All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.google.cloud.dataproc.v1.KerberosConfig Maven / Gradle / Ivy

/*
 * Copyright 2020 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/cloud/dataproc/v1/clusters.proto

package com.google.cloud.dataproc.v1;

/**
 *
 *
 * 
 * Specifies Kerberos related configuration.
 * 
* * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig} */ public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:google.cloud.dataproc.v1.KerberosConfig) KerberosConfigOrBuilder { private static final long serialVersionUID = 0L; // Use KerberosConfig.newBuilder() to construct. private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private KerberosConfig() { rootPrincipalPasswordUri_ = ""; kmsKeyUri_ = ""; keystoreUri_ = ""; truststoreUri_ = ""; keystorePasswordUri_ = ""; keyPasswordUri_ = ""; truststorePasswordUri_ = ""; crossRealmTrustRealm_ = ""; crossRealmTrustKdc_ = ""; crossRealmTrustAdminServer_ = ""; crossRealmTrustSharedPasswordUri_ = ""; kdcDbKeyUri_ = ""; realm_ = ""; } @java.lang.Override @SuppressWarnings({"unused"}) protected java.lang.Object newInstance(UnusedPrivateParameter unused) { return new KerberosConfig(); } @java.lang.Override public final com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private KerberosConfig( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } com.google.protobuf.UnknownFieldSet.Builder unknownFields = com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 8: { enableKerberos_ = input.readBool(); break; } case 18: { java.lang.String s = input.readStringRequireUtf8(); rootPrincipalPasswordUri_ = s; break; } case 26: { java.lang.String s = input.readStringRequireUtf8(); kmsKeyUri_ = s; break; } case 34: { java.lang.String s = input.readStringRequireUtf8(); keystoreUri_ = s; break; } case 42: { java.lang.String s = input.readStringRequireUtf8(); truststoreUri_ = s; break; } case 50: { java.lang.String s = input.readStringRequireUtf8(); keystorePasswordUri_ = s; break; } case 58: { java.lang.String s = input.readStringRequireUtf8(); keyPasswordUri_ = s; break; } case 66: { java.lang.String s = input.readStringRequireUtf8(); truststorePasswordUri_ = s; break; } case 74: { java.lang.String s = input.readStringRequireUtf8(); crossRealmTrustRealm_ = s; break; } case 82: { java.lang.String s = input.readStringRequireUtf8(); crossRealmTrustKdc_ = s; break; } case 90: { java.lang.String s = input.readStringRequireUtf8(); crossRealmTrustAdminServer_ = s; break; } case 98: { java.lang.String s = input.readStringRequireUtf8(); crossRealmTrustSharedPasswordUri_ = s; break; } case 106: { java.lang.String s = input.readStringRequireUtf8(); kdcDbKeyUri_ = s; break; } case 112: { tgtLifetimeHours_ = input.readInt32(); break; } case 122: { java.lang.String s = input.readStringRequireUtf8(); realm_ = s; break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return com.google.cloud.dataproc.v1.ClustersProto .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return com.google.cloud.dataproc.v1.ClustersProto .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable .ensureFieldAccessorsInitialized( com.google.cloud.dataproc.v1.KerberosConfig.class, com.google.cloud.dataproc.v1.KerberosConfig.Builder.class); } public static final int ENABLE_KERBEROS_FIELD_NUMBER = 1; private boolean enableKerberos_; /** * * *
   * Optional. Flag to indicate whether to Kerberize the cluster (default: false). Set
   * this field to true to enable Kerberos on a cluster.
   * 
* * bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL]; * * @return The enableKerberos. */ @java.lang.Override public boolean getEnableKerberos() { return enableKerberos_; } public static final int ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER = 2; private volatile java.lang.Object rootPrincipalPasswordUri_; /** * * *
   * Required. The Cloud Storage URI of a KMS encrypted file containing the root
   * principal password.
   * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * @return The rootPrincipalPasswordUri. */ @java.lang.Override public java.lang.String getRootPrincipalPasswordUri() { java.lang.Object ref = rootPrincipalPasswordUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); rootPrincipalPasswordUri_ = s; return s; } } /** * * *
   * Required. The Cloud Storage URI of a KMS encrypted file containing the root
   * principal password.
   * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * @return The bytes for rootPrincipalPasswordUri. */ @java.lang.Override public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() { java.lang.Object ref = rootPrincipalPasswordUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); rootPrincipalPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KMS_KEY_URI_FIELD_NUMBER = 3; private volatile java.lang.Object kmsKeyUri_; /** * * *
   * Required. The uri of the KMS key used to encrypt various sensitive
   * files.
   * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @return The kmsKeyUri. */ @java.lang.Override public java.lang.String getKmsKeyUri() { java.lang.Object ref = kmsKeyUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); kmsKeyUri_ = s; return s; } } /** * * *
   * Required. The uri of the KMS key used to encrypt various sensitive
   * files.
   * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @return The bytes for kmsKeyUri. */ @java.lang.Override public com.google.protobuf.ByteString getKmsKeyUriBytes() { java.lang.Object ref = kmsKeyUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); kmsKeyUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KEYSTORE_URI_FIELD_NUMBER = 4; private volatile java.lang.Object keystoreUri_; /** * * *
   * Optional. The Cloud Storage URI of the keystore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keystoreUri. */ @java.lang.Override public java.lang.String getKeystoreUri() { java.lang.Object ref = keystoreUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keystoreUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of the keystore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keystoreUri. */ @java.lang.Override public com.google.protobuf.ByteString getKeystoreUriBytes() { java.lang.Object ref = keystoreUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keystoreUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int TRUSTSTORE_URI_FIELD_NUMBER = 5; private volatile java.lang.Object truststoreUri_; /** * * *
   * Optional. The Cloud Storage URI of the truststore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @return The truststoreUri. */ @java.lang.Override public java.lang.String getTruststoreUri() { java.lang.Object ref = truststoreUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); truststoreUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of the truststore file used for SSL
   * encryption. If not provided, Dataproc will provide a self-signed
   * certificate.
   * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for truststoreUri. */ @java.lang.Override public com.google.protobuf.ByteString getTruststoreUriBytes() { java.lang.Object ref = truststoreUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); truststoreUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KEYSTORE_PASSWORD_URI_FIELD_NUMBER = 6; private volatile java.lang.Object keystorePasswordUri_; /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided keystore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keystorePasswordUri. */ @java.lang.Override public java.lang.String getKeystorePasswordUri() { java.lang.Object ref = keystorePasswordUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keystorePasswordUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided keystore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keystorePasswordUri. */ @java.lang.Override public com.google.protobuf.ByteString getKeystorePasswordUriBytes() { java.lang.Object ref = keystorePasswordUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keystorePasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KEY_PASSWORD_URI_FIELD_NUMBER = 7; private volatile java.lang.Object keyPasswordUri_; /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided key. For the self-signed certificate, this
   * password is generated by Dataproc.
   * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keyPasswordUri. */ @java.lang.Override public java.lang.String getKeyPasswordUri() { java.lang.Object ref = keyPasswordUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keyPasswordUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided key. For the self-signed certificate, this
   * password is generated by Dataproc.
   * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keyPasswordUri. */ @java.lang.Override public com.google.protobuf.ByteString getKeyPasswordUriBytes() { java.lang.Object ref = keyPasswordUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keyPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER = 8; private volatile java.lang.Object truststorePasswordUri_; /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided truststore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @return The truststorePasswordUri. */ @java.lang.Override public java.lang.String getTruststorePasswordUri() { java.lang.Object ref = truststorePasswordUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); truststorePasswordUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * password to the user provided truststore. For the self-signed certificate,
   * this password is generated by Dataproc.
   * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for truststorePasswordUri. */ @java.lang.Override public com.google.protobuf.ByteString getTruststorePasswordUriBytes() { java.lang.Object ref = truststorePasswordUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); truststorePasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int CROSS_REALM_TRUST_REALM_FIELD_NUMBER = 9; private volatile java.lang.Object crossRealmTrustRealm_; /** * * *
   * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
   * the user enable cross realm trust.
   * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @return The crossRealmTrustRealm. */ @java.lang.Override public java.lang.String getCrossRealmTrustRealm() { java.lang.Object ref = crossRealmTrustRealm_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustRealm_ = s; return s; } } /** * * *
   * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
   * the user enable cross realm trust.
   * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for crossRealmTrustRealm. */ @java.lang.Override public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() { java.lang.Object ref = crossRealmTrustRealm_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustRealm_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int CROSS_REALM_TRUST_KDC_FIELD_NUMBER = 10; private volatile java.lang.Object crossRealmTrustKdc_; /** * * *
   * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
   * realm trust relationship.
   * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @return The crossRealmTrustKdc. */ @java.lang.Override public java.lang.String getCrossRealmTrustKdc() { java.lang.Object ref = crossRealmTrustKdc_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustKdc_ = s; return s; } } /** * * *
   * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
   * realm trust relationship.
   * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for crossRealmTrustKdc. */ @java.lang.Override public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() { java.lang.Object ref = crossRealmTrustKdc_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustKdc_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER = 11; private volatile java.lang.Object crossRealmTrustAdminServer_; /** * * *
   * Optional. The admin server (IP or hostname) for the remote trusted realm in
   * a cross realm trust relationship.
   * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The crossRealmTrustAdminServer. */ @java.lang.Override public java.lang.String getCrossRealmTrustAdminServer() { java.lang.Object ref = crossRealmTrustAdminServer_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustAdminServer_ = s; return s; } } /** * * *
   * Optional. The admin server (IP or hostname) for the remote trusted realm in
   * a cross realm trust relationship.
   * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The bytes for crossRealmTrustAdminServer. */ @java.lang.Override public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() { java.lang.Object ref = crossRealmTrustAdminServer_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustAdminServer_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER = 12; private volatile java.lang.Object crossRealmTrustSharedPasswordUri_; /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * shared password between the on-cluster Kerberos realm and the remote
   * trusted realm, in a cross realm trust relationship.
   * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The crossRealmTrustSharedPasswordUri. */ @java.lang.Override public java.lang.String getCrossRealmTrustSharedPasswordUri() { java.lang.Object ref = crossRealmTrustSharedPasswordUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustSharedPasswordUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * shared password between the on-cluster Kerberos realm and the remote
   * trusted realm, in a cross realm trust relationship.
   * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The bytes for crossRealmTrustSharedPasswordUri. */ @java.lang.Override public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() { java.lang.Object ref = crossRealmTrustSharedPasswordUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustSharedPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int KDC_DB_KEY_URI_FIELD_NUMBER = 13; private volatile java.lang.Object kdcDbKeyUri_; /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * master key of the KDC database.
   * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @return The kdcDbKeyUri. */ @java.lang.Override public java.lang.String getKdcDbKeyUri() { java.lang.Object ref = kdcDbKeyUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); kdcDbKeyUri_ = s; return s; } } /** * * *
   * Optional. The Cloud Storage URI of a KMS encrypted file containing the
   * master key of the KDC database.
   * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for kdcDbKeyUri. */ @java.lang.Override public com.google.protobuf.ByteString getKdcDbKeyUriBytes() { java.lang.Object ref = kdcDbKeyUri_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); kdcDbKeyUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } public static final int TGT_LIFETIME_HOURS_FIELD_NUMBER = 14; private int tgtLifetimeHours_; /** * * *
   * Optional. The lifetime of the ticket granting ticket, in hours.
   * If not specified, or user specifies 0, then default value 10
   * will be used.
   * 
* * int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL]; * * @return The tgtLifetimeHours. */ @java.lang.Override public int getTgtLifetimeHours() { return tgtLifetimeHours_; } public static final int REALM_FIELD_NUMBER = 15; private volatile java.lang.Object realm_; /** * * *
   * Optional. The name of the on-cluster Kerberos realm.
   * If not specified, the uppercased domain of hostnames will be the realm.
   * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @return The realm. */ @java.lang.Override public java.lang.String getRealm() { java.lang.Object ref = realm_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); realm_ = s; return s; } } /** * * *
   * Optional. The name of the on-cluster Kerberos realm.
   * If not specified, the uppercased domain of hostnames will be the realm.
   * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for realm. */ @java.lang.Override public com.google.protobuf.ByteString getRealmBytes() { java.lang.Object ref = realm_; if (ref instanceof java.lang.String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); realm_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (enableKerberos_ != false) { output.writeBool(1, enableKerberos_); } if (!getRootPrincipalPasswordUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 2, rootPrincipalPasswordUri_); } if (!getKmsKeyUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 3, kmsKeyUri_); } if (!getKeystoreUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 4, keystoreUri_); } if (!getTruststoreUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 5, truststoreUri_); } if (!getKeystorePasswordUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 6, keystorePasswordUri_); } if (!getKeyPasswordUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 7, keyPasswordUri_); } if (!getTruststorePasswordUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 8, truststorePasswordUri_); } if (!getCrossRealmTrustRealmBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 9, crossRealmTrustRealm_); } if (!getCrossRealmTrustKdcBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 10, crossRealmTrustKdc_); } if (!getCrossRealmTrustAdminServerBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 11, crossRealmTrustAdminServer_); } if (!getCrossRealmTrustSharedPasswordUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString( output, 12, crossRealmTrustSharedPasswordUri_); } if (!getKdcDbKeyUriBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 13, kdcDbKeyUri_); } if (tgtLifetimeHours_ != 0) { output.writeInt32(14, tgtLifetimeHours_); } if (!getRealmBytes().isEmpty()) { com.google.protobuf.GeneratedMessageV3.writeString(output, 15, realm_); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (enableKerberos_ != false) { size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, enableKerberos_); } if (!getRootPrincipalPasswordUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(2, rootPrincipalPasswordUri_); } if (!getKmsKeyUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, kmsKeyUri_); } if (!getKeystoreUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, keystoreUri_); } if (!getTruststoreUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, truststoreUri_); } if (!getKeystorePasswordUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, keystorePasswordUri_); } if (!getKeyPasswordUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, keyPasswordUri_); } if (!getTruststorePasswordUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(8, truststorePasswordUri_); } if (!getCrossRealmTrustRealmBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(9, crossRealmTrustRealm_); } if (!getCrossRealmTrustKdcBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(10, crossRealmTrustKdc_); } if (!getCrossRealmTrustAdminServerBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(11, crossRealmTrustAdminServer_); } if (!getCrossRealmTrustSharedPasswordUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize( 12, crossRealmTrustSharedPasswordUri_); } if (!getKdcDbKeyUriBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(13, kdcDbKeyUri_); } if (tgtLifetimeHours_ != 0) { size += com.google.protobuf.CodedOutputStream.computeInt32Size(14, tgtLifetimeHours_); } if (!getRealmBytes().isEmpty()) { size += com.google.protobuf.GeneratedMessageV3.computeStringSize(15, realm_); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof com.google.cloud.dataproc.v1.KerberosConfig)) { return super.equals(obj); } com.google.cloud.dataproc.v1.KerberosConfig other = (com.google.cloud.dataproc.v1.KerberosConfig) obj; if (getEnableKerberos() != other.getEnableKerberos()) return false; if (!getRootPrincipalPasswordUri().equals(other.getRootPrincipalPasswordUri())) return false; if (!getKmsKeyUri().equals(other.getKmsKeyUri())) return false; if (!getKeystoreUri().equals(other.getKeystoreUri())) return false; if (!getTruststoreUri().equals(other.getTruststoreUri())) return false; if (!getKeystorePasswordUri().equals(other.getKeystorePasswordUri())) return false; if (!getKeyPasswordUri().equals(other.getKeyPasswordUri())) return false; if (!getTruststorePasswordUri().equals(other.getTruststorePasswordUri())) return false; if (!getCrossRealmTrustRealm().equals(other.getCrossRealmTrustRealm())) return false; if (!getCrossRealmTrustKdc().equals(other.getCrossRealmTrustKdc())) return false; if (!getCrossRealmTrustAdminServer().equals(other.getCrossRealmTrustAdminServer())) return false; if (!getCrossRealmTrustSharedPasswordUri().equals(other.getCrossRealmTrustSharedPasswordUri())) return false; if (!getKdcDbKeyUri().equals(other.getKdcDbKeyUri())) return false; if (getTgtLifetimeHours() != other.getTgtLifetimeHours()) return false; if (!getRealm().equals(other.getRealm())) return false; if (!unknownFields.equals(other.unknownFields)) return false; return true; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); hash = (37 * hash) + ENABLE_KERBEROS_FIELD_NUMBER; hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEnableKerberos()); hash = (37 * hash) + ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER; hash = (53 * hash) + getRootPrincipalPasswordUri().hashCode(); hash = (37 * hash) + KMS_KEY_URI_FIELD_NUMBER; hash = (53 * hash) + getKmsKeyUri().hashCode(); hash = (37 * hash) + KEYSTORE_URI_FIELD_NUMBER; hash = (53 * hash) + getKeystoreUri().hashCode(); hash = (37 * hash) + TRUSTSTORE_URI_FIELD_NUMBER; hash = (53 * hash) + getTruststoreUri().hashCode(); hash = (37 * hash) + KEYSTORE_PASSWORD_URI_FIELD_NUMBER; hash = (53 * hash) + getKeystorePasswordUri().hashCode(); hash = (37 * hash) + KEY_PASSWORD_URI_FIELD_NUMBER; hash = (53 * hash) + getKeyPasswordUri().hashCode(); hash = (37 * hash) + TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER; hash = (53 * hash) + getTruststorePasswordUri().hashCode(); hash = (37 * hash) + CROSS_REALM_TRUST_REALM_FIELD_NUMBER; hash = (53 * hash) + getCrossRealmTrustRealm().hashCode(); hash = (37 * hash) + CROSS_REALM_TRUST_KDC_FIELD_NUMBER; hash = (53 * hash) + getCrossRealmTrustKdc().hashCode(); hash = (37 * hash) + CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER; hash = (53 * hash) + getCrossRealmTrustAdminServer().hashCode(); hash = (37 * hash) + CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER; hash = (53 * hash) + getCrossRealmTrustSharedPasswordUri().hashCode(); hash = (37 * hash) + KDC_DB_KEY_URI_FIELD_NUMBER; hash = (53 * hash) + getKdcDbKeyUri().hashCode(); hash = (37 * hash) + TGT_LIFETIME_HOURS_FIELD_NUMBER; hash = (53 * hash) + getTgtLifetimeHours(); hash = (37 * hash) + REALM_FIELD_NUMBER; hash = (53 * hash) + getRealm().hashCode(); hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom( java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
   * Specifies Kerberos related configuration.
