Class TlsCertificate.Builder

  • All Implemented Interfaces:
    com.google.protobuf.Message.Builder, com.google.protobuf.MessageLite.Builder, com.google.protobuf.MessageLiteOrBuilder, com.google.protobuf.MessageOrBuilder, TlsCertificateOrBuilder, java.lang.Cloneable
    Enclosing class:
    TlsCertificate

    public static final class TlsCertificate.Builder
    extends com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
    implements TlsCertificateOrBuilder
     [#next-free-field: 9]
     
    Protobuf type envoy.extensions.transport_sockets.tls.v3.TlsCertificate
    • Constructor Detail

      • Builder

        private Builder()
      • Builder

        private Builder​(com.google.protobuf.AbstractMessage.BuilderParent parent)
    • Method Detail

      • getDescriptor

        public static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
      • internalGetFieldAccessorTable

        protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()
        Specified by:
        internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
      • maybeForceBuilderInitialization

        private void maybeForceBuilderInitialization()
      • clear

        public TlsCertificate.Builder clear()
        Specified by:
        clear in interface com.google.protobuf.Message.Builder
        Specified by:
        clear in interface com.google.protobuf.MessageLite.Builder
        Overrides:
        clear in class com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
      • getDescriptorForType

        public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
        Specified by:
        getDescriptorForType in interface com.google.protobuf.Message.Builder
        Specified by:
        getDescriptorForType in interface com.google.protobuf.MessageOrBuilder
        Overrides:
        getDescriptorForType in class com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
      • getDefaultInstanceForType

        public TlsCertificate getDefaultInstanceForType()
        Specified by:
        getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuilder
        Specified by:
        getDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilder
      • build

        public TlsCertificate build()
        Specified by:
        build in interface com.google.protobuf.Message.Builder
        Specified by:
        build in interface com.google.protobuf.MessageLite.Builder
      • buildPartial

        public TlsCertificate buildPartial()
        Specified by:
        buildPartial in interface com.google.protobuf.Message.Builder
        Specified by:
        buildPartial in interface com.google.protobuf.MessageLite.Builder
      • buildPartialRepeatedFields

        private void buildPartialRepeatedFields​(TlsCertificate result)
      • buildPartial0

        private void buildPartial0​(TlsCertificate result)
      • mergeFrom

        public TlsCertificate.Builder mergeFrom​(com.google.protobuf.Message other)
        Specified by:
        mergeFrom in interface com.google.protobuf.Message.Builder
        Overrides:
        mergeFrom in class com.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>
      • isInitialized

        public final boolean isInitialized()
        Specified by:
        isInitialized in interface com.google.protobuf.MessageLiteOrBuilder
        Overrides:
        isInitialized in class com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
      • mergeFrom

        public TlsCertificate.Builder mergeFrom​(com.google.protobuf.CodedInputStream input,
                                                com.google.protobuf.ExtensionRegistryLite extensionRegistry)
                                         throws java.io.IOException
        Specified by:
        mergeFrom in interface com.google.protobuf.Message.Builder
        Specified by:
        mergeFrom in interface com.google.protobuf.MessageLite.Builder
        Overrides:
        mergeFrom in class com.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>
        Throws:
        java.io.IOException
      • hasCertificateChain

        public boolean hasCertificateChain()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
        Specified by:
        hasCertificateChain in interface TlsCertificateOrBuilder
        Returns:
        Whether the certificateChain field is set.
      • getCertificateChain

        public DataSource getCertificateChain()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
        Specified by:
        getCertificateChain in interface TlsCertificateOrBuilder
        Returns:
        The certificateChain.
      • setCertificateChain

        public TlsCertificate.Builder setCertificateChain​(DataSource value)
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • setCertificateChain

        public TlsCertificate.Builder setCertificateChain​(DataSource.Builder builderForValue)
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • mergeCertificateChain

        public TlsCertificate.Builder mergeCertificateChain​(DataSource value)
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • clearCertificateChain

        public TlsCertificate.Builder clearCertificateChain()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • getCertificateChainBuilder

        public DataSource.Builder getCertificateChainBuilder()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • getCertificateChainOrBuilder

        public DataSourceOrBuilder getCertificateChainOrBuilder()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
        Specified by:
        getCertificateChainOrBuilder in interface TlsCertificateOrBuilder
      • getCertificateChainFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<DataSource,​DataSource.Builder,​DataSourceOrBuilder> getCertificateChainFieldBuilder()
         The TLS certificate chain.
        
         If ``certificate_chain`` is a filesystem path, a watch will be added to the
         parent directory for any file moves to support rotation. This currently
         only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via
         SDS.
         
        .envoy.config.core.v3.DataSource certificate_chain = 1;
      • hasPrivateKey

        public boolean hasPrivateKey()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
        Specified by:
        hasPrivateKey in interface TlsCertificateOrBuilder
        Returns:
        Whether the privateKey field is set.
      • getPrivateKey

        public DataSource getPrivateKey()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPrivateKey in interface TlsCertificateOrBuilder
        Returns:
        The privateKey.
      • setPrivateKey

        public TlsCertificate.Builder setPrivateKey​(DataSource value)
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • setPrivateKey

        public TlsCertificate.Builder setPrivateKey​(DataSource.Builder builderForValue)
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • mergePrivateKey

        public TlsCertificate.Builder mergePrivateKey​(DataSource value)
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • clearPrivateKey

        public TlsCertificate.Builder clearPrivateKey()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • getPrivateKeyBuilder

        public DataSource.Builder getPrivateKeyBuilder()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • getPrivateKeyOrBuilder

        public DataSourceOrBuilder getPrivateKeyOrBuilder()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPrivateKeyOrBuilder in interface TlsCertificateOrBuilder
      • getPrivateKeyFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<DataSource,​DataSource.Builder,​DataSourceOrBuilder> getPrivateKeyFieldBuilder()
         The TLS private key.
        
         If ``private_key`` is a filesystem path, a watch will be added to the parent
         directory for any file moves to support rotation. This currently only
         applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
         
        .envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
      • hasPkcs12

        public boolean hasPkcs12()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
        Specified by:
        hasPkcs12 in interface TlsCertificateOrBuilder
        Returns:
        Whether the pkcs12 field is set.
      • getPkcs12

        public DataSource getPkcs12()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPkcs12 in interface TlsCertificateOrBuilder
        Returns:
        The pkcs12.
      • setPkcs12

        public TlsCertificate.Builder setPkcs12​(DataSource value)
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • setPkcs12

        public TlsCertificate.Builder setPkcs12​(DataSource.Builder builderForValue)
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • mergePkcs12

        public TlsCertificate.Builder mergePkcs12​(DataSource value)
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • clearPkcs12

        public TlsCertificate.Builder clearPkcs12()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • getPkcs12Builder

        public DataSource.Builder getPkcs12Builder()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • getPkcs12OrBuilder

        public DataSourceOrBuilder getPkcs12OrBuilder()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPkcs12OrBuilder in interface TlsCertificateOrBuilder
      • getPkcs12FieldBuilder

        private com.google.protobuf.SingleFieldBuilder<DataSource,​DataSource.Builder,​DataSourceOrBuilder> getPkcs12FieldBuilder()
         ``Pkcs12`` data containing TLS certificate, chain, and private key.
        
         If ``pkcs12`` is a filesystem path, the file will be read, but no watch will
         be added to the parent directory, since ``pkcs12`` isn't used by SDS.
         This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``.
         This can't be marked as ``oneof`` due to API compatibility reasons. Setting
         both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`,
         :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`,
         or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>`
         and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>`
         fields will result in an error. Use :ref:`password
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>`
         to specify the password to unprotect the ``PKCS12`` data, if necessary.
         
        .envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
      • hasWatchedDirectory

        public boolean hasWatchedDirectory()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
        Specified by:
        hasWatchedDirectory in interface TlsCertificateOrBuilder
        Returns:
        Whether the watchedDirectory field is set.
      • getWatchedDirectory

        public WatchedDirectory getWatchedDirectory()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
        Specified by:
        getWatchedDirectory in interface TlsCertificateOrBuilder
        Returns:
        The watchedDirectory.
      • setWatchedDirectory

        public TlsCertificate.Builder setWatchedDirectory​(WatchedDirectory value)
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • setWatchedDirectory

        public TlsCertificate.Builder setWatchedDirectory​(WatchedDirectory.Builder builderForValue)
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • mergeWatchedDirectory

        public TlsCertificate.Builder mergeWatchedDirectory​(WatchedDirectory value)
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • clearWatchedDirectory

        public TlsCertificate.Builder clearWatchedDirectory()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • getWatchedDirectoryBuilder

        public WatchedDirectory.Builder getWatchedDirectoryBuilder()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • getWatchedDirectoryOrBuilder

        public WatchedDirectoryOrBuilder getWatchedDirectoryOrBuilder()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
        Specified by:
        getWatchedDirectoryOrBuilder in interface TlsCertificateOrBuilder
      • getWatchedDirectoryFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<WatchedDirectory,​WatchedDirectory.Builder,​WatchedDirectoryOrBuilder> getWatchedDirectoryFieldBuilder()
         If specified, updates of file-based ``certificate_chain`` and ``private_key``
         sources will be triggered by this watch. The certificate/key pair will be
         read together and validated for atomic read consistency (i.e. no
         intervening modification occurred between cert/key read, verified by file
         hash comparisons). This allows explicit control over the path watched, by
         default the parent directories of the filesystem paths in
         ``certificate_chain`` and ``private_key`` are watched if this field is not
         specified. This only applies when a ``TlsCertificate`` is delivered by SDS
         with references to filesystem paths. See the :ref:`SDS key rotation
         <sds_key_rotation>` documentation for further details.
         
        .envoy.config.core.v3.WatchedDirectory watched_directory = 7;
      • hasPrivateKeyProvider

        public boolean hasPrivateKeyProvider()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
        Specified by:
        hasPrivateKeyProvider in interface TlsCertificateOrBuilder
        Returns:
        Whether the privateKeyProvider field is set.
      • getPrivateKeyProvider

        public PrivateKeyProvider getPrivateKeyProvider()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
        Specified by:
        getPrivateKeyProvider in interface TlsCertificateOrBuilder
        Returns:
        The privateKeyProvider.
      • setPrivateKeyProvider

        public TlsCertificate.Builder setPrivateKeyProvider​(PrivateKeyProvider value)
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • setPrivateKeyProvider

        public TlsCertificate.Builder setPrivateKeyProvider​(PrivateKeyProvider.Builder builderForValue)
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • mergePrivateKeyProvider

        public TlsCertificate.Builder mergePrivateKeyProvider​(PrivateKeyProvider value)
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • clearPrivateKeyProvider

        public TlsCertificate.Builder clearPrivateKeyProvider()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • getPrivateKeyProviderBuilder

        public PrivateKeyProvider.Builder getPrivateKeyProviderBuilder()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • getPrivateKeyProviderOrBuilder

        public PrivateKeyProviderOrBuilder getPrivateKeyProviderOrBuilder()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
        Specified by:
        getPrivateKeyProviderOrBuilder in interface TlsCertificateOrBuilder
      • getPrivateKeyProviderFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<PrivateKeyProvider,​PrivateKeyProvider.Builder,​PrivateKeyProviderOrBuilder> getPrivateKeyProviderFieldBuilder()
         BoringSSL private key method provider. This is an alternative to :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be
         marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and
         :ref:`private_key_provider
         <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an
         error.
         
        .envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
      • hasPassword

        public boolean hasPassword()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
        Specified by:
        hasPassword in interface TlsCertificateOrBuilder
        Returns:
        Whether the password field is set.
      • getPassword

        public DataSource getPassword()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPassword in interface TlsCertificateOrBuilder
        Returns:
        The password.
      • setPassword

        public TlsCertificate.Builder setPassword​(DataSource value)
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • setPassword

        public TlsCertificate.Builder setPassword​(DataSource.Builder builderForValue)
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • mergePassword

        public TlsCertificate.Builder mergePassword​(DataSource value)
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • clearPassword

        public TlsCertificate.Builder clearPassword()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • getPasswordBuilder

        public DataSource.Builder getPasswordBuilder()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • getPasswordOrBuilder

        public DataSourceOrBuilder getPasswordOrBuilder()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
        Specified by:
        getPasswordOrBuilder in interface TlsCertificateOrBuilder
      • getPasswordFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<DataSource,​DataSource.Builder,​DataSourceOrBuilder> getPasswordFieldBuilder()
         The password to decrypt the TLS private key. If this field is not set, it is assumed that the
         TLS private key is not password encrypted.
         
        .envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
      • hasOcspStaple

        public boolean hasOcspStaple()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
        Specified by:
        hasOcspStaple in interface TlsCertificateOrBuilder
        Returns:
        Whether the ocspStaple field is set.
      • getOcspStaple

        public DataSource getOcspStaple()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
        Specified by:
        getOcspStaple in interface TlsCertificateOrBuilder
        Returns:
        The ocspStaple.
      • setOcspStaple

        public TlsCertificate.Builder setOcspStaple​(DataSource value)
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • setOcspStaple

        public TlsCertificate.Builder setOcspStaple​(DataSource.Builder builderForValue)
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • mergeOcspStaple

        public TlsCertificate.Builder mergeOcspStaple​(DataSource value)
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • clearOcspStaple

        public TlsCertificate.Builder clearOcspStaple()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • getOcspStapleBuilder

        public DataSource.Builder getOcspStapleBuilder()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • getOcspStapleOrBuilder

        public DataSourceOrBuilder getOcspStapleOrBuilder()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
        Specified by:
        getOcspStapleOrBuilder in interface TlsCertificateOrBuilder
      • getOcspStapleFieldBuilder

        private com.google.protobuf.SingleFieldBuilder<DataSource,​DataSource.Builder,​DataSourceOrBuilder> getOcspStapleFieldBuilder()
         The OCSP response to be stapled with this certificate during the handshake.
         The response must be DER-encoded and may only be  provided via ``filename`` or
         ``inline_bytes``. The response may pertain to only one certificate.
         
        .envoy.config.core.v3.DataSource ocsp_staple = 4;
      • ensureSignedCertificateTimestampIsMutable

        private void ensureSignedCertificateTimestampIsMutable()
      • setSignedCertificateTimestamp

        public TlsCertificate.Builder setSignedCertificateTimestamp​(int index,
                                                                    DataSource value)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • setSignedCertificateTimestamp

        public TlsCertificate.Builder setSignedCertificateTimestamp​(int index,
                                                                    DataSource.Builder builderForValue)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestamp

        public TlsCertificate.Builder addSignedCertificateTimestamp​(DataSource value)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestamp

        public TlsCertificate.Builder addSignedCertificateTimestamp​(int index,
                                                                    DataSource value)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestamp

        public TlsCertificate.Builder addSignedCertificateTimestamp​(DataSource.Builder builderForValue)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestamp

        public TlsCertificate.Builder addSignedCertificateTimestamp​(int index,
                                                                    DataSource.Builder builderForValue)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addAllSignedCertificateTimestamp

        public TlsCertificate.Builder addAllSignedCertificateTimestamp​(java.lang.Iterable<? extends DataSource> values)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • clearSignedCertificateTimestamp

        public TlsCertificate.Builder clearSignedCertificateTimestamp()
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • removeSignedCertificateTimestamp

        public TlsCertificate.Builder removeSignedCertificateTimestamp​(int index)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • getSignedCertificateTimestampBuilder

        public DataSource.Builder getSignedCertificateTimestampBuilder​(int index)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestampBuilder

        public DataSource.Builder addSignedCertificateTimestampBuilder()
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • addSignedCertificateTimestampBuilder

        public DataSource.Builder addSignedCertificateTimestampBuilder​(int index)
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
      • getSignedCertificateTimestampBuilderList

        public java.util.List<DataSource.Builder> getSignedCertificateTimestampBuilderList()
         [#not-implemented-hide:]
         
        repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;