Package io.kubernetes.client.proto
Class V1.SecurityContext
java.lang.Object
com.google.protobuf.AbstractMessageLite
com.google.protobuf.AbstractMessage
com.google.protobuf.GeneratedMessageV3
io.kubernetes.client.proto.V1.SecurityContext
- All Implemented Interfaces:
com.google.protobuf.Message
,com.google.protobuf.MessageLite
,com.google.protobuf.MessageLiteOrBuilder
,com.google.protobuf.MessageOrBuilder
,V1.SecurityContextOrBuilder
,Serializable
- Enclosing class:
- V1
public static final class V1.SecurityContext
extends com.google.protobuf.GeneratedMessageV3
implements V1.SecurityContextOrBuilder
SecurityContext holds security configuration that will be applied to a container. Some fields are present in both SecurityContext and PodSecurityContext. When both are set, the values in SecurityContext take precedence.Protobuf type
k8s.io.api.core.v1.SecurityContext
- See Also:
-
Nested Class Summary
Nested ClassesModifier and TypeClassDescriptionstatic final class
SecurityContext holds security configuration that will be applied to a container.Nested classes/interfaces inherited from class com.google.protobuf.GeneratedMessageV3
com.google.protobuf.GeneratedMessageV3.BuilderParent, com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageT extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageT>,
BuilderT extends com.google.protobuf.GeneratedMessageV3.ExtendableBuilder<MessageT, BuilderT>>, com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageT extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageT>>, com.google.protobuf.GeneratedMessageV3.ExtendableMessageOrBuilder<MessageT extends com.google.protobuf.GeneratedMessageV3.ExtendableMessage<MessageT>>, com.google.protobuf.GeneratedMessageV3.FieldAccessorTable, com.google.protobuf.GeneratedMessageV3.UnusedPrivateParameter Nested classes/interfaces inherited from class com.google.protobuf.AbstractMessageLite
com.google.protobuf.AbstractMessageLite.InternalOneOfEnum
-
Field Summary
FieldsModifier and TypeFieldDescriptionstatic final int
static final int
static final com.google.protobuf.Parser<V1.SecurityContext>
Deprecated.static final int
static final int
static final int
static final int
static final int
static final int
static final int
static final int
static final int
Fields inherited from class com.google.protobuf.GeneratedMessageV3
alwaysUseFieldBuilders, unknownFields
Fields inherited from class com.google.protobuf.AbstractMessage
memoizedSize
Fields inherited from class com.google.protobuf.AbstractMessageLite
memoizedHashCode
-
Method Summary
Modifier and TypeMethodDescriptionboolean
boolean
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process.The capabilities to add/drop when running containers.The capabilities to add/drop when running containers.static V1.SecurityContext
static final com.google.protobuf.Descriptors.Descriptor
com.google.protobuf.Parser<V1.SecurityContext>
boolean
Run container in privileged mode.procMount denotes the type of proc mount to use for the containers.com.google.protobuf.ByteString
procMount denotes the type of proc mount to use for the containers.boolean
Whether this container has a read-only root filesystem.long
The GID to run the entrypoint of the container process.boolean
Indicates that the container must run as a non-root user.long
The UID to run the entrypoint of the container process.The seccomp options to use by this container.The seccomp options to use by this container.The SELinux context to be applied to the container.The SELinux context to be applied to the container.int
final com.google.protobuf.UnknownFieldSet
The Windows specific settings applied to all containers.The Windows specific settings applied to all containers.boolean
AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process.boolean
The capabilities to add/drop when running containers.int
hashCode()
boolean
Run container in privileged mode.boolean
procMount denotes the type of proc mount to use for the containers.boolean
Whether this container has a read-only root filesystem.boolean
The GID to run the entrypoint of the container process.boolean
Indicates that the container must run as a non-root user.boolean
The UID to run the entrypoint of the container process.boolean
The seccomp options to use by this container.boolean
The SELinux context to be applied to the container.boolean
The Windows specific settings applied to all containers.protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
final boolean
static V1.SecurityContext.Builder
static V1.SecurityContext.Builder
newBuilder
(V1.SecurityContext prototype) protected V1.SecurityContext.Builder
newBuilderForType
(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) static V1.SecurityContext
parseDelimitedFrom
(InputStream input) static V1.SecurityContext
parseDelimitedFrom
(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContext
parseFrom
(byte[] data) static V1.SecurityContext
parseFrom
(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContext
parseFrom
(com.google.protobuf.ByteString data) static V1.SecurityContext
parseFrom
(com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContext
parseFrom
(com.google.protobuf.CodedInputStream input) static V1.SecurityContext
parseFrom
(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContext
parseFrom
(InputStream input) static V1.SecurityContext
parseFrom
(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static V1.SecurityContext
parseFrom
(ByteBuffer data) static V1.SecurityContext
parseFrom
(ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) static com.google.protobuf.Parser<V1.SecurityContext>
parser()
void
writeTo
(com.google.protobuf.CodedOutputStream output) Methods inherited from class com.google.protobuf.GeneratedMessageV3
canUseUnsafe, computeStringSize, computeStringSizeNoTag, emptyBooleanList, emptyDoubleList, emptyFloatList, emptyIntList, emptyLongList, getAllFields, getDescriptorForType, getField, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, hasField, hasOneof, internalGetMapField, isStringEmpty, makeExtensionsImmutable, makeMutableCopy, mergeFromAndMakeImmutableInternal, mutableCopy, mutableCopy, mutableCopy, mutableCopy, mutableCopy, newBooleanList, newBuilderForType, newDoubleList, newFloatList, newInstance, newIntList, newLongList, parseDelimitedWithIOException, parseDelimitedWithIOException, parseUnknownField, parseUnknownFieldProto3, parseWithIOException, parseWithIOException, parseWithIOException, parseWithIOException, serializeBooleanMapTo, serializeIntegerMapTo, serializeLongMapTo, serializeStringMapTo, writeReplace, writeString, writeStringNoTag
Methods inherited from class com.google.protobuf.AbstractMessage
findInitializationErrors, getInitializationErrorString, hashBoolean, hashEnum, hashEnumList, hashFields, hashLong, toString
Methods inherited from class com.google.protobuf.AbstractMessageLite
addAll, addAll, checkByteStringIsUtf8, toByteArray, toByteString, writeDelimitedTo, writeTo
Methods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, wait
Methods inherited from interface com.google.protobuf.MessageLite
toByteArray, toByteString, writeDelimitedTo, writeTo
Methods inherited from interface com.google.protobuf.MessageOrBuilder
findInitializationErrors, getAllFields, getDescriptorForType, getField, getInitializationErrorString, getOneofFieldDescriptor, getRepeatedField, getRepeatedFieldCount, hasField, hasOneof
-
Field Details
-
CAPABILITIES_FIELD_NUMBER
public static final int CAPABILITIES_FIELD_NUMBER- See Also:
-
PRIVILEGED_FIELD_NUMBER
public static final int PRIVILEGED_FIELD_NUMBER- See Also:
-
SELINUXOPTIONS_FIELD_NUMBER
public static final int SELINUXOPTIONS_FIELD_NUMBER- See Also:
-
WINDOWSOPTIONS_FIELD_NUMBER
public static final int WINDOWSOPTIONS_FIELD_NUMBER- See Also:
-
RUNASUSER_FIELD_NUMBER
public static final int RUNASUSER_FIELD_NUMBER- See Also:
-
RUNASGROUP_FIELD_NUMBER
public static final int RUNASGROUP_FIELD_NUMBER- See Also:
-
RUNASNONROOT_FIELD_NUMBER
public static final int RUNASNONROOT_FIELD_NUMBER- See Also:
-
READONLYROOTFILESYSTEM_FIELD_NUMBER
public static final int READONLYROOTFILESYSTEM_FIELD_NUMBER- See Also:
-
ALLOWPRIVILEGEESCALATION_FIELD_NUMBER
public static final int ALLOWPRIVILEGEESCALATION_FIELD_NUMBER- See Also:
-
PROCMOUNT_FIELD_NUMBER
public static final int PROCMOUNT_FIELD_NUMBER- See Also:
-
SECCOMPPROFILE_FIELD_NUMBER
public static final int SECCOMPPROFILE_FIELD_NUMBER- See Also:
-
PARSER
Deprecated.
