged(); } else { lastUpdateTimeBuilder_.mergeFrom(value); } bitField0_ |= 0x00000010; return this; } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public Builder clearLastUpdateTime() { if (lastUpdateTimeBuilder_ == null) { lastUpdateTime_ = null; onChanged(); } else { lastUpdateTimeBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000010); return this; } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public io.kubernetes.client.proto.Meta.Time.Builder getLastUpdateTimeBuilder() { bitField0_ |= 0x00000010; onChanged(); return getLastUpdateTimeFieldBuilder().getBuilder(); } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ public io.kubernetes.client.proto.Meta.TimeOrBuilder getLastUpdateTimeOrBuilder() { if (lastUpdateTimeBuilder_ != null) { return lastUpdateTimeBuilder_.getMessageOrBuilder(); } else { return lastUpdateTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastUpdateTime_; } } /** * * *
       * lastUpdateTime is the time of the last update to this condition
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastUpdateTime = 4; */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder> getLastUpdateTimeFieldBuilder() { if (lastUpdateTimeBuilder_ == null) { lastUpdateTimeBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder>( getLastUpdateTime(), getParentForChildren(), isClean()); lastUpdateTime_ = null; } return lastUpdateTimeBuilder_; } private io.kubernetes.client.proto.Meta.Time lastTransitionTime_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder> lastTransitionTimeBuilder_; /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public boolean hasLastTransitionTime() { return ((bitField0_ & 0x00000020) == 0x00000020); } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public io.kubernetes.client.proto.Meta.Time getLastTransitionTime() { if (lastTransitionTimeBuilder_ == null) { return lastTransitionTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastTransitionTime_; } else { return lastTransitionTimeBuilder_.getMessage(); } } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public Builder setLastTransitionTime(io.kubernetes.client.proto.Meta.Time value) { if (lastTransitionTimeBuilder_ == null) { if (value == null) { throw new NullPointerException(); } lastTransitionTime_ = value; onChanged(); } else { lastTransitionTimeBuilder_.setMessage(value); } bitField0_ |= 0x00000020; return this; } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public Builder setLastTransitionTime( io.kubernetes.client.proto.Meta.Time.Builder builderForValue) { if (lastTransitionTimeBuilder_ == null) { lastTransitionTime_ = builderForValue.build(); onChanged(); } else { lastTransitionTimeBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000020; return this; } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public Builder mergeLastTransitionTime(io.kubernetes.client.proto.Meta.Time value) { if (lastTransitionTimeBuilder_ == null) { if (((bitField0_ & 0x00000020) == 0x00000020) && lastTransitionTime_ != null && lastTransitionTime_ != io.kubernetes.client.proto.Meta.Time.getDefaultInstance()) { lastTransitionTime_ = io.kubernetes.client.proto.Meta.Time.newBuilder(lastTransitionTime_) .mergeFrom(value) .buildPartial(); } else { lastTransitionTime_ = value; } onChanged(); } else { lastTransitionTimeBuilder_.mergeFrom(value); } bitField0_ |= 0x00000020; return this; } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public Builder clearLastTransitionTime() { if (lastTransitionTimeBuilder_ == null) { lastTransitionTime_ = null; onChanged(); } else { lastTransitionTimeBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000020); return this; } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public io.kubernetes.client.proto.Meta.Time.Builder getLastTransitionTimeBuilder() { bitField0_ |= 0x00000020; onChanged(); return getLastTransitionTimeFieldBuilder().getBuilder(); } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ public io.kubernetes.client.proto.Meta.TimeOrBuilder getLastTransitionTimeOrBuilder() { if (lastTransitionTimeBuilder_ != null) { return lastTransitionTimeBuilder_.getMessageOrBuilder(); } else { return lastTransitionTime_ == null ? io.kubernetes.client.proto.Meta.Time.getDefaultInstance() : lastTransitionTime_; } } /** * * *
       * lastTransitionTime is the time the condition last transitioned from one status to another.
       * If unset, when a new condition type is added or an existing condition's status is changed,
       * the server defaults this to the current time.
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.Time lastTransitionTime = 5; */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder> getLastTransitionTimeFieldBuilder() { if (lastTransitionTimeBuilder_ == null) { lastTransitionTimeBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.Time, io.kubernetes.client.proto.Meta.Time.Builder, io.kubernetes.client.proto.Meta.TimeOrBuilder>( getLastTransitionTime(), getParentForChildren(), isClean()); lastTransitionTime_ = null; } return lastTransitionTimeBuilder_; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.CertificateSigningRequestCondition) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.CertificateSigningRequestCondition) private static final io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestCondition DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition(); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public CertificateSigningRequestCondition parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CertificateSigningRequestCondition(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } public interface CertificateSigningRequestListOrBuilder extends // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.CertificateSigningRequestList) com.google.protobuf.MessageOrBuilder { /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ boolean hasMetadata(); /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ io.kubernetes.client.proto.Meta.ListMeta getMetadata(); /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ io.kubernetes.client.proto.Meta.ListMetaOrBuilder getMetadataOrBuilder(); /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ java.util.List getItemsList(); /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getItems(int index); /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ int getItemsCount(); /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ java.util.List< ? extends io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder> getItemsOrBuilderList(); /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder getItemsOrBuilder( int index); } /** * * *
   * CertificateSigningRequestList is a collection of CertificateSigningRequest objects
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestList} */ public static final class CertificateSigningRequestList extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.CertificateSigningRequestList) CertificateSigningRequestListOrBuilder { private static final long serialVersionUID = 0L; // Use CertificateSigningRequestList.newBuilder() to construct. private CertificateSigningRequestList( com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CertificateSigningRequestList() { items_ = java.util.Collections.emptyList(); } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CertificateSigningRequestList( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { io.kubernetes.client.proto.Meta.ListMeta.Builder subBuilder = null; if (((bitField0_ & 0x00000001) == 0x00000001)) { subBuilder = metadata_.toBuilder(); } metadata_ = input.readMessage( io.kubernetes.client.proto.Meta.ListMeta.PARSER, extensionRegistry); if (subBuilder != null) { subBuilder.mergeFrom(metadata_); metadata_ = subBuilder.buildPartial(); } bitField0_ |= 0x00000001; break; } case 18: { if (!((mutable_bitField0_ & 0x00000002) == 0x00000002)) { items_ = new java.util.ArrayList< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest>(); mutable_bitField0_ |= 0x00000002; } items_.add( input.readMessage( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.PARSER, extensionRegistry)); break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000002) == 0x00000002)) { items_ = java.util.Collections.unmodifiableList(items_); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList.Builder .class); } private int bitField0_; public static final int METADATA_FIELD_NUMBER = 1; private io.kubernetes.client.proto.Meta.ListMeta metadata_; /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public boolean hasMetadata() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ListMeta getMetadata() { return metadata_ == null ? io.kubernetes.client.proto.Meta.ListMeta.getDefaultInstance() : metadata_; } /** * * *
     * +optional
     * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ListMetaOrBuilder getMetadataOrBuilder() { return metadata_ == null ? io.kubernetes.client.proto.Meta.ListMeta.getDefaultInstance() : metadata_; } public static final int ITEMS_FIELD_NUMBER = 2; private java.util.List items_; /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public java.util.List getItemsList() { return items_; } /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public java.util.List< ? extends io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder> getItemsOrBuilderList() { return items_; } /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public int getItemsCount() { return items_.size(); } /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getItems(int index) { return items_.get(index); } /** * * *
     * items is a collection of CertificateSigningRequest objects
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder getItemsOrBuilder(int index) { return items_.get(index); } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (((bitField0_ & 0x00000001) == 0x00000001)) { output.writeMessage(1, getMetadata()); } for (int i = 0; i < items_.size(); i++) { output.writeMessage(2, items_.get(i)); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (((bitField0_ & 0x00000001) == 0x00000001)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, getMetadata()); } for (int i = 0; i < items_.size(); i++) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(2, items_.get(i)); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList other = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList) obj; boolean result = true; result = result && (hasMetadata() == other.hasMetadata()); if (hasMetadata()) { result = result && getMetadata().equals(other.getMetadata()); } result = result && getItemsList().equals(other.getItemsList()); result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasMetadata()) { hash = (37 * hash) + METADATA_FIELD_NUMBER; hash = (53 * hash) + getMetadata().hashCode(); } if (getItemsCount() > 0) { hash = (37 * hash) + ITEMS_FIELD_NUMBER; hash = (53 * hash) + getItemsList().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * CertificateSigningRequestList is a collection of CertificateSigningRequest objects
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestList} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.CertificateSigningRequestList) io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestListOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList.Builder .class); } // Construct using // io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getMetadataFieldBuilder(); getItemsFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); if (metadataBuilder_ == null) { metadata_ = null; } else { metadataBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000001); if (itemsBuilder_ == null) { items_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000002); } else { itemsBuilder_.clear(); } return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList .getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList build() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList buildPartial() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList result = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (((from_bitField0_ & 0x00000001) == 0x00000001)) { to_bitField0_ |= 0x00000001; } if (metadataBuilder_ == null) { result.metadata_ = metadata_; } else { result.metadata_ = metadataBuilder_.build(); } if (itemsBuilder_ == null) { if (((bitField0_ & 0x00000002) == 0x00000002)) { items_ = java.util.Collections.unmodifiableList(items_); bitField0_ = (bitField0_ & ~0x00000002); } result.items_ = items_; } else { result.items_ = itemsBuilder_.build(); } result.bitField0_ = to_bitField0_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList) { return mergeFrom( (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList other) { if (other == io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList .getDefaultInstance()) return this; if (other.hasMetadata()) { mergeMetadata(other.getMetadata()); } if (itemsBuilder_ == null) { if (!other.items_.isEmpty()) { if (items_.isEmpty()) { items_ = other.items_; bitField0_ = (bitField0_ & ~0x00000002); } else { ensureItemsIsMutable(); items_.addAll(other.items_); } onChanged(); } } else { if (!other.items_.isEmpty()) { if (itemsBuilder_.isEmpty()) { itemsBuilder_.dispose(); itemsBuilder_ = null; items_ = other.items_; bitField0_ = (bitField0_ & ~0x00000002); itemsBuilder_ = com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders ? getItemsFieldBuilder() : null; } else { itemsBuilder_.addAllMessages(other.items_); } } } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private io.kubernetes.client.proto.Meta.ListMeta metadata_ = null; private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ListMeta, io.kubernetes.client.proto.Meta.ListMeta.Builder, io.kubernetes.client.proto.Meta.ListMetaOrBuilder> metadataBuilder_; /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public boolean hasMetadata() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ListMeta getMetadata() { if (metadataBuilder_ == null) { return metadata_ == null ? io.kubernetes.client.proto.Meta.ListMeta.getDefaultInstance() : metadata_; } else { return metadataBuilder_.getMessage(); } } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public Builder setMetadata(io.kubernetes.client.proto.Meta.ListMeta value) { if (metadataBuilder_ == null) { if (value == null) { throw new NullPointerException(); } metadata_ = value; onChanged(); } else { metadataBuilder_.setMessage(value); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public Builder setMetadata(io.kubernetes.client.proto.Meta.ListMeta.Builder builderForValue) { if (metadataBuilder_ == null) { metadata_ = builderForValue.build(); onChanged(); } else { metadataBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public Builder mergeMetadata(io.kubernetes.client.proto.Meta.ListMeta value) { if (metadataBuilder_ == null) { if (((bitField0_ & 0x00000001) == 0x00000001) && metadata_ != null && metadata_ != io.kubernetes.client.proto.Meta.ListMeta.getDefaultInstance()) { metadata_ = io.kubernetes.client.proto.Meta.ListMeta.newBuilder(metadata_) .mergeFrom(value) .buildPartial(); } else { metadata_ = value; } onChanged(); } else { metadataBuilder_.mergeFrom(value); } bitField0_ |= 0x00000001; return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public Builder clearMetadata() { if (metadataBuilder_ == null) { metadata_ = null; onChanged(); } else { metadataBuilder_.clear(); } bitField0_ = (bitField0_ & ~0x00000001); return this; } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ListMeta.Builder getMetadataBuilder() { bitField0_ |= 0x00000001; onChanged(); return getMetadataFieldBuilder().getBuilder(); } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ public io.kubernetes.client.proto.Meta.ListMetaOrBuilder getMetadataOrBuilder() { if (metadataBuilder_ != null) { return metadataBuilder_.getMessageOrBuilder(); } else { return metadata_ == null ? io.kubernetes.client.proto.Meta.ListMeta.getDefaultInstance() : metadata_; } } /** * * *
       * +optional
       * 
* * optional .k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1; */ private com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ListMeta, io.kubernetes.client.proto.Meta.ListMeta.Builder, io.kubernetes.client.proto.Meta.ListMetaOrBuilder> getMetadataFieldBuilder() { if (metadataBuilder_ == null) { metadataBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< io.kubernetes.client.proto.Meta.ListMeta, io.kubernetes.client.proto.Meta.ListMeta.Builder, io.kubernetes.client.proto.Meta.ListMetaOrBuilder>( getMetadata(), getParentForChildren(), isClean()); metadata_ = null; } return metadataBuilder_; } private java.util.List items_ = java.util.Collections.emptyList(); private void ensureItemsIsMutable() { if (!((bitField0_ & 0x00000002) == 0x00000002)) { items_ = new java.util.ArrayList< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest>(items_); bitField0_ |= 0x00000002; } } private com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder> itemsBuilder_; /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public java.util.List getItemsList() { if (itemsBuilder_ == null) { return java.util.Collections.unmodifiableList(items_); } else { return itemsBuilder_.getMessageList(); } } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public int getItemsCount() { if (itemsBuilder_ == null) { return items_.size(); } else { return itemsBuilder_.getCount(); } } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest getItems( int index) { if (itemsBuilder_ == null) { return items_.get(index); } else { return itemsBuilder_.getMessage(index); } } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder setItems( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest value) { if (itemsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.set(index, value); onChanged(); } else { itemsBuilder_.setMessage(index, value); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder setItems( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder builderForValue) { if (itemsBuilder_ == null) { ensureItemsIsMutable(); items_.set(index, builderForValue.build()); onChanged(); } else { itemsBuilder_.setMessage(index, builderForValue.build()); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder addItems( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest value) { if (itemsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.add(value); onChanged(); } else { itemsBuilder_.addMessage(value); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder addItems( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest value) { if (itemsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.add(index, value); onChanged(); } else { itemsBuilder_.addMessage(index, value); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder addItems( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder builderForValue) { if (itemsBuilder_ == null) { ensureItemsIsMutable(); items_.add(builderForValue.build()); onChanged(); } else { itemsBuilder_.addMessage(builderForValue.build()); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder addItems( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder builderForValue) { if (itemsBuilder_ == null) { ensureItemsIsMutable(); items_.add(index, builderForValue.build()); onChanged(); } else { itemsBuilder_.addMessage(index, builderForValue.build()); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder addAllItems( java.lang.Iterable< ? extends io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest> values) { if (itemsBuilder_ == null) { ensureItemsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll(values, items_); onChanged(); } else { itemsBuilder_.addAllMessages(values); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder clearItems() { if (itemsBuilder_ == null) { items_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000002); onChanged(); } else { itemsBuilder_.clear(); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public Builder removeItems(int index) { if (itemsBuilder_ == null) { ensureItemsIsMutable(); items_.remove(index); onChanged(); } else { itemsBuilder_.remove(index); } return this; } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder getItemsBuilder(int index) { return getItemsFieldBuilder().getBuilder(index); } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder getItemsOrBuilder(int index) { if (itemsBuilder_ == null) { return items_.get(index); } else { return itemsBuilder_.getMessageOrBuilder(index); } } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public java.util.List< ? extends io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder> getItemsOrBuilderList() { if (itemsBuilder_ != null) { return itemsBuilder_.getMessageOrBuilderList(); } else { return java.util.Collections.unmodifiableList(items_); } } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder addItemsBuilder() { return getItemsFieldBuilder() .addBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest .getDefaultInstance()); } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder addItemsBuilder(int index) { return getItemsFieldBuilder() .addBuilder( index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest .getDefaultInstance()); } /** * * *
       * items is a collection of CertificateSigningRequest objects
       * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequest items = 2; */ public java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder> getItemsBuilderList() { return getItemsFieldBuilder().getBuilderList(); } private com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder> getItemsFieldBuilder() { if (itemsBuilder_ == null) { itemsBuilder_ = new com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequest.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestOrBuilder>( items_, ((bitField0_ & 0x00000002) == 0x00000002), getParentForChildren(), isClean()); items_ = null; } return itemsBuilder_; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.CertificateSigningRequestList) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.CertificateSigningRequestList) private static final io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList(); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public CertificateSigningRequestList parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CertificateSigningRequestList(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestList getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } public interface CertificateSigningRequestSpecOrBuilder extends // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.CertificateSigningRequestSpec) com.google.protobuf.MessageOrBuilder { /** * * *
     * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
     * When serialized as JSON or YAML, the data is additionally base64-encoded.
     * +listType=atomic
     * 
* * optional bytes request = 1; */ boolean hasRequest(); /** * * *
     * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
     * When serialized as JSON or YAML, the data is additionally base64-encoded.
     * +listType=atomic
     * 
* * optional bytes request = 1; */ com.google.protobuf.ByteString getRequest(); /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ boolean hasSignerName(); /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ java.lang.String getSignerName(); /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ com.google.protobuf.ByteString getSignerNameBytes(); /** * * *
     * expirationSeconds is the requested duration of validity of the issued
     * certificate. The certificate signer may issue a certificate with a different
     * validity duration so a client must check the delta between the notBefore and
     * and notAfter fields in the issued certificate to determine the actual duration.
     * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
     * honor this field as long as the requested duration is not greater than the
     * maximum duration they will honor per the --cluster-signing-duration CLI
     * flag to the Kubernetes controller manager.
     * Certificate signers may not honor this field for various reasons:
     *   1. Old signer that is unaware of the field (such as the in-tree
     *      implementations prior to v1.22)
     *   2. Signer whose configured maximum is shorter than the requested duration
     *   3. Signer whose configured minimum is longer than the requested duration
     * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
     * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
     * +optional
     * 
* * optional int32 expirationSeconds = 8; */ boolean hasExpirationSeconds(); /** * * *
     * expirationSeconds is the requested duration of validity of the issued
     * certificate. The certificate signer may issue a certificate with a different
     * validity duration so a client must check the delta between the notBefore and
     * and notAfter fields in the issued certificate to determine the actual duration.
     * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
     * honor this field as long as the requested duration is not greater than the
     * maximum duration they will honor per the --cluster-signing-duration CLI
     * flag to the Kubernetes controller manager.
     * Certificate signers may not honor this field for various reasons:
     *   1. Old signer that is unaware of the field (such as the in-tree
     *      implementations prior to v1.22)
     *   2. Signer whose configured maximum is shorter than the requested duration
     *   3. Signer whose configured minimum is longer than the requested duration
     * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
     * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
     * +optional
     * 
* * optional int32 expirationSeconds = 8; */ int getExpirationSeconds(); /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ java.util.List getUsagesList(); /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ int getUsagesCount(); /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ java.lang.String getUsages(int index); /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ com.google.protobuf.ByteString getUsagesBytes(int index); /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ boolean hasUsername(); /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ java.lang.String getUsername(); /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ com.google.protobuf.ByteString getUsernameBytes(); /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ boolean hasUid(); /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ java.lang.String getUid(); /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ com.google.protobuf.ByteString getUidBytes(); /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ java.util.List getGroupsList(); /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ int getGroupsCount(); /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ java.lang.String getGroups(int index); /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ com.google.protobuf.ByteString getGroupsBytes(int index); /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ int getExtraCount(); /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ boolean containsExtra(java.lang.String key); /** Use {@link #getExtraMap()} instead. */ @java.lang.Deprecated java.util.Map getExtra(); /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ java.util.Map getExtraMap(); /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrDefault( java.lang.String key, io.kubernetes.client.proto.V1Certificates.ExtraValue defaultValue); /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrThrow(java.lang.String key); } /** * * *
   * CertificateSigningRequestSpec contains the certificate request.
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestSpec} */ public static final class CertificateSigningRequestSpec extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.CertificateSigningRequestSpec) CertificateSigningRequestSpecOrBuilder { private static final long serialVersionUID = 0L; // Use CertificateSigningRequestSpec.newBuilder() to construct. private CertificateSigningRequestSpec( com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CertificateSigningRequestSpec() { request_ = com.google.protobuf.ByteString.EMPTY; signerName_ = ""; expirationSeconds_ = 0; usages_ = com.google.protobuf.LazyStringArrayList.EMPTY; username_ = ""; uid_ = ""; groups_ = com.google.protobuf.LazyStringArrayList.EMPTY; } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CertificateSigningRequestSpec( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { bitField0_ |= 0x00000001; request_ = input.readBytes(); break; } case 18: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000008; username_ = bs; break; } case 26: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000010; uid_ = bs; break; } case 34: { com.google.protobuf.ByteString bs = input.readBytes(); if (!((mutable_bitField0_ & 0x00000040) == 0x00000040)) { groups_ = new com.google.protobuf.LazyStringArrayList(); mutable_bitField0_ |= 0x00000040; } groups_.add(bs); break; } case 42: { com.google.protobuf.ByteString bs = input.readBytes(); if (!((mutable_bitField0_ & 0x00000008) == 0x00000008)) { usages_ = new com.google.protobuf.LazyStringArrayList(); mutable_bitField0_ |= 0x00000008; } usages_.add(bs); break; } case 50: { if (!((mutable_bitField0_ & 0x00000080) == 0x00000080)) { extra_ = com.google.protobuf.MapField.newMapField( ExtraDefaultEntryHolder.defaultEntry); mutable_bitField0_ |= 0x00000080; } com.google.protobuf.MapEntry< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> extra__ = input.readMessage( ExtraDefaultEntryHolder.defaultEntry.getParserForType(), extensionRegistry); extra_.getMutableMap().put(extra__.getKey(), extra__.getValue()); break; } case 58: { com.google.protobuf.ByteString bs = input.readBytes(); bitField0_ |= 0x00000002; signerName_ = bs; break; } case 64: { bitField0_ |= 0x00000004; expirationSeconds_ = input.readInt32(); break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000040) == 0x00000040)) { groups_ = groups_.getUnmodifiableView(); } if (((mutable_bitField0_ & 0x00000008) == 0x00000008)) { usages_ = usages_.getUnmodifiableView(); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor; } @SuppressWarnings({"rawtypes"}) @java.lang.Override protected com.google.protobuf.MapField internalGetMapField(int number) { switch (number) { case 6: return internalGetExtra(); default: throw new RuntimeException("Invalid map field number: " + number); } } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder .class); } private int bitField0_; public static final int REQUEST_FIELD_NUMBER = 1; private com.google.protobuf.ByteString request_; /** * * *
     * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
     * When serialized as JSON or YAML, the data is additionally base64-encoded.
     * +listType=atomic
     * 
* * optional bytes request = 1; */ public boolean hasRequest() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
     * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
     * When serialized as JSON or YAML, the data is additionally base64-encoded.
     * +listType=atomic
     * 
* * optional bytes request = 1; */ public com.google.protobuf.ByteString getRequest() { return request_; } public static final int SIGNERNAME_FIELD_NUMBER = 7; private volatile java.lang.Object signerName_; /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ public boolean hasSignerName() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ public java.lang.String getSignerName() { java.lang.Object ref = signerName_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { signerName_ = s; } return s; } } /** * * *
     * signerName indicates the requested signer, and is a qualified name.
     * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
     * Well-known Kubernetes signers are:
     *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
     *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
     *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
     *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
     *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
     * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
     * Custom signerNames can also be specified. The signer defines:
     *  1. Trust distribution: how trust (CA bundles) are distributed.
     *  2. Permitted subjects: and behavior when a disallowed subject is requested.
     *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
     *  4. Required, permitted, or forbidden key usages / extended key usages.
     *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
     *  6. Whether or not requests for CA certificates are allowed.
     * 
* * optional string signerName = 7; */ public com.google.protobuf.ByteString getSignerNameBytes() { java.lang.Object ref = signerName_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); signerName_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int EXPIRATIONSECONDS_FIELD_NUMBER = 8; private int expirationSeconds_; /** * * *
     * expirationSeconds is the requested duration of validity of the issued
     * certificate. The certificate signer may issue a certificate with a different
     * validity duration so a client must check the delta between the notBefore and
     * and notAfter fields in the issued certificate to determine the actual duration.
     * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
     * honor this field as long as the requested duration is not greater than the
     * maximum duration they will honor per the --cluster-signing-duration CLI
     * flag to the Kubernetes controller manager.
     * Certificate signers may not honor this field for various reasons:
     *   1. Old signer that is unaware of the field (such as the in-tree
     *      implementations prior to v1.22)
     *   2. Signer whose configured maximum is shorter than the requested duration
     *   3. Signer whose configured minimum is longer than the requested duration
     * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
     * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
     * +optional
     * 
* * optional int32 expirationSeconds = 8; */ public boolean hasExpirationSeconds() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
     * expirationSeconds is the requested duration of validity of the issued
     * certificate. The certificate signer may issue a certificate with a different
     * validity duration so a client must check the delta between the notBefore and
     * and notAfter fields in the issued certificate to determine the actual duration.
     * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
     * honor this field as long as the requested duration is not greater than the
     * maximum duration they will honor per the --cluster-signing-duration CLI
     * flag to the Kubernetes controller manager.
     * Certificate signers may not honor this field for various reasons:
     *   1. Old signer that is unaware of the field (such as the in-tree
     *      implementations prior to v1.22)
     *   2. Signer whose configured maximum is shorter than the requested duration
     *   3. Signer whose configured minimum is longer than the requested duration
     * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
     * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
     * +optional
     * 
* * optional int32 expirationSeconds = 8; */ public int getExpirationSeconds() { return expirationSeconds_; } public static final int USAGES_FIELD_NUMBER = 5; private com.google.protobuf.LazyStringList usages_; /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ public com.google.protobuf.ProtocolStringList getUsagesList() { return usages_; } /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ public int getUsagesCount() { return usages_.size(); } /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ public java.lang.String getUsages(int index) { return usages_.get(index); } /** * * *
     * usages specifies a set of key usages requested in the issued certificate.
     * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
     * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
     * Valid values are:
     *  "signing", "digital signature", "content commitment",
     *  "key encipherment", "key agreement", "data encipherment",
     *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
     *  "server auth", "client auth",
     *  "code signing", "email protection", "s/mime",
     *  "ipsec end system", "ipsec tunnel", "ipsec user",
     *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
     * +listType=atomic
     * 
* * repeated string usages = 5; */ public com.google.protobuf.ByteString getUsagesBytes(int index) { return usages_.getByteString(index); } public static final int USERNAME_FIELD_NUMBER = 2; private volatile java.lang.Object username_; /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ public boolean hasUsername() { return ((bitField0_ & 0x00000008) == 0x00000008); } /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ public java.lang.String getUsername() { java.lang.Object ref = username_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { username_ = s; } return s; } } /** * * *
     * username contains the name of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string username = 2; */ public com.google.protobuf.ByteString getUsernameBytes() { java.lang.Object ref = username_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); username_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int UID_FIELD_NUMBER = 3; private volatile java.lang.Object uid_; /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ public boolean hasUid() { return ((bitField0_ & 0x00000010) == 0x00000010); } /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ public java.lang.String getUid() { java.lang.Object ref = uid_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { uid_ = s; } return s; } } /** * * *
     * uid contains the uid of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * optional string uid = 3; */ public com.google.protobuf.ByteString getUidBytes() { java.lang.Object ref = uid_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); uid_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int GROUPS_FIELD_NUMBER = 4; private com.google.protobuf.LazyStringList groups_; /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ public com.google.protobuf.ProtocolStringList getGroupsList() { return groups_; } /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ public int getGroupsCount() { return groups_.size(); } /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ public java.lang.String getGroups(int index) { return groups_.get(index); } /** * * *
     * groups contains group membership of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +listType=atomic
     * +optional
     * 
* * repeated string groups = 4; */ public com.google.protobuf.ByteString getGroupsBytes(int index) { return groups_.getByteString(index); } public static final int EXTRA_FIELD_NUMBER = 6; private static final class ExtraDefaultEntryHolder { static final com.google.protobuf.MapEntry< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> defaultEntry = com.google.protobuf.MapEntry . newDefaultInstance( io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_descriptor, com.google.protobuf.WireFormat.FieldType.STRING, "", com.google.protobuf.WireFormat.FieldType.MESSAGE, io.kubernetes.client.proto.V1Certificates.ExtraValue .getDefaultInstance()); } private com.google.protobuf.MapField< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> extra_; private com.google.protobuf.MapField< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> internalGetExtra() { if (extra_ == null) { return com.google.protobuf.MapField.emptyMapField(ExtraDefaultEntryHolder.defaultEntry); } return extra_; } public int getExtraCount() { return internalGetExtra().getMap().size(); } /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public boolean containsExtra(java.lang.String key) { if (key == null) { throw new java.lang.NullPointerException(); } return internalGetExtra().getMap().containsKey(key); } /** Use {@link #getExtraMap()} instead. */ @java.lang.Deprecated public java.util.Map getExtra() { return getExtraMap(); } /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public java.util.Map getExtraMap() { return internalGetExtra().getMap(); } /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrDefault( java.lang.String key, io.kubernetes.client.proto.V1Certificates.ExtraValue defaultValue) { if (key == null) { throw new java.lang.NullPointerException(); } java.util.Map map = internalGetExtra().getMap(); return map.containsKey(key) ? map.get(key) : defaultValue; } /** * * *
     * extra contains extra attributes of the user that created the CertificateSigningRequest.
     * Populated by the API server on creation and immutable.
     * +optional
     * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrThrow( java.lang.String key) { if (key == null) { throw new java.lang.NullPointerException(); } java.util.Map map = internalGetExtra().getMap(); if (!map.containsKey(key)) { throw new java.lang.IllegalArgumentException(); } return map.get(key); } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (((bitField0_ & 0x00000001) == 0x00000001)) { output.writeBytes(1, request_); } if (((bitField0_ & 0x00000008) == 0x00000008)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, username_); } if (((bitField0_ & 0x00000010) == 0x00000010)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, uid_); } for (int i = 0; i < groups_.size(); i++) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, groups_.getRaw(i)); } for (int i = 0; i < usages_.size(); i++) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, usages_.getRaw(i)); } com.google.protobuf.GeneratedMessageV3.serializeStringMapTo( output, internalGetExtra(), ExtraDefaultEntryHolder.defaultEntry, 6); if (((bitField0_ & 0x00000002) == 0x00000002)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 7, signerName_); } if (((bitField0_ & 0x00000004) == 0x00000004)) { output.writeInt32(8, expirationSeconds_); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (((bitField0_ & 0x00000001) == 0x00000001)) { size += com.google.protobuf.CodedOutputStream.computeBytesSize(1, request_); } if (((bitField0_ & 0x00000008) == 0x00000008)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, username_); } if (((bitField0_ & 0x00000010) == 0x00000010)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, uid_); } { int dataSize = 0; for (int i = 0; i < groups_.size(); i++) { dataSize += computeStringSizeNoTag(groups_.getRaw(i)); } size += dataSize; size += 1 * getGroupsList().size(); } { int dataSize = 0; for (int i = 0; i < usages_.size(); i++) { dataSize += computeStringSizeNoTag(usages_.getRaw(i)); } size += dataSize; size += 1 * getUsagesList().size(); } for (java.util.Map.Entry< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> entry : internalGetExtra().getMap().entrySet()) { com.google.protobuf.MapEntry< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> extra__ = ExtraDefaultEntryHolder.defaultEntry .newBuilderForType() .setKey(entry.getKey()) .setValue(entry.getValue()) .build(); size += com.google.protobuf.CodedOutputStream.computeMessageSize(6, extra__); } if (((bitField0_ & 0x00000002) == 0x00000002)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, signerName_); } if (((bitField0_ & 0x00000004) == 0x00000004)) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(8, expirationSeconds_); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec other = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec) obj; boolean result = true; result = result && (hasRequest() == other.hasRequest()); if (hasRequest()) { result = result && getRequest().equals(other.getRequest()); } result = result && (hasSignerName() == other.hasSignerName()); if (hasSignerName()) { result = result && getSignerName().equals(other.getSignerName()); } result = result && (hasExpirationSeconds() == other.hasExpirationSeconds()); if (hasExpirationSeconds()) { result = result && (getExpirationSeconds() == other.getExpirationSeconds()); } result = result && getUsagesList().equals(other.getUsagesList()); result = result && (hasUsername() == other.hasUsername()); if (hasUsername()) { result = result && getUsername().equals(other.getUsername()); } result = result && (hasUid() == other.hasUid()); if (hasUid()) { result = result && getUid().equals(other.getUid()); } result = result && getGroupsList().equals(other.getGroupsList()); result = result && internalGetExtra().equals(other.internalGetExtra()); result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasRequest()) { hash = (37 * hash) + REQUEST_FIELD_NUMBER; hash = (53 * hash) + getRequest().hashCode(); } if (hasSignerName()) { hash = (37 * hash) + SIGNERNAME_FIELD_NUMBER; hash = (53 * hash) + getSignerName().hashCode(); } if (hasExpirationSeconds()) { hash = (37 * hash) + EXPIRATIONSECONDS_FIELD_NUMBER; hash = (53 * hash) + getExpirationSeconds(); } if (getUsagesCount() > 0) { hash = (37 * hash) + USAGES_FIELD_NUMBER; hash = (53 * hash) + getUsagesList().hashCode(); } if (hasUsername()) { hash = (37 * hash) + USERNAME_FIELD_NUMBER; hash = (53 * hash) + getUsername().hashCode(); } if (hasUid()) { hash = (37 * hash) + UID_FIELD_NUMBER; hash = (53 * hash) + getUid().hashCode(); } if (getGroupsCount() > 0) { hash = (37 * hash) + GROUPS_FIELD_NUMBER; hash = (53 * hash) + getGroupsList().hashCode(); } if (!internalGetExtra().getMap().isEmpty()) { hash = (37 * hash) + EXTRA_FIELD_NUMBER; hash = (53 * hash) + internalGetExtra().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * CertificateSigningRequestSpec contains the certificate request.
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestSpec} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.CertificateSigningRequestSpec) io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpecOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor; } @SuppressWarnings({"rawtypes"}) protected com.google.protobuf.MapField internalGetMapField(int number) { switch (number) { case 6: return internalGetExtra(); default: throw new RuntimeException("Invalid map field number: " + number); } } @SuppressWarnings({"rawtypes"}) protected com.google.protobuf.MapField internalGetMutableMapField(int number) { switch (number) { case 6: return internalGetMutableExtra(); default: throw new RuntimeException("Invalid map field number: " + number); } } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.Builder .class); } // Construct using // io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} } @java.lang.Override public Builder clear() { super.clear(); request_ = com.google.protobuf.ByteString.EMPTY; bitField0_ = (bitField0_ & ~0x00000001); signerName_ = ""; bitField0_ = (bitField0_ & ~0x00000002); expirationSeconds_ = 0; bitField0_ = (bitField0_ & ~0x00000004); usages_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000008); username_ = ""; bitField0_ = (bitField0_ & ~0x00000010); uid_ = ""; bitField0_ = (bitField0_ & ~0x00000020); groups_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000040); internalGetMutableExtra().clear(); return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec build() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec buildPartial() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec result = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (((from_bitField0_ & 0x00000001) == 0x00000001)) { to_bitField0_ |= 0x00000001; } result.request_ = request_; if (((from_bitField0_ & 0x00000002) == 0x00000002)) { to_bitField0_ |= 0x00000002; } result.signerName_ = signerName_; if (((from_bitField0_ & 0x00000004) == 0x00000004)) { to_bitField0_ |= 0x00000004; } result.expirationSeconds_ = expirationSeconds_; if (((bitField0_ & 0x00000008) == 0x00000008)) { usages_ = usages_.getUnmodifiableView(); bitField0_ = (bitField0_ & ~0x00000008); } result.usages_ = usages_; if (((from_bitField0_ & 0x00000010) == 0x00000010)) { to_bitField0_ |= 0x00000008; } result.username_ = username_; if (((from_bitField0_ & 0x00000020) == 0x00000020)) { to_bitField0_ |= 0x00000010; } result.uid_ = uid_; if (((bitField0_ & 0x00000040) == 0x00000040)) { groups_ = groups_.getUnmodifiableView(); bitField0_ = (bitField0_ & ~0x00000040); } result.groups_ = groups_; result.extra_ = internalGetExtra(); result.extra_.makeImmutable(); result.bitField0_ = to_bitField0_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec) { return mergeFrom( (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec other) { if (other == io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec .getDefaultInstance()) return this; if (other.hasRequest()) { setRequest(other.getRequest()); } if (other.hasSignerName()) { bitField0_ |= 0x00000002; signerName_ = other.signerName_; onChanged(); } if (other.hasExpirationSeconds()) { setExpirationSeconds(other.getExpirationSeconds()); } if (!other.usages_.isEmpty()) { if (usages_.isEmpty()) { usages_ = other.usages_; bitField0_ = (bitField0_ & ~0x00000008); } else { ensureUsagesIsMutable(); usages_.addAll(other.usages_); } onChanged(); } if (other.hasUsername()) { bitField0_ |= 0x00000010; username_ = other.username_; onChanged(); } if (other.hasUid()) { bitField0_ |= 0x00000020; uid_ = other.uid_; onChanged(); } if (!other.groups_.isEmpty()) { if (groups_.isEmpty()) { groups_ = other.groups_; bitField0_ = (bitField0_ & ~0x00000040); } else { ensureGroupsIsMutable(); groups_.addAll(other.groups_); } onChanged(); } internalGetMutableExtra().mergeFrom(other.internalGetExtra()); this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private com.google.protobuf.ByteString request_ = com.google.protobuf.ByteString.EMPTY; /** * * *
       * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
       * When serialized as JSON or YAML, the data is additionally base64-encoded.
       * +listType=atomic
       * 
* * optional bytes request = 1; */ public boolean hasRequest() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
       * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
       * When serialized as JSON or YAML, the data is additionally base64-encoded.
       * +listType=atomic
       * 
* * optional bytes request = 1; */ public com.google.protobuf.ByteString getRequest() { return request_; } /** * * *
       * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
       * When serialized as JSON or YAML, the data is additionally base64-encoded.
       * +listType=atomic
       * 
* * optional bytes request = 1; */ public Builder setRequest(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000001; request_ = value; onChanged(); return this; } /** * * *
       * request contains an x509 certificate signing request encoded in a "CERTIFICATE REQUEST" PEM block.
       * When serialized as JSON or YAML, the data is additionally base64-encoded.
       * +listType=atomic
       * 
* * optional bytes request = 1; */ public Builder clearRequest() { bitField0_ = (bitField0_ & ~0x00000001); request_ = getDefaultInstance().getRequest(); onChanged(); return this; } private java.lang.Object signerName_ = ""; /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public boolean hasSignerName() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public java.lang.String getSignerName() { java.lang.Object ref = signerName_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { signerName_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public com.google.protobuf.ByteString getSignerNameBytes() { java.lang.Object ref = signerName_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); signerName_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public Builder setSignerName(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000002; signerName_ = value; onChanged(); return this; } /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public Builder clearSignerName() { bitField0_ = (bitField0_ & ~0x00000002); signerName_ = getDefaultInstance().getSignerName(); onChanged(); return this; } /** * * *
       * signerName indicates the requested signer, and is a qualified name.
       * List/watch requests for CertificateSigningRequests can filter on this field using a "spec.signerName=NAME" fieldSelector.
       * Well-known Kubernetes signers are:
       *  1. "kubernetes.io/kube-apiserver-client": issues client certificates that can be used to authenticate to kube-apiserver.
       *   Requests for this signer are never auto-approved by kube-controller-manager, can be issued by the "csrsigning" controller in kube-controller-manager.
       *  2. "kubernetes.io/kube-apiserver-client-kubelet": issues client certificates that kubelets use to authenticate to kube-apiserver.
       *   Requests for this signer can be auto-approved by the "csrapproving" controller in kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       *  3. "kubernetes.io/kubelet-serving" issues serving certificates that kubelets use to serve TLS endpoints, which kube-apiserver can connect to securely.
       *   Requests for this signer are never auto-approved by kube-controller-manager, and can be issued by the "csrsigning" controller in kube-controller-manager.
       * More details are available at https://k8s.io/docs/reference/access-authn-authz/certificate-signing-requests/#kubernetes-signers
       * Custom signerNames can also be specified. The signer defines:
       *  1. Trust distribution: how trust (CA bundles) are distributed.
       *  2. Permitted subjects: and behavior when a disallowed subject is requested.
       *  3. Required, permitted, or forbidden x509 extensions in the request (including whether subjectAltNames are allowed, which types, restrictions on allowed values) and behavior when a disallowed extension is requested.
       *  4. Required, permitted, or forbidden key usages / extended key usages.
       *  5. Expiration/certificate lifetime: whether it is fixed by the signer, configurable by the admin.
       *  6. Whether or not requests for CA certificates are allowed.
       * 
* * optional string signerName = 7; */ public Builder setSignerNameBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000002; signerName_ = value; onChanged(); return this; } private int expirationSeconds_; /** * * *
       * expirationSeconds is the requested duration of validity of the issued
       * certificate. The certificate signer may issue a certificate with a different
       * validity duration so a client must check the delta between the notBefore and
       * and notAfter fields in the issued certificate to determine the actual duration.
       * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
       * honor this field as long as the requested duration is not greater than the
       * maximum duration they will honor per the --cluster-signing-duration CLI
       * flag to the Kubernetes controller manager.
       * Certificate signers may not honor this field for various reasons:
       *   1. Old signer that is unaware of the field (such as the in-tree
       *      implementations prior to v1.22)
       *   2. Signer whose configured maximum is shorter than the requested duration
       *   3. Signer whose configured minimum is longer than the requested duration
       * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
       * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
       * +optional
       * 
* * optional int32 expirationSeconds = 8; */ public boolean hasExpirationSeconds() { return ((bitField0_ & 0x00000004) == 0x00000004); } /** * * *
       * expirationSeconds is the requested duration of validity of the issued
       * certificate. The certificate signer may issue a certificate with a different
       * validity duration so a client must check the delta between the notBefore and
       * and notAfter fields in the issued certificate to determine the actual duration.
       * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
       * honor this field as long as the requested duration is not greater than the
       * maximum duration they will honor per the --cluster-signing-duration CLI
       * flag to the Kubernetes controller manager.
       * Certificate signers may not honor this field for various reasons:
       *   1. Old signer that is unaware of the field (such as the in-tree
       *      implementations prior to v1.22)
       *   2. Signer whose configured maximum is shorter than the requested duration
       *   3. Signer whose configured minimum is longer than the requested duration
       * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
       * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
       * +optional
       * 
* * optional int32 expirationSeconds = 8; */ public int getExpirationSeconds() { return expirationSeconds_; } /** * * *
       * expirationSeconds is the requested duration of validity of the issued
       * certificate. The certificate signer may issue a certificate with a different
       * validity duration so a client must check the delta between the notBefore and
       * and notAfter fields in the issued certificate to determine the actual duration.
       * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
       * honor this field as long as the requested duration is not greater than the
       * maximum duration they will honor per the --cluster-signing-duration CLI
       * flag to the Kubernetes controller manager.
       * Certificate signers may not honor this field for various reasons:
       *   1. Old signer that is unaware of the field (such as the in-tree
       *      implementations prior to v1.22)
       *   2. Signer whose configured maximum is shorter than the requested duration
       *   3. Signer whose configured minimum is longer than the requested duration
       * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
       * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
       * +optional
       * 
* * optional int32 expirationSeconds = 8; */ public Builder setExpirationSeconds(int value) { bitField0_ |= 0x00000004; expirationSeconds_ = value; onChanged(); return this; } /** * * *
       * expirationSeconds is the requested duration of validity of the issued
       * certificate. The certificate signer may issue a certificate with a different
       * validity duration so a client must check the delta between the notBefore and
       * and notAfter fields in the issued certificate to determine the actual duration.
       * The v1.22+ in-tree implementations of the well-known Kubernetes signers will
       * honor this field as long as the requested duration is not greater than the
       * maximum duration they will honor per the --cluster-signing-duration CLI
       * flag to the Kubernetes controller manager.
       * Certificate signers may not honor this field for various reasons:
       *   1. Old signer that is unaware of the field (such as the in-tree
       *      implementations prior to v1.22)
       *   2. Signer whose configured maximum is shorter than the requested duration
       *   3. Signer whose configured minimum is longer than the requested duration
       * The minimum valid value for expirationSeconds is 600, i.e. 10 minutes.
       * As of v1.22, this field is beta and is controlled via the CSRDuration feature gate.
       * +optional
       * 
* * optional int32 expirationSeconds = 8; */ public Builder clearExpirationSeconds() { bitField0_ = (bitField0_ & ~0x00000004); expirationSeconds_ = 0; onChanged(); return this; } private com.google.protobuf.LazyStringList usages_ = com.google.protobuf.LazyStringArrayList.EMPTY; private void ensureUsagesIsMutable() { if (!((bitField0_ & 0x00000008) == 0x00000008)) { usages_ = new com.google.protobuf.LazyStringArrayList(usages_); bitField0_ |= 0x00000008; } } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public com.google.protobuf.ProtocolStringList getUsagesList() { return usages_.getUnmodifiableView(); } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public int getUsagesCount() { return usages_.size(); } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public java.lang.String getUsages(int index) { return usages_.get(index); } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public com.google.protobuf.ByteString getUsagesBytes(int index) { return usages_.getByteString(index); } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public Builder setUsages(int index, java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureUsagesIsMutable(); usages_.set(index, value); onChanged(); return this; } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public Builder addUsages(java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureUsagesIsMutable(); usages_.add(value); onChanged(); return this; } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public Builder addAllUsages(java.lang.Iterable values) { ensureUsagesIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll(values, usages_); onChanged(); return this; } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public Builder clearUsages() { usages_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000008); onChanged(); return this; } /** * * *
       * usages specifies a set of key usages requested in the issued certificate.
       * Requests for TLS client certificates typically request: "digital signature", "key encipherment", "client auth".
       * Requests for TLS serving certificates typically request: "key encipherment", "digital signature", "server auth".
       * Valid values are:
       *  "signing", "digital signature", "content commitment",
       *  "key encipherment", "key agreement", "data encipherment",
       *  "cert sign", "crl sign", "encipher only", "decipher only", "any",
       *  "server auth", "client auth",
       *  "code signing", "email protection", "s/mime",
       *  "ipsec end system", "ipsec tunnel", "ipsec user",
       *  "timestamping", "ocsp signing", "microsoft sgc", "netscape sgc"
       * +listType=atomic
       * 
* * repeated string usages = 5; */ public Builder addUsagesBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } ensureUsagesIsMutable(); usages_.add(value); onChanged(); return this; } private java.lang.Object username_ = ""; /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public boolean hasUsername() { return ((bitField0_ & 0x00000010) == 0x00000010); } /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public java.lang.String getUsername() { java.lang.Object ref = username_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { username_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public com.google.protobuf.ByteString getUsernameBytes() { java.lang.Object ref = username_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); username_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public Builder setUsername(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000010; username_ = value; onChanged(); return this; } /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public Builder clearUsername() { bitField0_ = (bitField0_ & ~0x00000010); username_ = getDefaultInstance().getUsername(); onChanged(); return this; } /** * * *
       * username contains the name of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string username = 2; */ public Builder setUsernameBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000010; username_ = value; onChanged(); return this; } private java.lang.Object uid_ = ""; /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public boolean hasUid() { return ((bitField0_ & 0x00000020) == 0x00000020); } /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public java.lang.String getUid() { java.lang.Object ref = uid_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); if (bs.isValidUtf8()) { uid_ = s; } return s; } else { return (java.lang.String) ref; } } /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public com.google.protobuf.ByteString getUidBytes() { java.lang.Object ref = uid_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); uid_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public Builder setUid(java.lang.String value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000020; uid_ = value; onChanged(); return this; } /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public Builder clearUid() { bitField0_ = (bitField0_ & ~0x00000020); uid_ = getDefaultInstance().getUid(); onChanged(); return this; } /** * * *
       * uid contains the uid of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * optional string uid = 3; */ public Builder setUidBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000020; uid_ = value; onChanged(); return this; } private com.google.protobuf.LazyStringList groups_ = com.google.protobuf.LazyStringArrayList.EMPTY; private void ensureGroupsIsMutable() { if (!((bitField0_ & 0x00000040) == 0x00000040)) { groups_ = new com.google.protobuf.LazyStringArrayList(groups_); bitField0_ |= 0x00000040; } } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public com.google.protobuf.ProtocolStringList getGroupsList() { return groups_.getUnmodifiableView(); } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public int getGroupsCount() { return groups_.size(); } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public java.lang.String getGroups(int index) { return groups_.get(index); } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public com.google.protobuf.ByteString getGroupsBytes(int index) { return groups_.getByteString(index); } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public Builder setGroups(int index, java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureGroupsIsMutable(); groups_.set(index, value); onChanged(); return this; } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public Builder addGroups(java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureGroupsIsMutable(); groups_.add(value); onChanged(); return this; } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public Builder addAllGroups(java.lang.Iterable values) { ensureGroupsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll(values, groups_); onChanged(); return this; } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public Builder clearGroups() { groups_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000040); onChanged(); return this; } /** * * *
       * groups contains group membership of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +listType=atomic
       * +optional
       * 
* * repeated string groups = 4; */ public Builder addGroupsBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } ensureGroupsIsMutable(); groups_.add(value); onChanged(); return this; } private com.google.protobuf.MapField< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> extra_; private com.google.protobuf.MapField< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> internalGetExtra() { if (extra_ == null) { return com.google.protobuf.MapField.emptyMapField(ExtraDefaultEntryHolder.defaultEntry); } return extra_; } private com.google.protobuf.MapField< java.lang.String, io.kubernetes.client.proto.V1Certificates.ExtraValue> internalGetMutableExtra() { onChanged(); ; if (extra_ == null) { extra_ = com.google.protobuf.MapField.newMapField(ExtraDefaultEntryHolder.defaultEntry); } if (!extra_.isMutable()) { extra_ = extra_.copy(); } return extra_; } public int getExtraCount() { return internalGetExtra().getMap().size(); } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public boolean containsExtra(java.lang.String key) { if (key == null) { throw new java.lang.NullPointerException(); } return internalGetExtra().getMap().containsKey(key); } /** Use {@link #getExtraMap()} instead. */ @java.lang.Deprecated public java.util.Map getExtra() { return getExtraMap(); } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public java.util.Map getExtraMap() { return internalGetExtra().getMap(); } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrDefault( java.lang.String key, io.kubernetes.client.proto.V1Certificates.ExtraValue defaultValue) { if (key == null) { throw new java.lang.NullPointerException(); } java.util.Map map = internalGetExtra().getMap(); return map.containsKey(key) ? map.get(key) : defaultValue; } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public io.kubernetes.client.proto.V1Certificates.ExtraValue getExtraOrThrow( java.lang.String key) { if (key == null) { throw new java.lang.NullPointerException(); } java.util.Map map = internalGetExtra().getMap(); if (!map.containsKey(key)) { throw new java.lang.IllegalArgumentException(); } return map.get(key); } public Builder clearExtra() { internalGetMutableExtra().getMutableMap().clear(); return this; } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public Builder removeExtra(java.lang.String key) { if (key == null) { throw new java.lang.NullPointerException(); } internalGetMutableExtra().getMutableMap().remove(key); return this; } /** Use alternate mutation accessors instead. */ @java.lang.Deprecated public java.util.Map getMutableExtra() { return internalGetMutableExtra().getMutableMap(); } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public Builder putExtra( java.lang.String key, io.kubernetes.client.proto.V1Certificates.ExtraValue value) { if (key == null) { throw new java.lang.NullPointerException(); } if (value == null) { throw new java.lang.NullPointerException(); } internalGetMutableExtra().getMutableMap().put(key, value); return this; } /** * * *
       * extra contains extra attributes of the user that created the CertificateSigningRequest.
       * Populated by the API server on creation and immutable.
       * +optional
       * 
* * map<string, .k8s.io.api.certificates.v1.ExtraValue> extra = 6; */ public Builder putAllExtra( java.util.Map values) { internalGetMutableExtra().getMutableMap().putAll(values); return this; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.CertificateSigningRequestSpec) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.CertificateSigningRequestSpec) private static final io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec(); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public CertificateSigningRequestSpec parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CertificateSigningRequestSpec(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestSpec getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } public interface CertificateSigningRequestStatusOrBuilder extends // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.CertificateSigningRequestStatus) com.google.protobuf.MessageOrBuilder { /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ java.util.List getConditionsList(); /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getConditions( int index); /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ int getConditionsCount(); /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ java.util.List< ? extends io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestConditionOrBuilder> getConditionsOrBuilderList(); /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder getConditionsOrBuilder(int index); /** * * *
     * certificate is populated with an issued certificate by the signer after an Approved condition is present.
     * This field is set via the /status subresource. Once populated, this field is immutable.
     * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
     * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
     * Validation requirements:
     *  1. certificate must contain one or more PEM blocks.
     *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
     *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
     *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
     *   to allow for explanatory text as described in section 5.2 of RFC7468.
     * If more than one PEM block is present, and the definition of the requested spec.signerName
     * does not indicate otherwise, the first block is the issued certificate,
     * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
     * The certificate is encoded in PEM format.
     * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
     *     base64(
     *     -----BEGIN CERTIFICATE-----
     *     ...
     *     -----END CERTIFICATE-----
     *     )
     * +listType=atomic
     * +optional
     * 
* * optional bytes certificate = 2; */ boolean hasCertificate(); /** * * *
     * certificate is populated with an issued certificate by the signer after an Approved condition is present.
     * This field is set via the /status subresource. Once populated, this field is immutable.
     * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
     * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
     * Validation requirements:
     *  1. certificate must contain one or more PEM blocks.
     *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
     *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
     *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
     *   to allow for explanatory text as described in section 5.2 of RFC7468.
     * If more than one PEM block is present, and the definition of the requested spec.signerName
     * does not indicate otherwise, the first block is the issued certificate,
     * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
     * The certificate is encoded in PEM format.
     * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
     *     base64(
     *     -----BEGIN CERTIFICATE-----
     *     ...
     *     -----END CERTIFICATE-----
     *     )
     * +listType=atomic
     * +optional
     * 
* * optional bytes certificate = 2; */ com.google.protobuf.ByteString getCertificate(); } /** * * *
   * CertificateSigningRequestStatus contains conditions used to indicate
   * approved/denied/failed status of the request, and the issued certificate.
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestStatus} */ public static final class CertificateSigningRequestStatus extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.CertificateSigningRequestStatus) CertificateSigningRequestStatusOrBuilder { private static final long serialVersionUID = 0L; // Use CertificateSigningRequestStatus.newBuilder() to construct. private CertificateSigningRequestStatus( com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private CertificateSigningRequestStatus() { conditions_ = java.util.Collections.emptyList(); certificate_ = com.google.protobuf.ByteString.EMPTY; } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private CertificateSigningRequestStatus( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { if (!((mutable_bitField0_ & 0x00000001) == 0x00000001)) { conditions_ = new java.util.ArrayList< io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestCondition>(); mutable_bitField0_ |= 0x00000001; } conditions_.add( input.readMessage( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .PARSER, extensionRegistry)); break; } case 18: { bitField0_ |= 0x00000001; certificate_ = input.readBytes(); break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000001) == 0x00000001)) { conditions_ = java.util.Collections.unmodifiableList(conditions_); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder .class); } private int bitField0_; public static final int CONDITIONS_FIELD_NUMBER = 1; private java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition> conditions_; /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition> getConditionsList() { return conditions_; } /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public java.util.List< ? extends io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestConditionOrBuilder> getConditionsOrBuilderList() { return conditions_; } /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public int getConditionsCount() { return conditions_.size(); } /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getConditions(int index) { return conditions_.get(index); } /** * * *
     * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
     * +listType=map
     * +listMapKey=type
     * +optional
     * 
* * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder getConditionsOrBuilder(int index) { return conditions_.get(index); } public static final int CERTIFICATE_FIELD_NUMBER = 2; private com.google.protobuf.ByteString certificate_; /** * * *
     * certificate is populated with an issued certificate by the signer after an Approved condition is present.
     * This field is set via the /status subresource. Once populated, this field is immutable.
     * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
     * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
     * Validation requirements:
     *  1. certificate must contain one or more PEM blocks.
     *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
     *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
     *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
     *   to allow for explanatory text as described in section 5.2 of RFC7468.
     * If more than one PEM block is present, and the definition of the requested spec.signerName
     * does not indicate otherwise, the first block is the issued certificate,
     * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
     * The certificate is encoded in PEM format.
     * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
     *     base64(
     *     -----BEGIN CERTIFICATE-----
     *     ...
     *     -----END CERTIFICATE-----
     *     )
     * +listType=atomic
     * +optional
     * 
* * optional bytes certificate = 2; */ public boolean hasCertificate() { return ((bitField0_ & 0x00000001) == 0x00000001); } /** * * *
     * certificate is populated with an issued certificate by the signer after an Approved condition is present.
     * This field is set via the /status subresource. Once populated, this field is immutable.
     * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
     * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
     * Validation requirements:
     *  1. certificate must contain one or more PEM blocks.
     *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
     *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
     *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
     *   to allow for explanatory text as described in section 5.2 of RFC7468.
     * If more than one PEM block is present, and the definition of the requested spec.signerName
     * does not indicate otherwise, the first block is the issued certificate,
     * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
     * The certificate is encoded in PEM format.
     * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
     *     base64(
     *     -----BEGIN CERTIFICATE-----
     *     ...
     *     -----END CERTIFICATE-----
     *     )
     * +listType=atomic
     * +optional
     * 
* * optional bytes certificate = 2; */ public com.google.protobuf.ByteString getCertificate() { return certificate_; } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { for (int i = 0; i < conditions_.size(); i++) { output.writeMessage(1, conditions_.get(i)); } if (((bitField0_ & 0x00000001) == 0x00000001)) { output.writeBytes(2, certificate_); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; for (int i = 0; i < conditions_.size(); i++) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, conditions_.get(i)); } if (((bitField0_ & 0x00000001) == 0x00000001)) { size += com.google.protobuf.CodedOutputStream.computeBytesSize(2, certificate_); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus other = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus) obj; boolean result = true; result = result && getConditionsList().equals(other.getConditionsList()); result = result && (hasCertificate() == other.hasCertificate()); if (hasCertificate()) { result = result && getCertificate().equals(other.getCertificate()); } result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (getConditionsCount() > 0) { hash = (37 * hash) + CONDITIONS_FIELD_NUMBER; hash = (53 * hash) + getConditionsList().hashCode(); } if (hasCertificate()) { hash = (37 * hash) + CERTIFICATE_FIELD_NUMBER; hash = (53 * hash) + getCertificate().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom(com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * CertificateSigningRequestStatus contains conditions used to indicate
     * approved/denied/failed status of the request, and the issued certificate.
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.CertificateSigningRequestStatus} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.CertificateSigningRequestStatus) io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatusOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.class, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.Builder .class); } // Construct using // io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getConditionsFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); if (conditionsBuilder_ == null) { conditions_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000001); } else { conditionsBuilder_.clear(); } certificate_ = com.google.protobuf.ByteString.EMPTY; bitField0_ = (bitField0_ & ~0x00000002); return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus build() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus buildPartial() { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus result = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus(this); int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (conditionsBuilder_ == null) { if (((bitField0_ & 0x00000001) == 0x00000001)) { conditions_ = java.util.Collections.unmodifiableList(conditions_); bitField0_ = (bitField0_ & ~0x00000001); } result.conditions_ = conditions_; } else { result.conditions_ = conditionsBuilder_.build(); } if (((from_bitField0_ & 0x00000002) == 0x00000002)) { to_bitField0_ |= 0x00000001; } result.certificate_ = certificate_; result.bitField0_ = to_bitField0_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus) { return mergeFrom( (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus other) { if (other == io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus .getDefaultInstance()) return this; if (conditionsBuilder_ == null) { if (!other.conditions_.isEmpty()) { if (conditions_.isEmpty()) { conditions_ = other.conditions_; bitField0_ = (bitField0_ & ~0x00000001); } else { ensureConditionsIsMutable(); conditions_.addAll(other.conditions_); } onChanged(); } } else { if (!other.conditions_.isEmpty()) { if (conditionsBuilder_.isEmpty()) { conditionsBuilder_.dispose(); conditionsBuilder_ = null; conditions_ = other.conditions_; bitField0_ = (bitField0_ & ~0x00000001); conditionsBuilder_ = com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders ? getConditionsFieldBuilder() : null; } else { conditionsBuilder_.addAllMessages(other.conditions_); } } } if (other.hasCertificate()) { setCertificate(other.getCertificate()); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition> conditions_ = java.util.Collections.emptyList(); private void ensureConditionsIsMutable() { if (!((bitField0_ & 0x00000001) == 0x00000001)) { conditions_ = new java.util.ArrayList< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition>( conditions_); bitField0_ |= 0x00000001; } } private com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder> conditionsBuilder_; /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition> getConditionsList() { if (conditionsBuilder_ == null) { return java.util.Collections.unmodifiableList(conditions_); } else { return conditionsBuilder_.getMessageList(); } } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public int getConditionsCount() { if (conditionsBuilder_ == null) { return conditions_.size(); } else { return conditionsBuilder_.getCount(); } } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition getConditions(int index) { if (conditionsBuilder_ == null) { return conditions_.get(index); } else { return conditionsBuilder_.getMessage(index); } } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder setConditions( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition value) { if (conditionsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureConditionsIsMutable(); conditions_.set(index, value); onChanged(); } else { conditionsBuilder_.setMessage(index, value); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder setConditions( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder builderForValue) { if (conditionsBuilder_ == null) { ensureConditionsIsMutable(); conditions_.set(index, builderForValue.build()); onChanged(); } else { conditionsBuilder_.setMessage(index, builderForValue.build()); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder addConditions( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition value) { if (conditionsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureConditionsIsMutable(); conditions_.add(value); onChanged(); } else { conditionsBuilder_.addMessage(value); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder addConditions( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition value) { if (conditionsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureConditionsIsMutable(); conditions_.add(index, value); onChanged(); } else { conditionsBuilder_.addMessage(index, value); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder addConditions( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder builderForValue) { if (conditionsBuilder_ == null) { ensureConditionsIsMutable(); conditions_.add(builderForValue.build()); onChanged(); } else { conditionsBuilder_.addMessage(builderForValue.build()); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder addConditions( int index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder builderForValue) { if (conditionsBuilder_ == null) { ensureConditionsIsMutable(); conditions_.add(index, builderForValue.build()); onChanged(); } else { conditionsBuilder_.addMessage(index, builderForValue.build()); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder addAllConditions( java.lang.Iterable< ? extends io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition> values) { if (conditionsBuilder_ == null) { ensureConditionsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll(values, conditions_); onChanged(); } else { conditionsBuilder_.addAllMessages(values); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder clearConditions() { if (conditionsBuilder_ == null) { conditions_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000001); onChanged(); } else { conditionsBuilder_.clear(); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public Builder removeConditions(int index) { if (conditionsBuilder_ == null) { ensureConditionsIsMutable(); conditions_.remove(index); onChanged(); } else { conditionsBuilder_.remove(index); } return this; } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder getConditionsBuilder(int index) { return getConditionsFieldBuilder().getBuilder(index); } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder getConditionsOrBuilder(int index) { if (conditionsBuilder_ == null) { return conditions_.get(index); } else { return conditionsBuilder_.getMessageOrBuilder(index); } } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public java.util.List< ? extends io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestConditionOrBuilder> getConditionsOrBuilderList() { if (conditionsBuilder_ != null) { return conditionsBuilder_.getMessageOrBuilderList(); } else { return java.util.Collections.unmodifiableList(conditions_); } } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder addConditionsBuilder() { return getConditionsFieldBuilder() .addBuilder( io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .getDefaultInstance()); } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder addConditionsBuilder(int index) { return getConditionsFieldBuilder() .addBuilder( index, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .getDefaultInstance()); } /** * * *
       * conditions applied to the request. Known conditions are "Approved", "Denied", and "Failed".
       * +listType=map
       * +listMapKey=type
       * +optional
       * 
* * * repeated .k8s.io.api.certificates.v1.CertificateSigningRequestCondition conditions = 1; * */ public java.util.List< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder> getConditionsBuilderList() { return getConditionsFieldBuilder().getBuilderList(); } private com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition.Builder, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestConditionOrBuilder> getConditionsFieldBuilder() { if (conditionsBuilder_ == null) { conditionsBuilder_ = new com.google.protobuf.RepeatedFieldBuilderV3< io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition, io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestCondition .Builder, io.kubernetes.client.proto.V1Certificates .CertificateSigningRequestConditionOrBuilder>( conditions_, ((bitField0_ & 0x00000001) == 0x00000001), getParentForChildren(), isClean()); conditions_ = null; } return conditionsBuilder_; } private com.google.protobuf.ByteString certificate_ = com.google.protobuf.ByteString.EMPTY; /** * * *
       * certificate is populated with an issued certificate by the signer after an Approved condition is present.
       * This field is set via the /status subresource. Once populated, this field is immutable.
       * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
       * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
       * Validation requirements:
       *  1. certificate must contain one or more PEM blocks.
       *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
       *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
       *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
       *   to allow for explanatory text as described in section 5.2 of RFC7468.
       * If more than one PEM block is present, and the definition of the requested spec.signerName
       * does not indicate otherwise, the first block is the issued certificate,
       * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
       * The certificate is encoded in PEM format.
       * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
       *     base64(
       *     -----BEGIN CERTIFICATE-----
       *     ...
       *     -----END CERTIFICATE-----
       *     )
       * +listType=atomic
       * +optional
       * 
* * optional bytes certificate = 2; */ public boolean hasCertificate() { return ((bitField0_ & 0x00000002) == 0x00000002); } /** * * *
       * certificate is populated with an issued certificate by the signer after an Approved condition is present.
       * This field is set via the /status subresource. Once populated, this field is immutable.
       * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
       * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
       * Validation requirements:
       *  1. certificate must contain one or more PEM blocks.
       *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
       *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
       *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
       *   to allow for explanatory text as described in section 5.2 of RFC7468.
       * If more than one PEM block is present, and the definition of the requested spec.signerName
       * does not indicate otherwise, the first block is the issued certificate,
       * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
       * The certificate is encoded in PEM format.
       * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
       *     base64(
       *     -----BEGIN CERTIFICATE-----
       *     ...
       *     -----END CERTIFICATE-----
       *     )
       * +listType=atomic
       * +optional
       * 
* * optional bytes certificate = 2; */ public com.google.protobuf.ByteString getCertificate() { return certificate_; } /** * * *
       * certificate is populated with an issued certificate by the signer after an Approved condition is present.
       * This field is set via the /status subresource. Once populated, this field is immutable.
       * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
       * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
       * Validation requirements:
       *  1. certificate must contain one or more PEM blocks.
       *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
       *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
       *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
       *   to allow for explanatory text as described in section 5.2 of RFC7468.
       * If more than one PEM block is present, and the definition of the requested spec.signerName
       * does not indicate otherwise, the first block is the issued certificate,
       * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
       * The certificate is encoded in PEM format.
       * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
       *     base64(
       *     -----BEGIN CERTIFICATE-----
       *     ...
       *     -----END CERTIFICATE-----
       *     )
       * +listType=atomic
       * +optional
       * 
* * optional bytes certificate = 2; */ public Builder setCertificate(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } bitField0_ |= 0x00000002; certificate_ = value; onChanged(); return this; } /** * * *
       * certificate is populated with an issued certificate by the signer after an Approved condition is present.
       * This field is set via the /status subresource. Once populated, this field is immutable.
       * If the certificate signing request is denied, a condition of type "Denied" is added and this field remains empty.
       * If the signer cannot issue the certificate, a condition of type "Failed" is added and this field remains empty.
       * Validation requirements:
       *  1. certificate must contain one or more PEM blocks.
       *  2. All PEM blocks must have the "CERTIFICATE" label, contain no headers, and the encoded data
       *   must be a BER-encoded ASN.1 Certificate structure as described in section 4 of RFC5280.
       *  3. Non-PEM content may appear before or after the "CERTIFICATE" PEM blocks and is unvalidated,
       *   to allow for explanatory text as described in section 5.2 of RFC7468.
       * If more than one PEM block is present, and the definition of the requested spec.signerName
       * does not indicate otherwise, the first block is the issued certificate,
       * and subsequent blocks should be treated as intermediate certificates and presented in TLS handshakes.
       * The certificate is encoded in PEM format.
       * When serialized as JSON or YAML, the data is additionally base64-encoded, so it consists of:
       *     base64(
       *     -----BEGIN CERTIFICATE-----
       *     ...
       *     -----END CERTIFICATE-----
       *     )
       * +listType=atomic
       * +optional
       * 
* * optional bytes certificate = 2; */ public Builder clearCertificate() { bitField0_ = (bitField0_ & ~0x00000002); certificate_ = getDefaultInstance().getCertificate(); onChanged(); return this; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.CertificateSigningRequestStatus) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.CertificateSigningRequestStatus) private static final io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus(); } public static io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public CertificateSigningRequestStatus parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new CertificateSigningRequestStatus(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.CertificateSigningRequestStatus getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } public interface ExtraValueOrBuilder extends // @@protoc_insertion_point(interface_extends:k8s.io.api.certificates.v1.ExtraValue) com.google.protobuf.MessageOrBuilder { /** repeated string items = 1; */ java.util.List getItemsList(); /** repeated string items = 1; */ int getItemsCount(); /** repeated string items = 1; */ java.lang.String getItems(int index); /** repeated string items = 1; */ com.google.protobuf.ByteString getItemsBytes(int index); } /** * * *
   * ExtraValue masks the value so protobuf can generate
   * +protobuf.nullable=true
   * +protobuf.options.(gogoproto.goproto_stringer)=false
   * 
* * Protobuf type {@code k8s.io.api.certificates.v1.ExtraValue} */ public static final class ExtraValue extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:k8s.io.api.certificates.v1.ExtraValue) ExtraValueOrBuilder { private static final long serialVersionUID = 0L; // Use ExtraValue.newBuilder() to construct. private ExtraValue(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private ExtraValue() { items_ = com.google.protobuf.LazyStringArrayList.EMPTY; } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private ExtraValue( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { com.google.protobuf.ByteString bs = input.readBytes(); if (!((mutable_bitField0_ & 0x00000001) == 0x00000001)) { items_ = new com.google.protobuf.LazyStringArrayList(); mutable_bitField0_ |= 0x00000001; } items_.add(bs); break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000001) == 0x00000001)) { items_ = items_.getUnmodifiableView(); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_ExtraValue_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.ExtraValue.class, io.kubernetes.client.proto.V1Certificates.ExtraValue.Builder.class); } public static final int ITEMS_FIELD_NUMBER = 1; private com.google.protobuf.LazyStringList items_; /** repeated string items = 1; */ public com.google.protobuf.ProtocolStringList getItemsList() { return items_; } /** repeated string items = 1; */ public int getItemsCount() { return items_.size(); } /** repeated string items = 1; */ public java.lang.String getItems(int index) { return items_.get(index); } /** repeated string items = 1; */ public com.google.protobuf.ByteString getItemsBytes(int index) { return items_.getByteString(index); } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { for (int i = 0; i < items_.size(); i++) { com.google.protobuf.GeneratedMessageV3.writeString(output, 1, items_.getRaw(i)); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; { int dataSize = 0; for (int i = 0; i < items_.size(); i++) { dataSize += computeStringSizeNoTag(items_.getRaw(i)); } size += dataSize; size += 1 * getItemsList().size(); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof io.kubernetes.client.proto.V1Certificates.ExtraValue)) { return super.equals(obj); } io.kubernetes.client.proto.V1Certificates.ExtraValue other = (io.kubernetes.client.proto.V1Certificates.ExtraValue) obj; boolean result = true; result = result && getItemsList().equals(other.getItemsList()); result = result && unknownFields.equals(other.unknownFields); return result; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (getItemsCount() > 0) { hash = (37 * hash) + ITEMS_FIELD_NUMBER; hash = (53 * hash) + getItemsList().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseDelimitedFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder( io.kubernetes.client.proto.V1Certificates.ExtraValue prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
     * ExtraValue masks the value so protobuf can generate
     * +protobuf.nullable=true
     * +protobuf.options.(gogoproto.goproto_stringer)=false
     * 
* * Protobuf type {@code k8s.io.api.certificates.v1.ExtraValue} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:k8s.io.api.certificates.v1.ExtraValue) io.kubernetes.client.proto.V1Certificates.ExtraValueOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_ExtraValue_fieldAccessorTable .ensureFieldAccessorsInitialized( io.kubernetes.client.proto.V1Certificates.ExtraValue.class, io.kubernetes.client.proto.V1Certificates.ExtraValue.Builder.class); } // Construct using io.kubernetes.client.proto.V1Certificates.ExtraValue.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} } @java.lang.Override public Builder clear() { super.clear(); items_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000001); return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return io.kubernetes.client.proto.V1Certificates .internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.ExtraValue getDefaultInstanceForType() { return io.kubernetes.client.proto.V1Certificates.ExtraValue.getDefaultInstance(); } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.ExtraValue build() { io.kubernetes.client.proto.V1Certificates.ExtraValue result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.ExtraValue buildPartial() { io.kubernetes.client.proto.V1Certificates.ExtraValue result = new io.kubernetes.client.proto.V1Certificates.ExtraValue(this); int from_bitField0_ = bitField0_; if (((bitField0_ & 0x00000001) == 0x00000001)) { items_ = items_.getUnmodifiableView(); bitField0_ = (bitField0_ & ~0x00000001); } result.items_ = items_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return (Builder) super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return (Builder) super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return (Builder) super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return (Builder) super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return (Builder) super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof io.kubernetes.client.proto.V1Certificates.ExtraValue) { return mergeFrom((io.kubernetes.client.proto.V1Certificates.ExtraValue) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(io.kubernetes.client.proto.V1Certificates.ExtraValue other) { if (other == io.kubernetes.client.proto.V1Certificates.ExtraValue.getDefaultInstance()) return this; if (!other.items_.isEmpty()) { if (items_.isEmpty()) { items_ = other.items_; bitField0_ = (bitField0_ & ~0x00000001); } else { ensureItemsIsMutable(); items_.addAll(other.items_); } onChanged(); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { io.kubernetes.client.proto.V1Certificates.ExtraValue parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (io.kubernetes.client.proto.V1Certificates.ExtraValue) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private com.google.protobuf.LazyStringList items_ = com.google.protobuf.LazyStringArrayList.EMPTY; private void ensureItemsIsMutable() { if (!((bitField0_ & 0x00000001) == 0x00000001)) { items_ = new com.google.protobuf.LazyStringArrayList(items_); bitField0_ |= 0x00000001; } } /** repeated string items = 1; */ public com.google.protobuf.ProtocolStringList getItemsList() { return items_.getUnmodifiableView(); } /** repeated string items = 1; */ public int getItemsCount() { return items_.size(); } /** repeated string items = 1; */ public java.lang.String getItems(int index) { return items_.get(index); } /** repeated string items = 1; */ public com.google.protobuf.ByteString getItemsBytes(int index) { return items_.getByteString(index); } /** repeated string items = 1; */ public Builder setItems(int index, java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.set(index, value); onChanged(); return this; } /** repeated string items = 1; */ public Builder addItems(java.lang.String value) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.add(value); onChanged(); return this; } /** repeated string items = 1; */ public Builder addAllItems(java.lang.Iterable values) { ensureItemsIsMutable(); com.google.protobuf.AbstractMessageLite.Builder.addAll(values, items_); onChanged(); return this; } /** repeated string items = 1; */ public Builder clearItems() { items_ = com.google.protobuf.LazyStringArrayList.EMPTY; bitField0_ = (bitField0_ & ~0x00000001); onChanged(); return this; } /** repeated string items = 1; */ public Builder addItemsBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } ensureItemsIsMutable(); items_.add(value); onChanged(); return this; } @java.lang.Override public final Builder setUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:k8s.io.api.certificates.v1.ExtraValue) } // @@protoc_insertion_point(class_scope:k8s.io.api.certificates.v1.ExtraValue) private static final io.kubernetes.client.proto.V1Certificates.ExtraValue DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new io.kubernetes.client.proto.V1Certificates.ExtraValue(); } public static io.kubernetes.client.proto.V1Certificates.ExtraValue getDefaultInstance() { return DEFAULT_INSTANCE; } @java.lang.Deprecated public static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public ExtraValue parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new ExtraValue(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public io.kubernetes.client.proto.V1Certificates.ExtraValue getDefaultInstanceForType() { return DEFAULT_INSTANCE; } } private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_fieldAccessorTable; private static final com.google.protobuf.Descriptors.Descriptor internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor; private static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internal_static_k8s_io_api_certificates_v1_ExtraValue_fieldAccessorTable; public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() { return descriptor; } private static com.google.protobuf.Descriptors.FileDescriptor descriptor; static { java.lang.String[] descriptorData = { "\n*k8s.io/api/certificates/v1/generated.p" + "roto\022\032k8s.io.api.certificates.v1\032\"k8s.io" + "/api/core/v1/generated.proto\0324k8s.io/api" + "machinery/pkg/apis/meta/v1/generated.pro" + "to\032/k8s.io/apimachinery/pkg/runtime/gene" + "rated.proto\0326k8s.io/apimachinery/pkg/run" + "time/schema/generated.proto\"\365\001\n\031Certific" + "ateSigningRequest\022B\n\010metadata\030\001 \001(\01320.k8" + "s.io.apimachinery.pkg.apis.meta.v1.Objec" + "tMeta\022G\n\004spec\030\002 \001(\01329.k8s.io.api.certifi" + "cates.v1.CertificateSigningRequestSpec\022K" + "\n\006status\030\003 \001(\0132;.k8s.io.api.certificates" + ".v1.CertificateSigningRequestStatus\"\357\001\n\"" + "CertificateSigningRequestCondition\022\014\n\004ty" + "pe\030\001 \001(\t\022\016\n\006status\030\006 \001(\t\022\016\n\006reason\030\002 \001(\t" + "\022\017\n\007message\030\003 \001(\t\022B\n\016lastUpdateTime\030\004 \001(" + "\0132*.k8s.io.apimachinery.pkg.apis.meta.v1" + ".Time\022F\n\022lastTransitionTime\030\005 \001(\0132*.k8s." + "io.apimachinery.pkg.apis.meta.v1.Time\"\247\001" + "\n\035CertificateSigningRequestList\022@\n\010metad" + "ata\030\001 \001(\0132..k8s.io.apimachinery.pkg.apis" + ".meta.v1.ListMeta\022D\n\005items\030\002 \003(\01325.k8s.i" + "o.api.certificates.v1.CertificateSigning" + "Request\"\311\002\n\035CertificateSigningRequestSpe" + "c\022\017\n\007request\030\001 \001(\014\022\022\n\nsignerName\030\007 \001(\t\022\031" + "\n\021expirationSeconds\030\010 \001(\005\022\016\n\006usages\030\005 \003(" + "\t\022\020\n\010username\030\002 \001(\t\022\013\n\003uid\030\003 \001(\t\022\016\n\006grou" + "ps\030\004 \003(\t\022S\n\005extra\030\006 \003(\0132D.k8s.io.api.cer" + "tificates.v1.CertificateSigningRequestSp" + "ec.ExtraEntry\032T\n\nExtraEntry\022\013\n\003key\030\001 \001(\t" + "\0225\n\005value\030\002 \001(\0132&.k8s.io.api.certificate" + "s.v1.ExtraValue:\0028\001\"\212\001\n\037CertificateSigni" + "ngRequestStatus\022R\n\nconditions\030\001 \003(\0132>.k8" + "s.io.api.certificates.v1.CertificateSign" + "ingRequestCondition\022\023\n\013certificate\030\002 \001(\014" + "\"\033\n\nExtraValue\022\r\n\005items\030\001 \003(\tB0\n\032io.kube" + "rnetes.client.protoB\016V1CertificatesZ\002v1" }; com.google.protobuf.Descriptors.FileDescriptor.InternalDescriptorAssigner assigner = new com.google.protobuf.Descriptors.FileDescriptor.InternalDescriptorAssigner() { public com.google.protobuf.ExtensionRegistry assignDescriptors( com.google.protobuf.Descriptors.FileDescriptor root) { descriptor = root; return null; } }; com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom( descriptorData, new com.google.protobuf.Descriptors.FileDescriptor[] { io.kubernetes.client.proto.V1.getDescriptor(), io.kubernetes.client.proto.Meta.getDescriptor(), io.kubernetes.client.proto.Runtime.getDescriptor(), io.kubernetes.client.proto.RuntimeSchema.getDescriptor(), }, assigner); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor = getDescriptor().getMessageTypes().get(0); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequest_descriptor, new java.lang.String[] { "Metadata", "Spec", "Status", }); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor = getDescriptor().getMessageTypes().get(1); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestCondition_descriptor, new java.lang.String[] { "Type", "Status", "Reason", "Message", "LastUpdateTime", "LastTransitionTime", }); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor = getDescriptor().getMessageTypes().get(2); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestList_descriptor, new java.lang.String[] { "Metadata", "Items", }); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor = getDescriptor().getMessageTypes().get(3); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor, new java.lang.String[] { "Request", "SignerName", "ExpirationSeconds", "Usages", "Username", "Uid", "Groups", "Extra", }); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_descriptor = internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_descriptor .getNestedTypes() .get(0); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestSpec_ExtraEntry_descriptor, new java.lang.String[] { "Key", "Value", }); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor = getDescriptor().getMessageTypes().get(4); internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_CertificateSigningRequestStatus_descriptor, new java.lang.String[] { "Conditions", "Certificate", }); internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor = getDescriptor().getMessageTypes().get(5); internal_static_k8s_io_api_certificates_v1_ExtraValue_fieldAccessorTable = new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable( internal_static_k8s_io_api_certificates_v1_ExtraValue_descriptor, new java.lang.String[] { "Items", }); io.kubernetes.client.proto.V1.getDescriptor(); io.kubernetes.client.proto.Meta.getDescriptor(); io.kubernetes.client.proto.Runtime.getDescriptor(); io.kubernetes.client.proto.RuntimeSchema.getDescriptor(); } // @@protoc_insertion_point(outer_class_scope) }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy