Package io.kubernetes.client.proto
Class V1.SecurityContext
java.lang.Object
com.google.protobuf.AbstractMessageLite
com.google.protobuf.AbstractMessage
com.google.protobuf.GeneratedMessageV3
io.kubernetes.client.proto.V1.SecurityContext
- All Implemented Interfaces:
com.google.protobuf.Message,com.google.protobuf.MessageLite,com.google.protobuf.MessageLiteOrBuilder,com.google.protobuf.MessageOrBuilder,V1.SecurityContextOrBuilder,Serializable
- Enclosing class:
- V1
public static final class V1.SecurityContext
extends com.google.protobuf.GeneratedMessageV3
implements V1.SecurityContextOrBuilder
SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.Protobuf type
k8s.io.api.core.v1.SecurityContext- See Also:
-
Nested Class Summary
Nested ClassesModifier and TypeClassDescriptionstatic final classSecurityContext holds security configuration that will be applied to a container.Nested classes/interfaces inherited from class com.google.protobuf.GeneratedMessageV3
com.google.protobuf.GeneratedMessageV3.BuilderParent, com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage,BuilderType extends com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageType, BuilderType>>, com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage>, com.google.protobuf.GeneratedMessageV3.ExtendableMessageOrBuilder<MessageType extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage>, com.google.protobuf.GeneratedMessageV3.FieldAccessorTable, com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter Nested classes/interfaces inherited from class com.google.protobuf.AbstractMessageLite
com.google.protobuf.AbstractMessageLite.InternalOneOfEnum -
Field Summary
FieldsModifier and TypeFieldDescriptionstatic final intstatic final intstatic final com.google.protobuf.Parser<V1.SecurityContext>Deprecated.static final intstatic final intstatic final intstatic final intstatic final intstatic final intstatic final intstatic final intstatic final intFields inherited from class com.google.protobuf.GeneratedMessageV3
alwaysUseFieldBuilders, unknownFieldsFields inherited from class com.google.protobuf.AbstractMessage
memoizedSizeFields inherited from class com.google.protobuf.AbstractMessageLite
memoizedHashCode -
Method Summary
Modifier and TypeMethodDescriptionbooleanbooleanAllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process.The capabilities to add/drop when running containers.The capabilities to add/drop when running containers.static V1.SecurityContextstatic final com.google.protobuf.Descriptors.Descriptorcom.google.protobuf.Parser<V1.SecurityContext>booleanRun container in privileged mode.procMount denotes the type of proc mount to use for the containers.com.google.protobuf.ByteStringprocMount denotes the type of proc mount to use for the containers.booleanWhether this container has a read-only root filesystem.longThe GID to run the entrypoint of the container process.booleanIndicates that the container must run as a non-root user.longThe UID to run the entrypoint of the container process.The seccomp options to use by this container.The seccomp options to use by this container.The SELinux context to be applied to the container.The SELinux context to be applied to the container.intfinal com.google.protobuf.UnknownFieldSetThe Windows specific settings applied to all containers.The Windows specific settings applied to all containers.booleanAllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process.booleanThe capabilities to add/drop when running containers.inthashCode()booleanRun container in privileged mode.booleanprocMount denotes the type of proc mount to use for the containers.booleanWhether this container has a read-only root filesystem.booleanThe GID to run the entrypoint of the container process.booleanIndicates that the container must run as a non-root user.booleanThe UID to run the entrypoint of the container process.booleanThe seccomp options to use by this container.booleanThe SELinux context to be applied to the container.booleanThe Windows specific settings applied to all containers.protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTablefinal booleanstatic V1.SecurityContext.Builderstatic V1.SecurityContext.BuildernewBuilder(V1.SecurityContext prototype) protected V1.SecurityContext.BuildernewBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) static V1.SecurityContextparseDelimitedFrom(InputStream input) static V1.SecurityContextparseDelimitedFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContextparseFrom(byte[] data) static V1.SecurityContextparseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContextparseFrom(com.google.protobuf.ByteString data) static V1.SecurityContextparseFrom(com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContextparseFrom(com.google.protobuf.CodedInputStream input) static V1.SecurityContextparseFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContextparseFrom(InputStream input) static V1.SecurityContextparseFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContextparseFrom(ByteBuffer data) static V1.SecurityContextparseFrom(ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static com.google.protobuf.Parser<V1.SecurityContext>parser()voidwriteTo(com.google.protobuf.CodedOutputStream output) Methods inherited from class com.google.protobuf.GeneratedMessageV3
canUseUnsafe, computeStringSize, computeStringSizeNoTag, emptyBooleanList, emptyDoubleList, emptyFloatList, emptyIntList, emptyLongList, getAllFields, getDescriptorForType, getField, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, hasField, hasOneof, internalGetMapField, isStringEmpty, makeExtensionsImmutable, mergeFromAndMakeImmutableInternal, mutableCopy, mutableCopy, mutableCopy, mutableCopy, mutableCopy, newBooleanList, newBuilderForType, newDoubleList, newFloatList, newInstance, newIntList, newLongList, parseDelimitedWithIOException, parseDelimitedWithIOException, parseUnknownField, parseUnknownFieldProto3, parseWithIOException, parseWithIOException, parseWithIOException, parseWithIOException, serializeBooleanMapTo, serializeIntegerMapTo, serializeLongMapTo, serializeStringMapTo, writeReplace, writeString, writeStringNoTagMethods inherited from class com.google.protobuf.AbstractMessage
findInitializationErrors, getInitializationErrorString, hashBoolean, hashEnum, hashEnumList, hashFields, hashLong, toStringMethods inherited from class com.google.protobuf.AbstractMessageLite
addAll, addAll, checkByteStringIsUtf8, toByteArray, toByteString, writeDelimitedTo, writeToMethods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, waitMethods inherited from interface com.google.protobuf.MessageLite
toByteArray, toByteString, writeDelimitedTo, writeToMethods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, hasField, hasOneof
-
Field Details
-
CAPABILITIES_FIELD_NUMBER
public static final int CAPABILITIES_FIELD_NUMBER- See Also:
-
PRIVILEGED_FIELD_NUMBER
public static final int PRIVILEGED_FIELD_NUMBER- See Also:
-
SELINUXOPTIONS_FIELD_NUMBER
public static final int SELINUXOPTIONS_FIELD_NUMBER- See Also:
-
WINDOWSOPTIONS_FIELD_NUMBER
public static final int WINDOWSOPTIONS_FIELD_NUMBER- See Also:
-
RUNASUSER_FIELD_NUMBER
public static final int RUNASUSER_FIELD_NUMBER- See Also:
-
RUNASGROUP_FIELD_NUMBER
public static final int RUNASGROUP_FIELD_NUMBER- See Also:
-
RUNASNONROOT_FIELD_NUMBER
public static final int RUNASNONROOT_FIELD_NUMBER- See Also:
-
READONLYROOTFILESYSTEM_FIELD_NUMBER
public static final int READONLYROOTFILESYSTEM_FIELD_NUMBER- See Also:
-
ALLOWPRIVILEGEESCALATION_FIELD_NUMBER
public static final int ALLOWPRIVILEGEESCALATION_FIELD_NUMBER- See Also:
-
PROCMOUNT_FIELD_NUMBER
public static final int PROCMOUNT_FIELD_NUMBER- See Also:
-
SECCOMPPROFILE_FIELD_NUMBER
public static final int SECCOMPPROFILE_FIELD_NUMBER- See Also:
-
PARSER
Deprecated.
-
-
Method Details
-
getUnknownFields
public final com.google.protobuf.UnknownFieldSet getUnknownFields()- Specified by:
getUnknownFieldsin interfacecom.google.protobuf.MessageOrBuilder- Overrides:
getUnknownFieldsin classcom.google.protobuf.GeneratedMessageV3
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTablein classcom.google.protobuf.GeneratedMessageV3
-
hasCapabilities
public boolean hasCapabilities()The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;- Specified by:
hasCapabilitiesin interfaceV1.SecurityContextOrBuilder
-
getCapabilities
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;- Specified by:
getCapabilitiesin interfaceV1.SecurityContextOrBuilder
-
getCapabilitiesOrBuilder
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;- Specified by:
getCapabilitiesOrBuilderin interfaceV1.SecurityContextOrBuilder
-
hasPrivileged
public boolean hasPrivileged()Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool privileged = 2;- Specified by:
hasPrivilegedin interfaceV1.SecurityContextOrBuilder
-
getPrivileged
public boolean getPrivileged()Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool privileged = 2;- Specified by:
getPrivilegedin interfaceV1.SecurityContextOrBuilder
-
hasSeLinuxOptions
public boolean hasSeLinuxOptions()The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;- Specified by:
hasSeLinuxOptionsin interfaceV1.SecurityContextOrBuilder
-
getSeLinuxOptions
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;- Specified by:
getSeLinuxOptionsin interfaceV1.SecurityContextOrBuilder
-
getSeLinuxOptionsOrBuilder
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;- Specified by:
getSeLinuxOptionsOrBuilderin interfaceV1.SecurityContextOrBuilder
-
hasWindowsOptions
public boolean hasWindowsOptions()The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;- Specified by:
hasWindowsOptionsin interfaceV1.SecurityContextOrBuilder
-
getWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;- Specified by:
getWindowsOptionsin interfaceV1.SecurityContextOrBuilder
-
getWindowsOptionsOrBuilder
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;- Specified by:
getWindowsOptionsOrBuilderin interfaceV1.SecurityContextOrBuilder
-
hasRunAsUser
public boolean hasRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 4;- Specified by:
hasRunAsUserin interfaceV1.SecurityContextOrBuilder
-
getRunAsUser
public long getRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 4;- Specified by:
getRunAsUserin interfaceV1.SecurityContextOrBuilder
-
hasRunAsGroup
public boolean hasRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 8;- Specified by:
hasRunAsGroupin interfaceV1.SecurityContextOrBuilder
-
getRunAsGroup
public long getRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 8;- Specified by:
getRunAsGroupin interfaceV1.SecurityContextOrBuilder
-
hasRunAsNonRoot
public boolean hasRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;- Specified by:
hasRunAsNonRootin interfaceV1.SecurityContextOrBuilder
-
getRunAsNonRoot
public boolean getRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;- Specified by:
getRunAsNonRootin interfaceV1.SecurityContextOrBuilder
-
hasReadOnlyRootFilesystem
public boolean hasReadOnlyRootFilesystem()Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool readOnlyRootFilesystem = 6;- Specified by:
hasReadOnlyRootFilesystemin interfaceV1.SecurityContextOrBuilder
-
getReadOnlyRootFilesystem
public boolean getReadOnlyRootFilesystem()Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool readOnlyRootFilesystem = 6;- Specified by:
getReadOnlyRootFilesystemin interfaceV1.SecurityContextOrBuilder
-
hasAllowPrivilegeEscalation
public boolean hasAllowPrivilegeEscalation()AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. +optional
optional bool allowPrivilegeEscalation = 7;- Specified by:
hasAllowPrivilegeEscalationin interfaceV1.SecurityContextOrBuilder
-
getAllowPrivilegeEscalation
public boolean getAllowPrivilegeEscalation()AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. +optional
optional bool allowPrivilegeEscalation = 7;- Specified by:
getAllowPrivilegeEscalationin interfaceV1.SecurityContextOrBuilder
-
hasProcMount
public boolean hasProcMount()procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;- Specified by:
hasProcMountin interfaceV1.SecurityContextOrBuilder
-
getProcMount
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;- Specified by:
getProcMountin interfaceV1.SecurityContextOrBuilder
-
getProcMountBytes
public com.google.protobuf.ByteString getProcMountBytes()procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;- Specified by:
getProcMountBytesin interfaceV1.SecurityContextOrBuilder
-
hasSeccompProfile
public boolean hasSeccompProfile()The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;- Specified by:
hasSeccompProfilein interfaceV1.SecurityContextOrBuilder
-
getSeccompProfile
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;- Specified by:
getSeccompProfilein interfaceV1.SecurityContextOrBuilder
-
getSeccompProfileOrBuilder
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;- Specified by:
getSeccompProfileOrBuilderin interfaceV1.SecurityContextOrBuilder
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitializedin interfacecom.google.protobuf.MessageLiteOrBuilder- Overrides:
isInitializedin classcom.google.protobuf.GeneratedMessageV3
-
writeTo
- Specified by:
writeToin interfacecom.google.protobuf.MessageLite- Overrides:
writeToin classcom.google.protobuf.GeneratedMessageV3- Throws:
IOException
-
getSerializedSize
public int getSerializedSize()- Specified by:
getSerializedSizein interfacecom.google.protobuf.MessageLite- Overrides:
getSerializedSizein classcom.google.protobuf.GeneratedMessageV3
-
equals
- Specified by:
equalsin interfacecom.google.protobuf.Message- Overrides:
equalsin classcom.google.protobuf.AbstractMessage
-
hashCode
public int hashCode()- Specified by:
hashCodein interfacecom.google.protobuf.Message- Overrides:
hashCodein classcom.google.protobuf.AbstractMessage
-
parseFrom
public static V1.SecurityContext parseFrom(ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
- Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
parseDelimitedFrom
- Throws:
IOException
-
parseDelimitedFrom
public static V1.SecurityContext parseDelimitedFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.CodedInputStream input) throws IOException - Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
newBuilderForType
- Specified by:
newBuilderForTypein interfacecom.google.protobuf.Message- Specified by:
newBuilderForTypein interfacecom.google.protobuf.MessageLite
-
newBuilder
-
newBuilder
-
toBuilder
- Specified by:
toBuilderin interfacecom.google.protobuf.Message- Specified by:
toBuilderin interfacecom.google.protobuf.MessageLite
-
newBuilderForType
protected V1.SecurityContext.Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) - Specified by:
newBuilderForTypein classcom.google.protobuf.GeneratedMessageV3
-
getDefaultInstance
-
parser
-
getParserForType
- Specified by:
getParserForTypein interfacecom.google.protobuf.Message- Specified by:
getParserForTypein interfacecom.google.protobuf.MessageLite- Overrides:
getParserForTypein classcom.google.protobuf.GeneratedMessageV3
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForTypein interfacecom.google.protobuf.MessageLiteOrBuilder- Specified by:
getDefaultInstanceForTypein interfacecom.google.protobuf.MessageOrBuilder
-