   * 
* * Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig} */ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:google.cloud.dataproc.v1.KerberosConfig) com.google.cloud.dataproc.v1.KerberosConfigOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return com.google.cloud.dataproc.v1.ClustersProto .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return com.google.cloud.dataproc.v1.ClustersProto .internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable .ensureFieldAccessorsInitialized( com.google.cloud.dataproc.v1.KerberosConfig.class, com.google.cloud.dataproc.v1.KerberosConfig.Builder.class); } // Construct using com.google.cloud.dataproc.v1.KerberosConfig.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) {} } @java.lang.Override public Builder clear() { super.clear(); enableKerberos_ = false; rootPrincipalPasswordUri_ = ""; kmsKeyUri_ = ""; keystoreUri_ = ""; truststoreUri_ = ""; keystorePasswordUri_ = ""; keyPasswordUri_ = ""; truststorePasswordUri_ = ""; crossRealmTrustRealm_ = ""; crossRealmTrustKdc_ = ""; crossRealmTrustAdminServer_ = ""; crossRealmTrustSharedPasswordUri_ = ""; kdcDbKeyUri_ = ""; tgtLifetimeHours_ = 0; realm_ = ""; return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return com.google.cloud.dataproc.v1.ClustersProto .internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor; } @java.lang.Override public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() { return com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance(); } @java.lang.Override public com.google.cloud.dataproc.v1.KerberosConfig build() { com.google.cloud.dataproc.v1.KerberosConfig result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public com.google.cloud.dataproc.v1.KerberosConfig buildPartial() { com.google.cloud.dataproc.v1.KerberosConfig result = new com.google.cloud.dataproc.v1.KerberosConfig(this); result.enableKerberos_ = enableKerberos_; result.rootPrincipalPasswordUri_ = rootPrincipalPasswordUri_; result.kmsKeyUri_ = kmsKeyUri_; result.keystoreUri_ = keystoreUri_; result.truststoreUri_ = truststoreUri_; result.keystorePasswordUri_ = keystorePasswordUri_; result.keyPasswordUri_ = keyPasswordUri_; result.truststorePasswordUri_ = truststorePasswordUri_; result.crossRealmTrustRealm_ = crossRealmTrustRealm_; result.crossRealmTrustKdc_ = crossRealmTrustKdc_; result.crossRealmTrustAdminServer_ = crossRealmTrustAdminServer_; result.crossRealmTrustSharedPasswordUri_ = crossRealmTrustSharedPasswordUri_; result.kdcDbKeyUri_ = kdcDbKeyUri_; result.tgtLifetimeHours_ = tgtLifetimeHours_; result.realm_ = realm_; onBuilt(); return result; } @java.lang.Override public Builder clone() { return super.clone(); } @java.lang.Override public Builder setField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.setField(field, value); } @java.lang.Override public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) { return super.clearField(field); } @java.lang.Override public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) { return super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof com.google.cloud.dataproc.v1.KerberosConfig) { return mergeFrom((com.google.cloud.dataproc.v1.KerberosConfig) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other) { if (other == com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance()) return this; if (other.getEnableKerberos() != false) { setEnableKerberos(other.getEnableKerberos()); } if (!other.getRootPrincipalPasswordUri().isEmpty()) { rootPrincipalPasswordUri_ = other.rootPrincipalPasswordUri_; onChanged(); } if (!other.getKmsKeyUri().isEmpty()) { kmsKeyUri_ = other.kmsKeyUri_; onChanged(); } if (!other.getKeystoreUri().isEmpty()) { keystoreUri_ = other.keystoreUri_; onChanged(); } if (!other.getTruststoreUri().isEmpty()) { truststoreUri_ = other.truststoreUri_; onChanged(); } if (!other.getKeystorePasswordUri().isEmpty()) { keystorePasswordUri_ = other.keystorePasswordUri_; onChanged(); } if (!other.getKeyPasswordUri().isEmpty()) { keyPasswordUri_ = other.keyPasswordUri_; onChanged(); } if (!other.getTruststorePasswordUri().isEmpty()) { truststorePasswordUri_ = other.truststorePasswordUri_; onChanged(); } if (!other.getCrossRealmTrustRealm().isEmpty()) { crossRealmTrustRealm_ = other.crossRealmTrustRealm_; onChanged(); } if (!other.getCrossRealmTrustKdc().isEmpty()) { crossRealmTrustKdc_ = other.crossRealmTrustKdc_; onChanged(); } if (!other.getCrossRealmTrustAdminServer().isEmpty()) { crossRealmTrustAdminServer_ = other.crossRealmTrustAdminServer_; onChanged(); } if (!other.getCrossRealmTrustSharedPasswordUri().isEmpty()) { crossRealmTrustSharedPasswordUri_ = other.crossRealmTrustSharedPasswordUri_; onChanged(); } if (!other.getKdcDbKeyUri().isEmpty()) { kdcDbKeyUri_ = other.kdcDbKeyUri_; onChanged(); } if (other.getTgtLifetimeHours() != 0) { setTgtLifetimeHours(other.getTgtLifetimeHours()); } if (!other.getRealm().isEmpty()) { realm_ = other.realm_; onChanged(); } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { com.google.cloud.dataproc.v1.KerberosConfig parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (com.google.cloud.dataproc.v1.KerberosConfig) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private boolean enableKerberos_; /** * * *
     * Optional. Flag to indicate whether to Kerberize the cluster (default: false). Set
     * this field to true to enable Kerberos on a cluster.
     * 
* * bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL]; * * @return The enableKerberos. */ @java.lang.Override public boolean getEnableKerberos() { return enableKerberos_; } /** * * *
     * Optional. Flag to indicate whether to Kerberize the cluster (default: false). Set
     * this field to true to enable Kerberos on a cluster.
     * 
* * bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The enableKerberos to set. * @return This builder for chaining. */ public Builder setEnableKerberos(boolean value) { enableKerberos_ = value; onChanged(); return this; } /** * * *
     * Optional. Flag to indicate whether to Kerberize the cluster (default: false). Set
     * this field to true to enable Kerberos on a cluster.
     * 
* * bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearEnableKerberos() { enableKerberos_ = false; onChanged(); return this; } private java.lang.Object rootPrincipalPasswordUri_ = ""; /** * * *
     * Required. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * * @return The rootPrincipalPasswordUri. */ public java.lang.String getRootPrincipalPasswordUri() { java.lang.Object ref = rootPrincipalPasswordUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); rootPrincipalPasswordUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Required. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * * @return The bytes for rootPrincipalPasswordUri. */ public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() { java.lang.Object ref = rootPrincipalPasswordUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); rootPrincipalPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Required. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * * @param value The rootPrincipalPasswordUri to set. * @return This builder for chaining. */ public Builder setRootPrincipalPasswordUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } rootPrincipalPasswordUri_ = value; onChanged(); return this; } /** * * *
     * Required. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * * @return This builder for chaining. */ public Builder clearRootPrincipalPasswordUri() { rootPrincipalPasswordUri_ = getDefaultInstance().getRootPrincipalPasswordUri(); onChanged(); return this; } /** * * *
     * Required. The Cloud Storage URI of a KMS encrypted file containing the root
     * principal password.
     * 
* * string root_principal_password_uri = 2 [(.google.api.field_behavior) = REQUIRED]; * * * @param value The bytes for rootPrincipalPasswordUri to set. * @return This builder for chaining. */ public Builder setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); rootPrincipalPasswordUri_ = value; onChanged(); return this; } private java.lang.Object kmsKeyUri_ = ""; /** * * *
     * Required. The uri of the KMS key used to encrypt various sensitive
     * files.
     * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @return The kmsKeyUri. */ public java.lang.String getKmsKeyUri() { java.lang.Object ref = kmsKeyUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); kmsKeyUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Required. The uri of the KMS key used to encrypt various sensitive
     * files.
     * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @return The bytes for kmsKeyUri. */ public com.google.protobuf.ByteString getKmsKeyUriBytes() { java.lang.Object ref = kmsKeyUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); kmsKeyUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Required. The uri of the KMS key used to encrypt various sensitive
     * files.
     * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @param value The kmsKeyUri to set. * @return This builder for chaining. */ public Builder setKmsKeyUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } kmsKeyUri_ = value; onChanged(); return this; } /** * * *
     * Required. The uri of the KMS key used to encrypt various sensitive
     * files.
     * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @return This builder for chaining. */ public Builder clearKmsKeyUri() { kmsKeyUri_ = getDefaultInstance().getKmsKeyUri(); onChanged(); return this; } /** * * *
     * Required. The uri of the KMS key used to encrypt various sensitive
     * files.
     * 
* * string kms_key_uri = 3 [(.google.api.field_behavior) = REQUIRED]; * * @param value The bytes for kmsKeyUri to set. * @return This builder for chaining. */ public Builder setKmsKeyUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); kmsKeyUri_ = value; onChanged(); return this; } private java.lang.Object keystoreUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keystoreUri. */ public java.lang.String getKeystoreUri() { java.lang.Object ref = keystoreUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keystoreUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keystoreUri. */ public com.google.protobuf.ByteString getKeystoreUriBytes() { java.lang.Object ref = keystoreUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keystoreUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The keystoreUri to set. * @return This builder for chaining. */ public Builder setKeystoreUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } keystoreUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearKeystoreUri() { keystoreUri_ = getDefaultInstance().getKeystoreUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of the keystore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for keystoreUri to set. * @return This builder for chaining. */ public Builder setKeystoreUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); keystoreUri_ = value; onChanged(); return this; } private java.lang.Object truststoreUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @return The truststoreUri. */ public java.lang.String getTruststoreUri() { java.lang.Object ref = truststoreUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); truststoreUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for truststoreUri. */ public com.google.protobuf.ByteString getTruststoreUriBytes() { java.lang.Object ref = truststoreUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); truststoreUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The truststoreUri to set. * @return This builder for chaining. */ public Builder setTruststoreUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } truststoreUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearTruststoreUri() { truststoreUri_ = getDefaultInstance().getTruststoreUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of the truststore file used for SSL
     * encryption. If not provided, Dataproc will provide a self-signed
     * certificate.
     * 
* * string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for truststoreUri to set. * @return This builder for chaining. */ public Builder setTruststoreUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); truststoreUri_ = value; onChanged(); return this; } private java.lang.Object keystorePasswordUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keystorePasswordUri. */ public java.lang.String getKeystorePasswordUri() { java.lang.Object ref = keystorePasswordUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keystorePasswordUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keystorePasswordUri. */ public com.google.protobuf.ByteString getKeystorePasswordUriBytes() { java.lang.Object ref = keystorePasswordUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keystorePasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The keystorePasswordUri to set. * @return This builder for chaining. */ public Builder setKeystorePasswordUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } keystorePasswordUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearKeystorePasswordUri() { keystorePasswordUri_ = getDefaultInstance().getKeystorePasswordUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided keystore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for keystorePasswordUri to set. * @return This builder for chaining. */ public Builder setKeystorePasswordUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); keystorePasswordUri_ = value; onChanged(); return this; } private java.lang.Object keyPasswordUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @return The keyPasswordUri. */ public java.lang.String getKeyPasswordUri() { java.lang.Object ref = keyPasswordUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); keyPasswordUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for keyPasswordUri. */ public com.google.protobuf.ByteString getKeyPasswordUriBytes() { java.lang.Object ref = keyPasswordUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); keyPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The keyPasswordUri to set. * @return This builder for chaining. */ public Builder setKeyPasswordUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } keyPasswordUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearKeyPasswordUri() { keyPasswordUri_ = getDefaultInstance().getKeyPasswordUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided key. For the self-signed certificate, this
     * password is generated by Dataproc.
     * 
* * string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for keyPasswordUri to set. * @return This builder for chaining. */ public Builder setKeyPasswordUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); keyPasswordUri_ = value; onChanged(); return this; } private java.lang.Object truststorePasswordUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @return The truststorePasswordUri. */ public java.lang.String getTruststorePasswordUri() { java.lang.Object ref = truststorePasswordUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); truststorePasswordUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for truststorePasswordUri. */ public com.google.protobuf.ByteString getTruststorePasswordUriBytes() { java.lang.Object ref = truststorePasswordUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); truststorePasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The truststorePasswordUri to set. * @return This builder for chaining. */ public Builder setTruststorePasswordUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } truststorePasswordUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearTruststorePasswordUri() { truststorePasswordUri_ = getDefaultInstance().getTruststorePasswordUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * password to the user provided truststore. For the self-signed certificate,
     * this password is generated by Dataproc.
     * 
* * string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for truststorePasswordUri to set. * @return This builder for chaining. */ public Builder setTruststorePasswordUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); truststorePasswordUri_ = value; onChanged(); return this; } private java.lang.Object crossRealmTrustRealm_ = ""; /** * * *
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @return The crossRealmTrustRealm. */ public java.lang.String getCrossRealmTrustRealm() { java.lang.Object ref = crossRealmTrustRealm_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustRealm_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for crossRealmTrustRealm. */ public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() { java.lang.Object ref = crossRealmTrustRealm_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustRealm_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The crossRealmTrustRealm to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustRealm(java.lang.String value) { if (value == null) { throw new NullPointerException(); } crossRealmTrustRealm_ = value; onChanged(); return this; } /** * * *
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearCrossRealmTrustRealm() { crossRealmTrustRealm_ = getDefaultInstance().getCrossRealmTrustRealm(); onChanged(); return this; } /** * * *
     * Optional. The remote realm the Dataproc on-cluster KDC will trust, should
     * the user enable cross realm trust.
     * 
* * string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for crossRealmTrustRealm to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); crossRealmTrustRealm_ = value; onChanged(); return this; } private java.lang.Object crossRealmTrustKdc_ = ""; /** * * *
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @return The crossRealmTrustKdc. */ public java.lang.String getCrossRealmTrustKdc() { java.lang.Object ref = crossRealmTrustKdc_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustKdc_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for crossRealmTrustKdc. */ public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() { java.lang.Object ref = crossRealmTrustKdc_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustKdc_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The crossRealmTrustKdc to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustKdc(java.lang.String value) { if (value == null) { throw new NullPointerException(); } crossRealmTrustKdc_ = value; onChanged(); return this; } /** * * *
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearCrossRealmTrustKdc() { crossRealmTrustKdc_ = getDefaultInstance().getCrossRealmTrustKdc(); onChanged(); return this; } /** * * *
     * Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
     * realm trust relationship.
     * 
* * string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for crossRealmTrustKdc to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); crossRealmTrustKdc_ = value; onChanged(); return this; } private java.lang.Object crossRealmTrustAdminServer_ = ""; /** * * *
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The crossRealmTrustAdminServer. */ public java.lang.String getCrossRealmTrustAdminServer() { java.lang.Object ref = crossRealmTrustAdminServer_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustAdminServer_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The bytes for crossRealmTrustAdminServer. */ public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() { java.lang.Object ref = crossRealmTrustAdminServer_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustAdminServer_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @param value The crossRealmTrustAdminServer to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustAdminServer(java.lang.String value) { if (value == null) { throw new NullPointerException(); } crossRealmTrustAdminServer_ = value; onChanged(); return this; } /** * * *
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @return This builder for chaining. */ public Builder clearCrossRealmTrustAdminServer() { crossRealmTrustAdminServer_ = getDefaultInstance().getCrossRealmTrustAdminServer(); onChanged(); return this; } /** * * *
     * Optional. The admin server (IP or hostname) for the remote trusted realm in
     * a cross realm trust relationship.
     * 
* * string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL]; * * * @param value The bytes for crossRealmTrustAdminServer to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); crossRealmTrustAdminServer_ = value; onChanged(); return this; } private java.lang.Object crossRealmTrustSharedPasswordUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The crossRealmTrustSharedPasswordUri. */ public java.lang.String getCrossRealmTrustSharedPasswordUri() { java.lang.Object ref = crossRealmTrustSharedPasswordUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); crossRealmTrustSharedPasswordUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @return The bytes for crossRealmTrustSharedPasswordUri. */ public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() { java.lang.Object ref = crossRealmTrustSharedPasswordUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); crossRealmTrustSharedPasswordUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @param value The crossRealmTrustSharedPasswordUri to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustSharedPasswordUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } crossRealmTrustSharedPasswordUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @return This builder for chaining. */ public Builder clearCrossRealmTrustSharedPasswordUri() { crossRealmTrustSharedPasswordUri_ = getDefaultInstance().getCrossRealmTrustSharedPasswordUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * shared password between the on-cluster Kerberos realm and the remote
     * trusted realm, in a cross realm trust relationship.
     * 
* * * string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL]; * * * @param value The bytes for crossRealmTrustSharedPasswordUri to set. * @return This builder for chaining. */ public Builder setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); crossRealmTrustSharedPasswordUri_ = value; onChanged(); return this; } private java.lang.Object kdcDbKeyUri_ = ""; /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @return The kdcDbKeyUri. */ public java.lang.String getKdcDbKeyUri() { java.lang.Object ref = kdcDbKeyUri_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); kdcDbKeyUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for kdcDbKeyUri. */ public com.google.protobuf.ByteString getKdcDbKeyUriBytes() { java.lang.Object ref = kdcDbKeyUri_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); kdcDbKeyUri_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The kdcDbKeyUri to set. * @return This builder for chaining. */ public Builder setKdcDbKeyUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } kdcDbKeyUri_ = value; onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearKdcDbKeyUri() { kdcDbKeyUri_ = getDefaultInstance().getKdcDbKeyUri(); onChanged(); return this; } /** * * *
     * Optional. The Cloud Storage URI of a KMS encrypted file containing the
     * master key of the KDC database.
     * 
* * string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for kdcDbKeyUri to set. * @return This builder for chaining. */ public Builder setKdcDbKeyUriBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); kdcDbKeyUri_ = value; onChanged(); return this; } private int tgtLifetimeHours_; /** * * *
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * 
* * int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL]; * * @return The tgtLifetimeHours. */ @java.lang.Override public int getTgtLifetimeHours() { return tgtLifetimeHours_; } /** * * *
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * 
* * int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The tgtLifetimeHours to set. * @return This builder for chaining. */ public Builder setTgtLifetimeHours(int value) { tgtLifetimeHours_ = value; onChanged(); return this; } /** * * *
     * Optional. The lifetime of the ticket granting ticket, in hours.
     * If not specified, or user specifies 0, then default value 10
     * will be used.
     * 
* * int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearTgtLifetimeHours() { tgtLifetimeHours_ = 0; onChanged(); return this; } private java.lang.Object realm_ = ""; /** * * *
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @return The realm. */ public java.lang.String getRealm() { java.lang.Object ref = realm_; if (!(ref instanceof java.lang.String)) { com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); realm_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @return The bytes for realm. */ public com.google.protobuf.ByteString getRealmBytes() { java.lang.Object ref = realm_; if (ref instanceof String) { com.google.protobuf.ByteString b = com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); realm_ = b; return b; } else { return (com.google.protobuf.ByteString) ref; } } /** * * *
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The realm to set. * @return This builder for chaining. */ public Builder setRealm(java.lang.String value) { if (value == null) { throw new NullPointerException(); } realm_ = value; onChanged(); return this; } /** * * *
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @return This builder for chaining. */ public Builder clearRealm() { realm_ = getDefaultInstance().getRealm(); onChanged(); return this; } /** * * *
     * Optional. The name of the on-cluster Kerberos realm.
     * If not specified, the uppercased domain of hostnames will be the realm.
     * 
* * string realm = 15 [(.google.api.field_behavior) = OPTIONAL]; * * @param value The bytes for realm to set. * @return This builder for chaining. */ public Builder setRealmBytes(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); realm_ = value; onChanged(); return this; } @java.lang.Override public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:google.cloud.dataproc.v1.KerberosConfig) } // @@protoc_insertion_point(class_scope:google.cloud.dataproc.v1.KerberosConfig) private static final com.google.cloud.dataproc.v1.KerberosConfig DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new com.google.cloud.dataproc.v1.KerberosConfig(); } public static com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstance() { return DEFAULT_INSTANCE; } private static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public KerberosConfig parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return new KerberosConfig(input, extensionRegistry); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() { return DEFAULT_INSTANCE; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy