Class TlsCertificate.Builder
java.lang.Object
com.google.protobuf.AbstractMessageLite.Builder
com.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>
com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
io.envoyproxy.envoy.extensions.transport_sockets.tls.v3.TlsCertificate.Builder
- All Implemented Interfaces:
com.google.protobuf.Message.Builder
,com.google.protobuf.MessageLite.Builder
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,TlsCertificateOrBuilder
,Cloneable
- Enclosing class:
TlsCertificate
public static final class TlsCertificate.Builder
extends com.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
implements TlsCertificateOrBuilder
[#next-free-field: 9]Protobuf type
envoy.extensions.transport_sockets.tls.v3.TlsCertificate
-
Field Summary
FieldsModifier and TypeFieldDescriptionprivate int
private DataSource
private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private DataSource
private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private DataSource
private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private DataSource
private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private DataSource
private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private PrivateKeyProvider
private com.google.protobuf.SingleFieldBuilder
<PrivateKeyProvider, PrivateKeyProvider.Builder, PrivateKeyProviderOrBuilder> private List
<DataSource> private com.google.protobuf.RepeatedFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> private WatchedDirectory
private com.google.protobuf.SingleFieldBuilder
<WatchedDirectory, WatchedDirectory.Builder, WatchedDirectoryOrBuilder> -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionaddAllSignedCertificateTimestamp
(Iterable<? extends DataSource> values) [#not-implemented-hide:]addSignedCertificateTimestamp
(int index, DataSource value) [#not-implemented-hide:]addSignedCertificateTimestamp
(int index, DataSource.Builder builderForValue) [#not-implemented-hide:][#not-implemented-hide:]addSignedCertificateTimestamp
(DataSource.Builder builderForValue) [#not-implemented-hide:][#not-implemented-hide:]addSignedCertificateTimestampBuilder
(int index) [#not-implemented-hide:]build()
private void
buildPartial0
(TlsCertificate result) private void
clear()
The TLS certificate chain.The OCSP response to be stapled with this certificate during the handshake.The password to decrypt the TLS private key.``Pkcs12`` data containing TLS certificate, chain, and private key.The TLS private key.BoringSSL private key method provider.[#not-implemented-hide:]If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.private void
The TLS certificate chain.The TLS certificate chain.private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> The TLS certificate chain.The TLS certificate chain.static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Descriptors.Descriptor
The OCSP response to be stapled with this certificate during the handshake.The OCSP response to be stapled with this certificate during the handshake.private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> The OCSP response to be stapled with this certificate during the handshake.The OCSP response to be stapled with this certificate during the handshake.The password to decrypt the TLS private key.The password to decrypt the TLS private key.private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> The password to decrypt the TLS private key.The password to decrypt the TLS private key.``Pkcs12`` data containing TLS certificate, chain, and private key.``Pkcs12`` data containing TLS certificate, chain, and private key.private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> ``Pkcs12`` data containing TLS certificate, chain, and private key.``Pkcs12`` data containing TLS certificate, chain, and private key.The TLS private key.The TLS private key.private com.google.protobuf.SingleFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> The TLS private key.The TLS private key.BoringSSL private key method provider.BoringSSL private key method provider.private com.google.protobuf.SingleFieldBuilder
<PrivateKeyProvider, PrivateKeyProvider.Builder, PrivateKeyProviderOrBuilder> BoringSSL private key method provider.BoringSSL private key method provider.getSignedCertificateTimestamp
(int index) [#not-implemented-hide:]getSignedCertificateTimestampBuilder
(int index) [#not-implemented-hide:][#not-implemented-hide:]int
[#not-implemented-hide:]private com.google.protobuf.RepeatedFieldBuilder
<DataSource, DataSource.Builder, DataSourceOrBuilder> [#not-implemented-hide:]getSignedCertificateTimestampOrBuilder
(int index) [#not-implemented-hide:]List
<? extends DataSourceOrBuilder> [#not-implemented-hide:]If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.private com.google.protobuf.SingleFieldBuilder
<WatchedDirectory, WatchedDirectory.Builder, WatchedDirectoryOrBuilder> If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.boolean
The TLS certificate chain.boolean
The OCSP response to be stapled with this certificate during the handshake.boolean
The password to decrypt the TLS private key.boolean
``Pkcs12`` data containing TLS certificate, chain, and private key.boolean
The TLS private key.boolean
BoringSSL private key method provider.boolean
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
final boolean
private void
mergeCertificateChain
(DataSource value) The TLS certificate chain.mergeFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) mergeFrom
(com.google.protobuf.Message other) mergeFrom
(TlsCertificate other) mergeOcspStaple
(DataSource value) The OCSP response to be stapled with this certificate during the handshake.mergePassword
(DataSource value) The password to decrypt the TLS private key.mergePkcs12
(DataSource value) ``Pkcs12`` data containing TLS certificate, chain, and private key.mergePrivateKey
(DataSource value) The TLS private key.BoringSSL private key method provider.If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.removeSignedCertificateTimestamp
(int index) [#not-implemented-hide:]setCertificateChain
(DataSource value) The TLS certificate chain.setCertificateChain
(DataSource.Builder builderForValue) The TLS certificate chain.setOcspStaple
(DataSource value) The OCSP response to be stapled with this certificate during the handshake.setOcspStaple
(DataSource.Builder builderForValue) The OCSP response to be stapled with this certificate during the handshake.setPassword
(DataSource value) The password to decrypt the TLS private key.setPassword
(DataSource.Builder builderForValue) The password to decrypt the TLS private key.setPkcs12
(DataSource value) ``Pkcs12`` data containing TLS certificate, chain, and private key.setPkcs12
(DataSource.Builder builderForValue) ``Pkcs12`` data containing TLS certificate, chain, and private key.setPrivateKey
(DataSource value) The TLS private key.setPrivateKey
(DataSource.Builder builderForValue) The TLS private key.BoringSSL private key method provider.setPrivateKeyProvider
(PrivateKeyProvider.Builder builderForValue) BoringSSL private key method provider.setSignedCertificateTimestamp
(int index, DataSource value) [#not-implemented-hide:]setSignedCertificateTimestamp
(int index, DataSource.Builder builderForValue) [#not-implemented-hide:]If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.setWatchedDirectory
(WatchedDirectory.Builder builderForValue) If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch.Methods inherited from class com.google.protobuf.GeneratedMessage.Builder
addRepeatedField, clearField, clearOneof, clone, getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, getUnknownFieldSetBuilder, hasField, hasOneof, internalGetMapField, internalGetMapFieldReflection, internalGetMutableMapField, internalGetMutableMapFieldReflection, isClean, markClean, mergeUnknownFields, mergeUnknownLengthDelimitedField, mergeUnknownVarintField, newBuilderForField, onBuilt, onChanged, parseUnknownField, setField, setRepeatedField, setUnknownFields, setUnknownFieldSetBuilder, setUnknownFieldsProto3
Methods inherited from class com.google.protobuf.AbstractMessage.Builder
findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite.Builder
addAll, addAll, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, newUninitializedMessageException
Methods inherited from class java.lang.Object
equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.Message.Builder
mergeDelimitedFrom, mergeDelimitedFrom
Methods inherited from interface com.google.protobuf.MessageLite.Builder
mergeFrom
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof
-
Field Details
-
bitField0_
private int bitField0_ -
certificateChain_
-
certificateChainBuilder_
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, certificateChainBuilder_DataSourceOrBuilder> -
privateKey_
-
privateKeyBuilder_
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, privateKeyBuilder_DataSourceOrBuilder> -
pkcs12_
-
pkcs12Builder_
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, pkcs12Builder_DataSourceOrBuilder> -
watchedDirectory_
-
watchedDirectoryBuilder_
private com.google.protobuf.SingleFieldBuilder<WatchedDirectory,WatchedDirectory.Builder, watchedDirectoryBuilder_WatchedDirectoryOrBuilder> -
privateKeyProvider_
-
privateKeyProviderBuilder_
private com.google.protobuf.SingleFieldBuilder<PrivateKeyProvider,PrivateKeyProvider.Builder, privateKeyProviderBuilder_PrivateKeyProviderOrBuilder> -
password_
-
passwordBuilder_
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, passwordBuilder_DataSourceOrBuilder> -
ocspStaple_
-
ocspStapleBuilder_
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, ocspStapleBuilder_DataSourceOrBuilder> -
signedCertificateTimestamp_
-
signedCertificateTimestampBuilder_
private com.google.protobuf.RepeatedFieldBuilder<DataSource,DataSource.Builder, signedCertificateTimestampBuilder_DataSourceOrBuilder>
-
-
Constructor Details
-
Builder
private Builder() -
Builder
private Builder(com.google.protobuf.AbstractMessage.BuilderParent parent)
-
-
Method Details
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
-
maybeForceBuilderInitialization
private void maybeForceBuilderInitialization() -
clear
- Specified by:
clear
in interfacecom.google.protobuf.Message.Builder
- Specified by:
clear
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
clear
in classcom.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
-
getDescriptorForType
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.Message.Builder
- Specified by:
getDescriptorForType
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getDescriptorForType
in classcom.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-
build
- Specified by:
build
in interfacecom.google.protobuf.Message.Builder
- Specified by:
build
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartial
- Specified by:
buildPartial
in interfacecom.google.protobuf.Message.Builder
- Specified by:
buildPartial
in interfacecom.google.protobuf.MessageLite.Builder
-
buildPartialRepeatedFields
-
buildPartial0
-
mergeFrom
- Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>
-
mergeFrom
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessage.Builder<TlsCertificate.Builder>
-
mergeFrom
public TlsCertificate.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Specified by:
mergeFrom
in interfacecom.google.protobuf.Message.Builder
- Specified by:
mergeFrom
in interfacecom.google.protobuf.MessageLite.Builder
- Overrides:
mergeFrom
in classcom.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>
- Throws:
IOException
-
hasCertificateChain
public boolean hasCertificateChain()The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
- Specified by:
hasCertificateChain
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the certificateChain field is set.
-
getCertificateChain
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
- Specified by:
getCertificateChain
in interfaceTlsCertificateOrBuilder
- Returns:
- The certificateChain.
-
setCertificateChain
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
setCertificateChain
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
mergeCertificateChain
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
clearCertificateChain
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
getCertificateChainBuilder
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
getCertificateChainOrBuilder
The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
- Specified by:
getCertificateChainOrBuilder
in interfaceTlsCertificateOrBuilder
-
getCertificateChainFieldBuilder
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, getCertificateChainFieldBuilder()DataSourceOrBuilder> The TLS certificate chain. If ``certificate_chain`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource certificate_chain = 1;
-
hasPrivateKey
public boolean hasPrivateKey()The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
- Specified by:
hasPrivateKey
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the privateKey field is set.
-
getPrivateKey
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPrivateKey
in interfaceTlsCertificateOrBuilder
- Returns:
- The privateKey.
-
setPrivateKey
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
setPrivateKey
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
mergePrivateKey
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
clearPrivateKey
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
getPrivateKeyBuilder
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
getPrivateKeyOrBuilder
The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPrivateKeyOrBuilder
in interfaceTlsCertificateOrBuilder
-
getPrivateKeyFieldBuilder
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, getPrivateKeyFieldBuilder()DataSourceOrBuilder> The TLS private key. If ``private_key`` is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the ``TlsCertificate`` is delivered via SDS.
.envoy.config.core.v3.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];
-
hasPkcs12
public boolean hasPkcs12()``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
- Specified by:
hasPkcs12
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the pkcs12 field is set.
-
getPkcs12
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPkcs12
in interfaceTlsCertificateOrBuilder
- Returns:
- The pkcs12.
-
setPkcs12
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
setPkcs12
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
mergePkcs12
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
clearPkcs12
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
getPkcs12Builder
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
getPkcs12OrBuilder
``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPkcs12OrBuilder
in interfaceTlsCertificateOrBuilder
-
getPkcs12FieldBuilder
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, getPkcs12FieldBuilder()DataSourceOrBuilder> ``Pkcs12`` data containing TLS certificate, chain, and private key. If ``pkcs12`` is a filesystem path, the file will be read, but no watch will be added to the parent directory, since ``pkcs12`` isn't used by SDS. This field is mutually exclusive with ``certificate_chain``, ``private_key`` and ``private_key_provider``. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>`, :ref:`certificate_chain <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.certificate_chain>`, or :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` and :ref:`pkcs12 <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.pkcs12>` fields will result in an error. Use :ref:`password <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.password>` to specify the password to unprotect the ``PKCS12`` data, if necessary.
.envoy.config.core.v3.DataSource pkcs12 = 8 [(.udpa.annotations.sensitive) = true];
-
hasWatchedDirectory
public boolean hasWatchedDirectory()If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
- Specified by:
hasWatchedDirectory
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the watchedDirectory field is set.
-
getWatchedDirectory
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
- Specified by:
getWatchedDirectory
in interfaceTlsCertificateOrBuilder
- Returns:
- The watchedDirectory.
-
setWatchedDirectory
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
setWatchedDirectory
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
mergeWatchedDirectory
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
clearWatchedDirectory
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
getWatchedDirectoryBuilder
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
getWatchedDirectoryOrBuilder
If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
- Specified by:
getWatchedDirectoryOrBuilder
in interfaceTlsCertificateOrBuilder
-
getWatchedDirectoryFieldBuilder
private com.google.protobuf.SingleFieldBuilder<WatchedDirectory,WatchedDirectory.Builder, getWatchedDirectoryFieldBuilder()WatchedDirectoryOrBuilder> If specified, updates of file-based ``certificate_chain`` and ``private_key`` sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in ``certificate_chain`` and ``private_key`` are watched if this field is not specified. This only applies when a ``TlsCertificate`` is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v3.WatchedDirectory watched_directory = 7;
-
hasPrivateKeyProvider
public boolean hasPrivateKeyProvider()BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
- Specified by:
hasPrivateKeyProvider
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the privateKeyProvider field is set.
-
getPrivateKeyProvider
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
- Specified by:
getPrivateKeyProvider
in interfaceTlsCertificateOrBuilder
- Returns:
- The privateKeyProvider.
-
setPrivateKeyProvider
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
setPrivateKeyProvider
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
mergePrivateKeyProvider
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
clearPrivateKeyProvider
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
getPrivateKeyProviderBuilder
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
getPrivateKeyProviderOrBuilder
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
- Specified by:
getPrivateKeyProviderOrBuilder
in interfaceTlsCertificateOrBuilder
-
getPrivateKeyProviderFieldBuilder
private com.google.protobuf.SingleFieldBuilder<PrivateKeyProvider,PrivateKeyProvider.Builder, getPrivateKeyProviderFieldBuilder()PrivateKeyProviderOrBuilder> BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_v3_api_field_extensions.transport_sockets.tls.v3.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v3.PrivateKeyProvider private_key_provider = 6;
-
hasPassword
public boolean hasPassword()The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
- Specified by:
hasPassword
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the password field is set.
-
getPassword
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPassword
in interfaceTlsCertificateOrBuilder
- Returns:
- The password.
-
setPassword
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
setPassword
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
mergePassword
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
clearPassword
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
getPasswordBuilder
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
getPasswordOrBuilder
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
- Specified by:
getPasswordOrBuilder
in interfaceTlsCertificateOrBuilder
-
getPasswordFieldBuilder
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, getPasswordFieldBuilder()DataSourceOrBuilder> The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v3.DataSource password = 3 [(.udpa.annotations.sensitive) = true];
-
hasOcspStaple
public boolean hasOcspStaple()The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
- Specified by:
hasOcspStaple
in interfaceTlsCertificateOrBuilder
- Returns:
- Whether the ocspStaple field is set.
-
getOcspStaple
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
- Specified by:
getOcspStaple
in interfaceTlsCertificateOrBuilder
- Returns:
- The ocspStaple.
-
setOcspStaple
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
setOcspStaple
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
mergeOcspStaple
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
clearOcspStaple
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
getOcspStapleBuilder
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
getOcspStapleOrBuilder
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
- Specified by:
getOcspStapleOrBuilder
in interfaceTlsCertificateOrBuilder
-
getOcspStapleFieldBuilder
private com.google.protobuf.SingleFieldBuilder<DataSource,DataSource.Builder, getOcspStapleFieldBuilder()DataSourceOrBuilder> The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v3.DataSource ocsp_staple = 4;
-
ensureSignedCertificateTimestampIsMutable
private void ensureSignedCertificateTimestampIsMutable() -
getSignedCertificateTimestampList
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
- Specified by:
getSignedCertificateTimestampList
in interfaceTlsCertificateOrBuilder
-
getSignedCertificateTimestampCount
public int getSignedCertificateTimestampCount()[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
- Specified by:
getSignedCertificateTimestampCount
in interfaceTlsCertificateOrBuilder
-
getSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
- Specified by:
getSignedCertificateTimestamp
in interfaceTlsCertificateOrBuilder
-
setSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
setSignedCertificateTimestamp
public TlsCertificate.Builder setSignedCertificateTimestamp(int index, DataSource.Builder builderForValue) [#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addSignedCertificateTimestamp
public TlsCertificate.Builder addSignedCertificateTimestamp(int index, DataSource.Builder builderForValue) [#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addAllSignedCertificateTimestamp
public TlsCertificate.Builder addAllSignedCertificateTimestamp(Iterable<? extends DataSource> values) [#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
clearSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
removeSignedCertificateTimestamp
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
getSignedCertificateTimestampBuilder
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
getSignedCertificateTimestampOrBuilder
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
- Specified by:
getSignedCertificateTimestampOrBuilder
in interfaceTlsCertificateOrBuilder
-
getSignedCertificateTimestampOrBuilderList
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
- Specified by:
getSignedCertificateTimestampOrBuilderList
in interfaceTlsCertificateOrBuilder
-
addSignedCertificateTimestampBuilder
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
addSignedCertificateTimestampBuilder
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
getSignedCertificateTimestampBuilderList
[#not-implemented-hide:]
repeated .envoy.config.core.v3.DataSource signed_certificate_timestamp = 5;
-
getSignedCertificateTimestampFieldBuilder
private com.google.protobuf.RepeatedFieldBuilder<DataSource,DataSource.Builder, getSignedCertificateTimestampFieldBuilder()DataSourceOrBuilder>
-