-
-
Method Details
-
getUnknownFields
public final com.google.protobuf.UnknownFieldSet getUnknownFields()- Specified by:
getUnknownFields
in interfacecom.google.protobuf.MessageOrBuilder
- Overrides:
getUnknownFields
in classcom.google.protobuf.GeneratedMessageV3
-
getDescriptor
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() -
internalGetFieldAccessorTable
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()- Specified by:
internalGetFieldAccessorTable
in classcom.google.protobuf.GeneratedMessageV3
-
hasCapabilities
public boolean hasCapabilities()The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;
- Specified by:
hasCapabilities
in interfaceV1.SecurityContextOrBuilder
-
getCapabilities
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;
- Specified by:
getCapabilities
in interfaceV1.SecurityContextOrBuilder
-
getCapabilitiesOrBuilder
The capabilities to add/drop when running containers. Defaults to the default set of capabilities granted by the container runtime. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.Capabilities capabilities = 1;
- Specified by:
getCapabilitiesOrBuilder
in interfaceV1.SecurityContextOrBuilder
-
hasPrivileged
public boolean hasPrivileged()Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool privileged = 2;
- Specified by:
hasPrivileged
in interfaceV1.SecurityContextOrBuilder
-
getPrivileged
public boolean getPrivileged()Run container in privileged mode. Processes in privileged containers are essentially equivalent to root on the host. Defaults to false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool privileged = 2;
- Specified by:
getPrivileged
in interfaceV1.SecurityContextOrBuilder
-
hasSeLinuxOptions
public boolean hasSeLinuxOptions()The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;
- Specified by:
hasSeLinuxOptions
in interfaceV1.SecurityContextOrBuilder
-
getSeLinuxOptions
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;
- Specified by:
getSeLinuxOptions
in interfaceV1.SecurityContextOrBuilder
-
getSeLinuxOptionsOrBuilder
The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SELinuxOptions seLinuxOptions = 3;
- Specified by:
getSeLinuxOptionsOrBuilder
in interfaceV1.SecurityContextOrBuilder
-
hasWindowsOptions
public boolean hasWindowsOptions()The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;
- Specified by:
hasWindowsOptions
in interfaceV1.SecurityContextOrBuilder
-
getWindowsOptions
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;
- Specified by:
getWindowsOptions
in interfaceV1.SecurityContextOrBuilder
-
getWindowsOptionsOrBuilder
The Windows specific settings applied to all containers. If unspecified, the options from the PodSecurityContext will be used. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is linux. +optional
optional .k8s.io.api.core.v1.WindowsSecurityContextOptions windowsOptions = 10;
- Specified by:
getWindowsOptionsOrBuilder
in interfaceV1.SecurityContextOrBuilder
-
hasRunAsUser
public boolean hasRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 4;
- Specified by:
hasRunAsUser
in interfaceV1.SecurityContextOrBuilder
-
getRunAsUser
public long getRunAsUser()The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if unspecified. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsUser = 4;
- Specified by:
getRunAsUser
in interfaceV1.SecurityContextOrBuilder
-
hasRunAsGroup
public boolean hasRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 8;
- Specified by:
hasRunAsGroup
in interfaceV1.SecurityContextOrBuilder
-
getRunAsGroup
public long getRunAsGroup()The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. Note that this field cannot be set when spec.os.name is windows. +optional
optional int64 runAsGroup = 8;
- Specified by:
getRunAsGroup
in interfaceV1.SecurityContextOrBuilder
-
hasRunAsNonRoot
public boolean hasRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;
- Specified by:
hasRunAsNonRoot
in interfaceV1.SecurityContextOrBuilder
-
getRunAsNonRoot
public boolean getRunAsNonRoot()Indicates that the container must run as a non-root user. If true, the Kubelet will validate the image at runtime to ensure that it does not run as UID 0 (root) and fail to start the container if it does. If unset or false, no such validation will be performed. May also be set in PodSecurityContext. If set in both SecurityContext and PodSecurityContext, the value specified in SecurityContext takes precedence. +optional
optional bool runAsNonRoot = 5;
- Specified by:
getRunAsNonRoot
in interfaceV1.SecurityContextOrBuilder
-
hasReadOnlyRootFilesystem
public boolean hasReadOnlyRootFilesystem()Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool readOnlyRootFilesystem = 6;
- Specified by:
hasReadOnlyRootFilesystem
in interfaceV1.SecurityContextOrBuilder
-
getReadOnlyRootFilesystem
public boolean getReadOnlyRootFilesystem()Whether this container has a read-only root filesystem. Default is false. Note that this field cannot be set when spec.os.name is windows. +optional
optional bool readOnlyRootFilesystem = 6;
- Specified by:
getReadOnlyRootFilesystem
in interfaceV1.SecurityContextOrBuilder
-
hasAllowPrivilegeEscalation
public boolean hasAllowPrivilegeEscalation()AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. +optional
optional bool allowPrivilegeEscalation = 7;
- Specified by:
hasAllowPrivilegeEscalation
in interfaceV1.SecurityContextOrBuilder
-
getAllowPrivilegeEscalation
public boolean getAllowPrivilegeEscalation()AllowPrivilegeEscalation controls whether a process can gain more privileges than its parent process. This bool directly controls if the no_new_privs flag will be set on the container process. AllowPrivilegeEscalation is true always when the container is: 1) run as Privileged 2) has CAP_SYS_ADMIN Note that this field cannot be set when spec.os.name is windows. +optional
optional bool allowPrivilegeEscalation = 7;
- Specified by:
getAllowPrivilegeEscalation
in interfaceV1.SecurityContextOrBuilder
-
hasProcMount
public boolean hasProcMount()procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;
- Specified by:
hasProcMount
in interfaceV1.SecurityContextOrBuilder
-
getProcMount
procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;
- Specified by:
getProcMount
in interfaceV1.SecurityContextOrBuilder
-
getProcMountBytes
public com.google.protobuf.ByteString getProcMountBytes()procMount denotes the type of proc mount to use for the containers. The default is DefaultProcMount which uses the container runtime defaults for readonly paths and masked paths. This requires the ProcMountType feature flag to be enabled. Note that this field cannot be set when spec.os.name is windows. +optional
optional string procMount = 9;
- Specified by:
getProcMountBytes
in interfaceV1.SecurityContextOrBuilder
-
hasSeccompProfile
public boolean hasSeccompProfile()The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;
- Specified by:
hasSeccompProfile
in interfaceV1.SecurityContextOrBuilder
-
getSeccompProfile
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;
- Specified by:
getSeccompProfile
in interfaceV1.SecurityContextOrBuilder
-
getSeccompProfileOrBuilder
The seccomp options to use by this container. If seccomp options are provided at both the pod & container level, the container options override the pod options. Note that this field cannot be set when spec.os.name is windows. +optional
optional .k8s.io.api.core.v1.SeccompProfile seccompProfile = 11;
- Specified by:
getSeccompProfileOrBuilder
in interfaceV1.SecurityContextOrBuilder
-
isInitialized
public final boolean isInitialized()- Specified by:
isInitialized
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Overrides:
isInitialized
in classcom.google.protobuf.GeneratedMessageV3
-
writeTo
- Specified by:
writeTo
in interfacecom.google.protobuf.MessageLite
- Overrides:
writeTo
in classcom.google.protobuf.GeneratedMessageV3
- Throws:
IOException
-
getSerializedSize
public int getSerializedSize()- Specified by:
getSerializedSize
in interfacecom.google.protobuf.MessageLite
- Overrides:
getSerializedSize
in classcom.google.protobuf.GeneratedMessageV3
-
equals
- Specified by:
equals
in interfacecom.google.protobuf.Message
- Overrides:
equals
in classcom.google.protobuf.AbstractMessage
-
hashCode
public int hashCode()- Specified by:
hashCode
in interfacecom.google.protobuf.Message
- Overrides:
hashCode
in classcom.google.protobuf.AbstractMessage
-
parseFrom
public static V1.SecurityContext parseFrom(ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
public static V1.SecurityContext parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException - Throws:
com.google.protobuf.InvalidProtocolBufferException
-
parseFrom
- Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
parseDelimitedFrom
- Throws:
IOException
-
parseDelimitedFrom
public static V1.SecurityContext parseDelimitedFrom(InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.CodedInputStream input) throws IOException - Throws:
IOException
-
parseFrom
public static V1.SecurityContext parseFrom(com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws IOException - Throws:
IOException
-
newBuilderForType
- Specified by:
newBuilderForType
in interfacecom.google.protobuf.Message
- Specified by:
newBuilderForType
in interfacecom.google.protobuf.MessageLite
-
newBuilder
-
newBuilder
-
toBuilder
- Specified by:
toBuilder
in interfacecom.google.protobuf.Message
- Specified by:
toBuilder
in interfacecom.google.protobuf.MessageLite
-
newBuilderForType
protected V1.SecurityContext.Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) - Specified by:
newBuilderForType
in classcom.google.protobuf.GeneratedMessageV3
-
getDefaultInstance
-
parser
-
getParserForType
- Specified by:
getParserForType
in interfacecom.google.protobuf.Message
- Specified by:
getParserForType
in interfacecom.google.protobuf.MessageLite
- Overrides:
getParserForType
in classcom.google.protobuf.GeneratedMessageV3
-
getDefaultInstanceForType
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageLiteOrBuilder
- Specified by:
getDefaultInstanceForType
in interfacecom.google.protobuf.MessageOrBuilder
-