public static final class TlsCertificate.Builder extends com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder> implements TlsCertificateOrBuilder
[#next-free-field: 8]Protobuf type
envoy.extensions.transport_sockets.tls.v4alpha.TlsCertificate| Modifier and Type | Method and Description |
|---|---|
TlsCertificate.Builder |
addAllSignedCertificateTimestamp(Iterable<? extends DataSource> values)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
TlsCertificate.Builder |
addSignedCertificateTimestamp(DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
addSignedCertificateTimestamp(DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
addSignedCertificateTimestamp(int index,
DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
addSignedCertificateTimestamp(int index,
DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
DataSource.Builder |
addSignedCertificateTimestampBuilder()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
DataSource.Builder |
addSignedCertificateTimestampBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate |
build() |
TlsCertificate |
buildPartial() |
TlsCertificate.Builder |
clear() |
TlsCertificate.Builder |
clearCertificateChain()
The TLS certificate chain.
|
TlsCertificate.Builder |
clearField(com.google.protobuf.Descriptors.FieldDescriptor field) |
TlsCertificate.Builder |
clearOcspStaple()
The OCSP response to be stapled with this certificate during the handshake.
|
TlsCertificate.Builder |
clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) |
TlsCertificate.Builder |
clearPassword()
The password to decrypt the TLS private key.
|
TlsCertificate.Builder |
clearPrivateKey()
The TLS private key.
|
TlsCertificate.Builder |
clearPrivateKeyProvider()
BoringSSL private key method provider.
|
TlsCertificate.Builder |
clearSignedCertificateTimestamp()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
clearWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
TlsCertificate.Builder |
clone() |
DataSource |
getCertificateChain()
The TLS certificate chain.
|
DataSource.Builder |
getCertificateChainBuilder()
The TLS certificate chain.
|
DataSourceOrBuilder |
getCertificateChainOrBuilder()
The TLS certificate chain.
|
TlsCertificate |
getDefaultInstanceForType() |
static com.google.protobuf.Descriptors.Descriptor |
getDescriptor() |
com.google.protobuf.Descriptors.Descriptor |
getDescriptorForType() |
DataSource |
getOcspStaple()
The OCSP response to be stapled with this certificate during the handshake.
|
DataSource.Builder |
getOcspStapleBuilder()
The OCSP response to be stapled with this certificate during the handshake.
|
DataSourceOrBuilder |
getOcspStapleOrBuilder()
The OCSP response to be stapled with this certificate during the handshake.
|
DataSource |
getPassword()
The password to decrypt the TLS private key.
|
DataSource.Builder |
getPasswordBuilder()
The password to decrypt the TLS private key.
|
DataSourceOrBuilder |
getPasswordOrBuilder()
The password to decrypt the TLS private key.
|
DataSource |
getPrivateKey()
The TLS private key.
|
DataSource.Builder |
getPrivateKeyBuilder()
The TLS private key.
|
DataSourceOrBuilder |
getPrivateKeyOrBuilder()
The TLS private key.
|
PrivateKeyProvider |
getPrivateKeyProvider()
BoringSSL private key method provider.
|
PrivateKeyProvider.Builder |
getPrivateKeyProviderBuilder()
BoringSSL private key method provider.
|
PrivateKeyProviderOrBuilder |
getPrivateKeyProviderOrBuilder()
BoringSSL private key method provider.
|
DataSource |
getSignedCertificateTimestamp(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
DataSource.Builder |
getSignedCertificateTimestampBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
List<DataSource.Builder> |
getSignedCertificateTimestampBuilderList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
int |
getSignedCertificateTimestampCount()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
List<DataSource> |
getSignedCertificateTimestampList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
DataSourceOrBuilder |
getSignedCertificateTimestampOrBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
List<? extends DataSourceOrBuilder> |
getSignedCertificateTimestampOrBuilderList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
WatchedDirectory |
getWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
WatchedDirectory.Builder |
getWatchedDirectoryBuilder()
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
WatchedDirectoryOrBuilder |
getWatchedDirectoryOrBuilder()
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
boolean |
hasCertificateChain()
The TLS certificate chain.
|
boolean |
hasOcspStaple()
The OCSP response to be stapled with this certificate during the handshake.
|
boolean |
hasPassword()
The password to decrypt the TLS private key.
|
boolean |
hasPrivateKey()
The TLS private key.
|
boolean |
hasPrivateKeyProvider()
BoringSSL private key method provider.
|
boolean |
hasWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable |
internalGetFieldAccessorTable() |
boolean |
isInitialized() |
TlsCertificate.Builder |
mergeCertificateChain(DataSource value)
The TLS certificate chain.
|
TlsCertificate.Builder |
mergeFrom(com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry) |
TlsCertificate.Builder |
mergeFrom(com.google.protobuf.Message other) |
TlsCertificate.Builder |
mergeFrom(TlsCertificate other) |
TlsCertificate.Builder |
mergeOcspStaple(DataSource value)
The OCSP response to be stapled with this certificate during the handshake.
|
TlsCertificate.Builder |
mergePassword(DataSource value)
The password to decrypt the TLS private key.
|
TlsCertificate.Builder |
mergePrivateKey(DataSource value)
The TLS private key.
|
TlsCertificate.Builder |
mergePrivateKeyProvider(PrivateKeyProvider value)
BoringSSL private key method provider.
|
TlsCertificate.Builder |
mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
TlsCertificate.Builder |
mergeWatchedDirectory(WatchedDirectory value)
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
TlsCertificate.Builder |
removeSignedCertificateTimestamp(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
setCertificateChain(DataSource.Builder builderForValue)
The TLS certificate chain.
|
TlsCertificate.Builder |
setCertificateChain(DataSource value)
The TLS certificate chain.
|
TlsCertificate.Builder |
setField(com.google.protobuf.Descriptors.FieldDescriptor field,
Object value) |
TlsCertificate.Builder |
setOcspStaple(DataSource.Builder builderForValue)
The OCSP response to be stapled with this certificate during the handshake.
|
TlsCertificate.Builder |
setOcspStaple(DataSource value)
The OCSP response to be stapled with this certificate during the handshake.
|
TlsCertificate.Builder |
setPassword(DataSource.Builder builderForValue)
The password to decrypt the TLS private key.
|
TlsCertificate.Builder |
setPassword(DataSource value)
The password to decrypt the TLS private key.
|
TlsCertificate.Builder |
setPrivateKey(DataSource.Builder builderForValue)
The TLS private key.
|
TlsCertificate.Builder |
setPrivateKey(DataSource value)
The TLS private key.
|
TlsCertificate.Builder |
setPrivateKeyProvider(PrivateKeyProvider.Builder builderForValue)
BoringSSL private key method provider.
|
TlsCertificate.Builder |
setPrivateKeyProvider(PrivateKeyProvider value)
BoringSSL private key method provider.
|
TlsCertificate.Builder |
setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field,
int index,
Object value) |
TlsCertificate.Builder |
setSignedCertificateTimestamp(int index,
DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
setSignedCertificateTimestamp(int index,
DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5; |
TlsCertificate.Builder |
setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields) |
TlsCertificate.Builder |
setWatchedDirectory(WatchedDirectory.Builder builderForValue)
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
TlsCertificate.Builder |
setWatchedDirectory(WatchedDirectory value)
If specified, updates of file-based *certificate_chain* and *private_key*
sources will be triggered by this watch.
|
getAllFields, getField, getFieldBuilder, getOneofFieldDescriptor, getParentForChildren, getRepeatedField, getRepeatedFieldBuilder, getRepeatedFieldCount, getUnknownFields, hasField, hasOneof, internalGetMapField, internalGetMutableMapField, isClean, markClean, newBuilderForField, onBuilt, onChanged, setUnknownFieldsProto3findInitializationErrors, getInitializationErrorString, internalMergeFrom, mergeDelimitedFrom, mergeDelimitedFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, mergeFrom, newUninitializedMessageException, toStringaddAll, addAll, mergeFrom, newUninitializedMessageExceptionequals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, waitpublic static final com.google.protobuf.Descriptors.Descriptor getDescriptor()
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
internalGetFieldAccessorTable in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder clear()
clear in interface com.google.protobuf.Message.Builderclear in interface com.google.protobuf.MessageLite.Builderclear in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public com.google.protobuf.Descriptors.Descriptor getDescriptorForType()
getDescriptorForType in interface com.google.protobuf.Message.BuildergetDescriptorForType in interface com.google.protobuf.MessageOrBuildergetDescriptorForType in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate getDefaultInstanceForType()
getDefaultInstanceForType in interface com.google.protobuf.MessageLiteOrBuildergetDefaultInstanceForType in interface com.google.protobuf.MessageOrBuilderpublic TlsCertificate build()
build in interface com.google.protobuf.Message.Builderbuild in interface com.google.protobuf.MessageLite.Builderpublic TlsCertificate buildPartial()
buildPartial in interface com.google.protobuf.Message.BuilderbuildPartial in interface com.google.protobuf.MessageLite.Builderpublic TlsCertificate.Builder clone()
clone in interface com.google.protobuf.Message.Builderclone in interface com.google.protobuf.MessageLite.Builderclone in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder setField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
setField in interface com.google.protobuf.Message.BuildersetField in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field)
clearField in interface com.google.protobuf.Message.BuilderclearField in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof)
clearOneof in interface com.google.protobuf.Message.BuilderclearOneof in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder setRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, int index, Object value)
setRepeatedField in interface com.google.protobuf.Message.BuildersetRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder addRepeatedField(com.google.protobuf.Descriptors.FieldDescriptor field, Object value)
addRepeatedField in interface com.google.protobuf.Message.BuilderaddRepeatedField in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder mergeFrom(com.google.protobuf.Message other)
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>public TlsCertificate.Builder mergeFrom(TlsCertificate other)
public final boolean isInitialized()
isInitialized in interface com.google.protobuf.MessageLiteOrBuilderisInitialized in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public TlsCertificate.Builder mergeFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException
mergeFrom in interface com.google.protobuf.Message.BuildermergeFrom in interface com.google.protobuf.MessageLite.BuildermergeFrom in class com.google.protobuf.AbstractMessage.Builder<TlsCertificate.Builder>IOExceptionpublic boolean hasCertificateChain()
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;hasCertificateChain in interface TlsCertificateOrBuilderpublic DataSource getCertificateChain()
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;getCertificateChain in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setCertificateChain(DataSource value)
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;public TlsCertificate.Builder setCertificateChain(DataSource.Builder builderForValue)
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;public TlsCertificate.Builder mergeCertificateChain(DataSource value)
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;public TlsCertificate.Builder clearCertificateChain()
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;public DataSource.Builder getCertificateChainBuilder()
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;public DataSourceOrBuilder getCertificateChainOrBuilder()
The TLS certificate chain. If *certificate_chain* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource certificate_chain = 1;getCertificateChainOrBuilder in interface TlsCertificateOrBuilderpublic boolean hasPrivateKey()
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];hasPrivateKey in interface TlsCertificateOrBuilderpublic DataSource getPrivateKey()
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];getPrivateKey in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setPrivateKey(DataSource value)
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder setPrivateKey(DataSource.Builder builderForValue)
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder mergePrivateKey(DataSource value)
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder clearPrivateKey()
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];public DataSource.Builder getPrivateKeyBuilder()
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];public DataSourceOrBuilder getPrivateKeyOrBuilder()
The TLS private key. If *private_key* is a filesystem path, a watch will be added to the parent directory for any file moves to support rotation. This currently only applies to dynamic secrets, when the *TlsCertificate* is delivered via SDS.
.envoy.config.core.v4alpha.DataSource private_key = 2 [(.udpa.annotations.sensitive) = true];getPrivateKeyOrBuilder in interface TlsCertificateOrBuilderpublic boolean hasWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;hasWatchedDirectory in interface TlsCertificateOrBuilderpublic WatchedDirectory getWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;getWatchedDirectory in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setWatchedDirectory(WatchedDirectory value)
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;public TlsCertificate.Builder setWatchedDirectory(WatchedDirectory.Builder builderForValue)
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;public TlsCertificate.Builder mergeWatchedDirectory(WatchedDirectory value)
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;public TlsCertificate.Builder clearWatchedDirectory()
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;public WatchedDirectory.Builder getWatchedDirectoryBuilder()
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;public WatchedDirectoryOrBuilder getWatchedDirectoryOrBuilder()
If specified, updates of file-based *certificate_chain* and *private_key* sources will be triggered by this watch. The certificate/key pair will be read together and validated for atomic read consistency (i.e. no intervening modification occurred between cert/key read, verified by file hash comparisons). This allows explicit control over the path watched, by default the parent directories of the filesystem paths in *certificate_chain* and *private_key* are watched if this field is not specified. This only applies when a *TlsCertificate* is delivered by SDS with references to filesystem paths. See the :ref:`SDS key rotation <sds_key_rotation>` documentation for further details.
.envoy.config.core.v4alpha.WatchedDirectory watched_directory = 7;getWatchedDirectoryOrBuilder in interface TlsCertificateOrBuilderpublic boolean hasPrivateKeyProvider()
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;hasPrivateKeyProvider in interface TlsCertificateOrBuilderpublic PrivateKeyProvider getPrivateKeyProvider()
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;getPrivateKeyProvider in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setPrivateKeyProvider(PrivateKeyProvider value)
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;public TlsCertificate.Builder setPrivateKeyProvider(PrivateKeyProvider.Builder builderForValue)
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;public TlsCertificate.Builder mergePrivateKeyProvider(PrivateKeyProvider value)
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;public TlsCertificate.Builder clearPrivateKeyProvider()
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;public PrivateKeyProvider.Builder getPrivateKeyProviderBuilder()
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;public PrivateKeyProviderOrBuilder getPrivateKeyProviderOrBuilder()
BoringSSL private key method provider. This is an alternative to :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` field. This can't be marked as ``oneof`` due to API compatibility reasons. Setting both :ref:`private_key <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key>` and :ref:`private_key_provider <envoy_api_field_extensions.transport_sockets.tls.v4alpha.TlsCertificate.private_key_provider>` fields will result in an error.
.envoy.extensions.transport_sockets.tls.v4alpha.PrivateKeyProvider private_key_provider = 6;getPrivateKeyProviderOrBuilder in interface TlsCertificateOrBuilderpublic boolean hasPassword()
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];hasPassword in interface TlsCertificateOrBuilderpublic DataSource getPassword()
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];getPassword in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setPassword(DataSource value)
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder setPassword(DataSource.Builder builderForValue)
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder mergePassword(DataSource value)
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];public TlsCertificate.Builder clearPassword()
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];public DataSource.Builder getPasswordBuilder()
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];public DataSourceOrBuilder getPasswordOrBuilder()
The password to decrypt the TLS private key. If this field is not set, it is assumed that the TLS private key is not password encrypted.
.envoy.config.core.v4alpha.DataSource password = 3 [(.udpa.annotations.sensitive) = true];getPasswordOrBuilder in interface TlsCertificateOrBuilderpublic boolean hasOcspStaple()
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;hasOcspStaple in interface TlsCertificateOrBuilderpublic DataSource getOcspStaple()
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;getOcspStaple in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setOcspStaple(DataSource value)
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;public TlsCertificate.Builder setOcspStaple(DataSource.Builder builderForValue)
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;public TlsCertificate.Builder mergeOcspStaple(DataSource value)
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;public TlsCertificate.Builder clearOcspStaple()
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;public DataSource.Builder getOcspStapleBuilder()
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;public DataSourceOrBuilder getOcspStapleOrBuilder()
The OCSP response to be stapled with this certificate during the handshake. The response must be DER-encoded and may only be provided via ``filename`` or ``inline_bytes``. The response may pertain to only one certificate.
.envoy.config.core.v4alpha.DataSource ocsp_staple = 4;getOcspStapleOrBuilder in interface TlsCertificateOrBuilderpublic List<DataSource> getSignedCertificateTimestampList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;getSignedCertificateTimestampList in interface TlsCertificateOrBuilderpublic int getSignedCertificateTimestampCount()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;getSignedCertificateTimestampCount in interface TlsCertificateOrBuilderpublic DataSource getSignedCertificateTimestamp(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;getSignedCertificateTimestamp in interface TlsCertificateOrBuilderpublic TlsCertificate.Builder setSignedCertificateTimestamp(int index, DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder setSignedCertificateTimestamp(int index, DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder addSignedCertificateTimestamp(DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder addSignedCertificateTimestamp(int index, DataSource value)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder addSignedCertificateTimestamp(DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder addSignedCertificateTimestamp(int index, DataSource.Builder builderForValue)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder addAllSignedCertificateTimestamp(Iterable<? extends DataSource> values)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder clearSignedCertificateTimestamp()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public TlsCertificate.Builder removeSignedCertificateTimestamp(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public DataSource.Builder getSignedCertificateTimestampBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public DataSourceOrBuilder getSignedCertificateTimestampOrBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;getSignedCertificateTimestampOrBuilder in interface TlsCertificateOrBuilderpublic List<? extends DataSourceOrBuilder> getSignedCertificateTimestampOrBuilderList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;getSignedCertificateTimestampOrBuilderList in interface TlsCertificateOrBuilderpublic DataSource.Builder addSignedCertificateTimestampBuilder()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public DataSource.Builder addSignedCertificateTimestampBuilder(int index)
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public List<DataSource.Builder> getSignedCertificateTimestampBuilderList()
[#not-implemented-hide:]
repeated .envoy.config.core.v4alpha.DataSource signed_certificate_timestamp = 5;public final TlsCertificate.Builder setUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
setUnknownFields in interface com.google.protobuf.Message.BuildersetUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>public final TlsCertificate.Builder mergeUnknownFields(com.google.protobuf.UnknownFieldSet unknownFields)
mergeUnknownFields in interface com.google.protobuf.Message.BuildermergeUnknownFields in class com.google.protobuf.GeneratedMessageV3.Builder<TlsCertificate.Builder>Copyright © 2018–2021 The Envoy Project. All rights reserved.