All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.metastore.v1beta.KerberosConfig Maven / Gradle / Ivy

/*
 * Copyright 2024 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/metastore/v1beta/metastore.proto

// Protobuf Java Version: 3.25.5
package com.google.cloud.metastore.v1beta;

/**
 *
 *
 * 
 * Configuration information for a Kerberos principal.
 * 
* * Protobuf type {@code google.cloud.metastore.v1beta.KerberosConfig} */ public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:google.cloud.metastore.v1beta.KerberosConfig) KerberosConfigOrBuilder { private static final long serialVersionUID = 0L; // Use KerberosConfig.newBuilder() to construct. private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private KerberosConfig() { principal_ = ""; krb5ConfigGcsUri_ = ""; } @java.lang.Override @SuppressWarnings({"unused"}) protected java.lang.Object newInstance(UnusedPrivateParameter unused) { return new KerberosConfig(); } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return com.google.cloud.metastore.v1beta.MetastoreProto .internal_static_google_cloud_metastore_v1beta_KerberosConfig_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return com.google.cloud.metastore.v1beta.MetastoreProto .internal_static_google_cloud_metastore_v1beta_KerberosConfig_fieldAccessorTable .ensureFieldAccessorsInitialized( com.google.cloud.metastore.v1beta.KerberosConfig.class, com.google.cloud.metastore.v1beta.KerberosConfig.Builder.class); } private int bitField0_; public static final int KEYTAB_FIELD_NUMBER = 1; private com.google.cloud.metastore.v1beta.Secret keytab_; /** * * *
   * A Kerberos keytab file that can be used to authenticate a service principal
   * with a Kerberos Key Distribution Center (KDC).
   * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; * * @return Whether the keytab field is set. */ @java.lang.Override public boolean hasKeytab() { return ((bitField0_ & 0x00000001) != 0); } /** * * *
   * A Kerberos keytab file that can be used to authenticate a service principal
   * with a Kerberos Key Distribution Center (KDC).
   * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; * * @return The keytab. */ @java.lang.Override public com.google.cloud.metastore.v1beta.Secret getKeytab() { return keytab_ == null ? com.google.cloud.metastore.v1beta.Secret.getDefaultInstance() : keytab_; } /** * * *
   * A Kerberos keytab file that can be used to authenticate a service principal
   * with a Kerberos Key Distribution Center (KDC).
   * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ @java.lang.Override public com.google.cloud.metastore.v1beta.SecretOrBuilder getKeytabOrBuilder() { return keytab_ == null ? com.google.cloud.metastore.v1beta.Secret.getDefaultInstance() : keytab_; } public static final int PRINCIPAL_FIELD_NUMBER = 2; @SuppressWarnings("serial") private volatile java.lang.Object principal_ = ""; /** * * *
   * A Kerberos principal that exists in the both the keytab the KDC
   * to authenticate as. A typical principal is of the form
   * `primary/instance@REALM`, but there is no exact format.
   * 
* * string principal = 2; * * @return The principal. */ @java.lang.Override public java.lang.String getPrincipal() { java.lang.Object ref = principal_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); principal_ = s; return s; } } /** * * *
   * A Kerberos principal that exists in the both the keytab the KDC
   * to authenticate as. A typical principal is of the form
   * `primary/instance@REALM`, but there is no exact format.
   * 
* * string principal = 2; * * @return The bytes for principal. */ @java.lang.Override public com.google.protobuf.ByteString getPrincipalBytes() { java.lang.Object ref = principal_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); principal_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KRB5_CONFIG_GCS_URI_FIELD_NUMBER = 3; @SuppressWarnings("serial") private volatile java.lang.Object krb5ConfigGcsUri_ = ""; /** * * *
   * A Cloud Storage URI that specifies the path to a
   * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
   * although the file does not need to be named krb5.conf explicitly.
   * 
* * string krb5_config_gcs_uri = 3; * * @return The krb5ConfigGcsUri. */ @java.lang.Override public java.lang.String getKrb5ConfigGcsUri() { java.lang.Object ref = krb5ConfigGcsUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); krb5ConfigGcsUri_ = s; return s; } } /** * * *
   * A Cloud Storage URI that specifies the path to a
   * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
   * although the file does not need to be named krb5.conf explicitly.
   * 
* * string krb5_config_gcs_uri = 3; * * @return The bytes for krb5ConfigGcsUri. */ @java.lang.Override public com.google.protobuf.ByteString getKrb5ConfigGcsUriBytes() { java.lang.Object ref = krb5ConfigGcsUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); krb5ConfigGcsUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (((bitField0_ & 0x00000001) != 0)) { output.writeMessage(1, getKeytab()); } if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(principal_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, principal_); } if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(krb5ConfigGcsUri_)) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, krb5ConfigGcsUri_); } getUnknownFields().writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (((bitField0_ & 0x00000001) != 0)) { size += com.google.protobuf.CodedOutputStream.computeMessageSize(1, getKeytab()); } if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(principal_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, principal_); } if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(krb5ConfigGcsUri_)) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, krb5ConfigGcsUri_); } size += getUnknownFields().getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof com.google.cloud.metastore.v1beta.KerberosConfig)) { return super.equals(obj); } com.google.cloud.metastore.v1beta.KerberosConfig other = (com.google.cloud.metastore.v1beta.KerberosConfig) obj; if (hasKeytab() != other.hasKeytab()) return false; if (hasKeytab()) { if (!getKeytab().equals(other.getKeytab())) return false; } if (!getPrincipal().equals(other.getPrincipal())) return false; if (!getKrb5ConfigGcsUri().equals(other.getKrb5ConfigGcsUri())) return false; if (!getUnknownFields().equals(other.getUnknownFields())) return false; return true; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); if (hasKeytab()) { hash = (37 * hash) + KEYTAB_FIELD_NUMBER; hash = (53 * hash) + getKeytab().hashCode(); } hash = (37 * hash) + PRINCIPAL_FIELD_NUMBER; hash = (53 * hash) + getPrincipal().hashCode(); hash = (37 * hash) + KRB5_CONFIG_GCS_URI_FIELD_NUMBER; hash = (53 * hash) + getKrb5ConfigGcsUri().hashCode(); hash = (29 * hash) + getUnknownFields().hashCode(); memoizedHashCode = hash; return hash; } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom(java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseDelimitedFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static com.google.cloud.metastore.v1beta.KerberosConfig parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(com.google.cloud.metastore.v1beta.KerberosConfig prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
   * Configuration information for a Kerberos principal.
   * 
* * Protobuf type {@code google.cloud.metastore.v1beta.KerberosConfig} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:google.cloud.metastore.v1beta.KerberosConfig) com.google.cloud.metastore.v1beta.KerberosConfigOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return com.google.cloud.metastore.v1beta.MetastoreProto .internal_static_google_cloud_metastore_v1beta_KerberosConfig_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return com.google.cloud.metastore.v1beta.MetastoreProto .internal_static_google_cloud_metastore_v1beta_KerberosConfig_fieldAccessorTable .ensureFieldAccessorsInitialized( com.google.cloud.metastore.v1beta.KerberosConfig.class, com.google.cloud.metastore.v1beta.KerberosConfig.Builder.class); } // Construct using com.google.cloud.metastore.v1beta.KerberosConfig.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getKeytabFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); bitField0_ = 0; keytab_ = null; if (keytabBuilder_ != null) { keytabBuilder_.dispose(); keytabBuilder_ = null; } principal_ = ""; krb5ConfigGcsUri_ = ""; return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return com.google.cloud.metastore.v1beta.MetastoreProto .internal_static_google_cloud_metastore_v1beta_KerberosConfig_descriptor; } @java.lang.Override public com.google.cloud.metastore.v1beta.KerberosConfig getDefaultInstanceForType() { return com.google.cloud.metastore.v1beta.KerberosConfig.getDefaultInstance(); } @java.lang.Override public com.google.cloud.metastore.v1beta.KerberosConfig build() { com.google.cloud.metastore.v1beta.KerberosConfig result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public com.google.cloud.metastore.v1beta.KerberosConfig buildPartial() { com.google.cloud.metastore.v1beta.KerberosConfig result = new com.google.cloud.metastore.v1beta.KerberosConfig(this); if (bitField0_ != 0) { buildPartial0(result); } onBuilt(); return result; } private void buildPartial0(com.google.cloud.metastore.v1beta.KerberosConfig result) { int from_bitField0_ = bitField0_; int to_bitField0_ = 0; if (((from_bitField0_ & 0x00000001) != 0)) { result.keytab_ = keytabBuilder_ == null ? keytab_ : keytabBuilder_.build(); to_bitField0_ |= 0x00000001; } if (((from_bitField0_ & 0x00000002) != 0)) { result.principal_ = principal_; } if (((from_bitField0_ & 0x00000004) != 0)) { result.krb5ConfigGcsUri_ = krb5ConfigGcsUri_; } result.bitField0_ |= to_bitField0_; } @java.lang.Override public Builder clone() { return super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof com.google.cloud.metastore.v1beta.KerberosConfig) { return mergeFrom((com.google.cloud.metastore.v1beta.KerberosConfig) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(com.google.cloud.metastore.v1beta.KerberosConfig other) { if (other == com.google.cloud.metastore.v1beta.KerberosConfig.getDefaultInstance()) return this; if (other.hasKeytab()) { mergeKeytab(other.getKeytab()); } if (!other.getPrincipal().isEmpty()) { principal_ = other.principal_; bitField0_ |= 0x00000002; onChanged(); } if (!other.getKrb5ConfigGcsUri().isEmpty()) { krb5ConfigGcsUri_ = other.krb5ConfigGcsUri_; bitField0_ |= 0x00000004; onChanged(); } this.mergeUnknownFields(other.getUnknownFields()); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { input.readMessage(getKeytabFieldBuilder().getBuilder(), extensionRegistry); bitField0_ |= 0x00000001; break; } // case 10 case 18: { principal_ = input.readStringRequireUtf8(); bitField0_ |= 0x00000002; break; } // case 18 case 26: { krb5ConfigGcsUri_ = input.readStringRequireUtf8(); bitField0_ |= 0x00000004; break; } // case 26 default: { if (!super.parseUnknownField(input, extensionRegistry, tag)) { done = true; // was an endgroup tag } break; } // default: } // switch (tag) } // while (!done) } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.unwrapIOException(); } finally { onChanged(); } // finally return this; } private int bitField0_; private com.google.cloud.metastore.v1beta.Secret keytab_; private com.google.protobuf.SingleFieldBuilderV3< com.google.cloud.metastore.v1beta.Secret, com.google.cloud.metastore.v1beta.Secret.Builder, com.google.cloud.metastore.v1beta.SecretOrBuilder> keytabBuilder_; /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; * * @return Whether the keytab field is set. */ public boolean hasKeytab() { return ((bitField0_ & 0x00000001) != 0); } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; * * @return The keytab. */ public com.google.cloud.metastore.v1beta.Secret getKeytab() { if (keytabBuilder_ == null) { return keytab_ == null ? com.google.cloud.metastore.v1beta.Secret.getDefaultInstance() : keytab_; } else { return keytabBuilder_.getMessage(); } } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public Builder setKeytab(com.google.cloud.metastore.v1beta.Secret value) { if (keytabBuilder_ == null) { if (value == null) { throw new NullPointerException(); } keytab_ = value; } else { keytabBuilder_.setMessage(value); } bitField0_ |= 0x00000001; onChanged(); return this; } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public Builder setKeytab(com.google.cloud.metastore.v1beta.Secret.Builder builderForValue) { if (keytabBuilder_ == null) { keytab_ = builderForValue.build(); } else { keytabBuilder_.setMessage(builderForValue.build()); } bitField0_ |= 0x00000001; onChanged(); return this; } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public Builder mergeKeytab(com.google.cloud.metastore.v1beta.Secret value) { if (keytabBuilder_ == null) { if (((bitField0_ & 0x00000001) != 0) && keytab_ != null && keytab_ != com.google.cloud.metastore.v1beta.Secret.getDefaultInstance()) { getKeytabBuilder().mergeFrom(value); } else { keytab_ = value; } } else { keytabBuilder_.mergeFrom(value); } if (keytab_ != null) { bitField0_ |= 0x00000001; onChanged(); } return this; } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public Builder clearKeytab() { bitField0_ = (bitField0_ & ~0x00000001); keytab_ = null; if (keytabBuilder_ != null) { keytabBuilder_.dispose(); keytabBuilder_ = null; } onChanged(); return this; } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public com.google.cloud.metastore.v1beta.Secret.Builder getKeytabBuilder() { bitField0_ |= 0x00000001; onChanged(); return getKeytabFieldBuilder().getBuilder(); } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ public com.google.cloud.metastore.v1beta.SecretOrBuilder getKeytabOrBuilder() { if (keytabBuilder_ != null) { return keytabBuilder_.getMessageOrBuilder(); } else { return keytab_ == null ? com.google.cloud.metastore.v1beta.Secret.getDefaultInstance() : keytab_; } } /** * * *
     * A Kerberos keytab file that can be used to authenticate a service principal
     * with a Kerberos Key Distribution Center (KDC).
     * 
* * .google.cloud.metastore.v1beta.Secret keytab = 1; */ private com.google.protobuf.SingleFieldBuilderV3< com.google.cloud.metastore.v1beta.Secret, com.google.cloud.metastore.v1beta.Secret.Builder, com.google.cloud.metastore.v1beta.SecretOrBuilder> getKeytabFieldBuilder() { if (keytabBuilder_ == null) { keytabBuilder_ = new com.google.protobuf.SingleFieldBuilderV3< com.google.cloud.metastore.v1beta.Secret, com.google.cloud.metastore.v1beta.Secret.Builder, com.google.cloud.metastore.v1beta.SecretOrBuilder>( getKeytab(), getParentForChildren(), isClean()); keytab_ = null; } return keytabBuilder_; } private java.lang.Object principal_ = ""; /** * * *
     * A Kerberos principal that exists in the both the keytab the KDC
     * to authenticate as. A typical principal is of the form
     * `primary/instance@REALM`, but there is no exact format.
     * 
* * string principal = 2; * * @return The principal. */ public java.lang.String getPrincipal() { java.lang.Object ref = principal_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); principal_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * A Kerberos principal that exists in the both the keytab the KDC
     * to authenticate as. A typical principal is of the form
     * `primary/instance@REALM`, but there is no exact format.
     * 
* * string principal = 2; * * @return The bytes for principal. */ public com.google.protobuf.ByteString getPrincipalBytes() { java.lang.Object ref = principal_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); principal_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * A Kerberos principal that exists in the both the keytab the KDC
     * to authenticate as. A typical principal is of the form
     * `primary/instance@REALM`, but there is no exact format.
     * 
* * string principal = 2; * * @param value The principal to set. * @return This builder for chaining. */ public Builder setPrincipal(java.lang.String value) { if (value == null) { throw new NullPointerException(); } principal_ = value; bitField0_ |= 0x00000002; onChanged(); return this; } /** * * *
     * A Kerberos principal that exists in the both the keytab the KDC
     * to authenticate as. A typical principal is of the form
     * `primary/instance@REALM`, but there is no exact format.
     * 
* * string principal = 2; * * @return This builder for chaining. */ public Builder clearPrincipal() { principal_ = getDefaultInstance().getPrincipal(); bitField0_ = (bitField0_ & ~0x00000002); onChanged(); return this; } /** * * *
     * A Kerberos principal that exists in the both the keytab the KDC
     * to authenticate as. A typical principal is of the form
     * `primary/instance@REALM`, but there is no exact format.
     * 
* * string principal = 2; * * @param value The bytes for principal to set. * @return This builder for chaining. */ public Builder setPrincipalBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); principal_ = value; bitField0_ |= 0x00000002; onChanged(); return this; } private java.lang.Object krb5ConfigGcsUri_ = ""; /** * * *
     * A Cloud Storage URI that specifies the path to a
     * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
     * although the file does not need to be named krb5.conf explicitly.
     * 
* * string krb5_config_gcs_uri = 3; * * @return The krb5ConfigGcsUri. */ public java.lang.String getKrb5ConfigGcsUri() { java.lang.Object ref = krb5ConfigGcsUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); krb5ConfigGcsUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * A Cloud Storage URI that specifies the path to a
     * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
     * although the file does not need to be named krb5.conf explicitly.
     * 
* * string krb5_config_gcs_uri = 3; * * @return The bytes for krb5ConfigGcsUri. */ public com.google.protobuf.ByteString getKrb5ConfigGcsUriBytes() { java.lang.Object ref = krb5ConfigGcsUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); krb5ConfigGcsUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * A Cloud Storage URI that specifies the path to a
     * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
     * although the file does not need to be named krb5.conf explicitly.
     * 
* * string krb5_config_gcs_uri = 3; * * @param value The krb5ConfigGcsUri to set. * @return This builder for chaining. */ public Builder setKrb5ConfigGcsUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } krb5ConfigGcsUri_ = value; bitField0_ |= 0x00000004; onChanged(); return this; } /** * * *
     * A Cloud Storage URI that specifies the path to a
     * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
     * although the file does not need to be named krb5.conf explicitly.
     * 
* * string krb5_config_gcs_uri = 3; * * @return This builder for chaining. */ public Builder clearKrb5ConfigGcsUri() { krb5ConfigGcsUri_ = getDefaultInstance().getKrb5ConfigGcsUri(); bitField0_ = (bitField0_ & ~0x00000004); onChanged(); return this; } /** * * *
     * A Cloud Storage URI that specifies the path to a
     * krb5.conf file. It is of the form `gs://{bucket_name}/path/to/krb5.conf`,
     * although the file does not need to be named krb5.conf explicitly.
     * 
* * string krb5_config_gcs_uri = 3; * * @param value The bytes for krb5ConfigGcsUri to set. * @return This builder for chaining. */ public Builder setKrb5ConfigGcsUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); krb5ConfigGcsUri_ = value; bitField0_ |= 0x00000004; onChanged(); return this; } @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:google.cloud.metastore.v1beta.KerberosConfig) } // @@protoc_insertion_point(class_scope:google.cloud.metastore.v1beta.KerberosConfig) private static final com.google.cloud.metastore.v1beta.KerberosConfig DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new com.google.cloud.metastore.v1beta.KerberosConfig(); } public static com.google.cloud.metastore.v1beta.KerberosConfig getDefaultInstance() { return DEFAULT_INSTANCE; } private static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public KerberosConfig parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { Builder builder = newBuilder(); try { builder.mergeFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(builder.buildPartial()); } catch (com.google.protobuf.UninitializedMessageException e) { throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e) .setUnfinishedMessage(builder.buildPartial()); } return builder.buildPartial(); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public com.google.cloud.metastore.v1beta.KerberosConfig getDefaultInstanceForType() { return DEFAULT_INSTANCE; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy