
com.google.cloud.dataproc.v1.KerberosConfig Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of proto-google-cloud-dataproc-v1 Show documentation
Show all versions of proto-google-cloud-dataproc-v1 Show documentation
PROTO library for proto-google-cloud-dataproc-v1
/*
* Copyright 2024 Google LLC
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
// Generated by the protocol buffer compiler. DO NOT EDIT!
// source: google/cloud/dataproc/v1/clusters.proto
// Protobuf Java Version: 3.25.5
package com.google.cloud.dataproc.v1;
/**
*
*
*
* Specifies Kerberos related configuration.
*
*
* Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
*/
public final class KerberosConfig extends com.google.protobuf.GeneratedMessageV3
implements
// @@protoc_insertion_point(message_implements:google.cloud.dataproc.v1.KerberosConfig)
KerberosConfigOrBuilder {
private static final long serialVersionUID = 0L;
// Use KerberosConfig.newBuilder() to construct.
private KerberosConfig(com.google.protobuf.GeneratedMessageV3.Builder> builder) {
super(builder);
}
private KerberosConfig() {
rootPrincipalPasswordUri_ = "";
kmsKeyUri_ = "";
keystoreUri_ = "";
truststoreUri_ = "";
keystorePasswordUri_ = "";
keyPasswordUri_ = "";
truststorePasswordUri_ = "";
crossRealmTrustRealm_ = "";
crossRealmTrustKdc_ = "";
crossRealmTrustAdminServer_ = "";
crossRealmTrustSharedPasswordUri_ = "";
kdcDbKeyUri_ = "";
realm_ = "";
}
@java.lang.Override
@SuppressWarnings({"unused"})
protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
return new KerberosConfig();
}
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
return com.google.cloud.dataproc.v1.ClustersProto
.internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return com.google.cloud.dataproc.v1.ClustersProto
.internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
.ensureFieldAccessorsInitialized(
com.google.cloud.dataproc.v1.KerberosConfig.class,
com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
}
public static final int ENABLE_KERBEROS_FIELD_NUMBER = 1;
private boolean enableKerberos_ = false;
/**
*
*
*
* Optional. Flag to indicate whether to Kerberize the cluster (default:
* false). Set this field to true to enable Kerberos on a cluster.
*
*
* bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The enableKerberos.
*/
@java.lang.Override
public boolean getEnableKerberos() {
return enableKerberos_;
}
public static final int ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER = 2;
@SuppressWarnings("serial")
private volatile java.lang.Object rootPrincipalPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The rootPrincipalPasswordUri.
*/
@java.lang.Override
public java.lang.String getRootPrincipalPasswordUri() {
java.lang.Object ref = rootPrincipalPasswordUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
rootPrincipalPasswordUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for rootPrincipalPasswordUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
java.lang.Object ref = rootPrincipalPasswordUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
rootPrincipalPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int KMS_KEY_URI_FIELD_NUMBER = 3;
@SuppressWarnings("serial")
private volatile java.lang.Object kmsKeyUri_ = "";
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The kmsKeyUri.
*/
@java.lang.Override
public java.lang.String getKmsKeyUri() {
java.lang.Object ref = kmsKeyUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
kmsKeyUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for kmsKeyUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getKmsKeyUriBytes() {
java.lang.Object ref = kmsKeyUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
kmsKeyUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int KEYSTORE_URI_FIELD_NUMBER = 4;
@SuppressWarnings("serial")
private volatile java.lang.Object keystoreUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keystoreUri.
*/
@java.lang.Override
public java.lang.String getKeystoreUri() {
java.lang.Object ref = keystoreUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keystoreUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keystoreUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getKeystoreUriBytes() {
java.lang.Object ref = keystoreUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keystoreUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int TRUSTSTORE_URI_FIELD_NUMBER = 5;
@SuppressWarnings("serial")
private volatile java.lang.Object truststoreUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The truststoreUri.
*/
@java.lang.Override
public java.lang.String getTruststoreUri() {
java.lang.Object ref = truststoreUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
truststoreUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for truststoreUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getTruststoreUriBytes() {
java.lang.Object ref = truststoreUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
truststoreUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int KEYSTORE_PASSWORD_URI_FIELD_NUMBER = 6;
@SuppressWarnings("serial")
private volatile java.lang.Object keystorePasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keystorePasswordUri.
*/
@java.lang.Override
public java.lang.String getKeystorePasswordUri() {
java.lang.Object ref = keystorePasswordUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keystorePasswordUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keystorePasswordUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
java.lang.Object ref = keystorePasswordUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keystorePasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int KEY_PASSWORD_URI_FIELD_NUMBER = 7;
@SuppressWarnings("serial")
private volatile java.lang.Object keyPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keyPasswordUri.
*/
@java.lang.Override
public java.lang.String getKeyPasswordUri() {
java.lang.Object ref = keyPasswordUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keyPasswordUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keyPasswordUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
java.lang.Object ref = keyPasswordUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keyPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER = 8;
@SuppressWarnings("serial")
private volatile java.lang.Object truststorePasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The truststorePasswordUri.
*/
@java.lang.Override
public java.lang.String getTruststorePasswordUri() {
java.lang.Object ref = truststorePasswordUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
truststorePasswordUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for truststorePasswordUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
java.lang.Object ref = truststorePasswordUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
truststorePasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int CROSS_REALM_TRUST_REALM_FIELD_NUMBER = 9;
@SuppressWarnings("serial")
private volatile java.lang.Object crossRealmTrustRealm_ = "";
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The crossRealmTrustRealm.
*/
@java.lang.Override
public java.lang.String getCrossRealmTrustRealm() {
java.lang.Object ref = crossRealmTrustRealm_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustRealm_ = s;
return s;
}
}
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for crossRealmTrustRealm.
*/
@java.lang.Override
public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
java.lang.Object ref = crossRealmTrustRealm_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustRealm_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int CROSS_REALM_TRUST_KDC_FIELD_NUMBER = 10;
@SuppressWarnings("serial")
private volatile java.lang.Object crossRealmTrustKdc_ = "";
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The crossRealmTrustKdc.
*/
@java.lang.Override
public java.lang.String getCrossRealmTrustKdc() {
java.lang.Object ref = crossRealmTrustKdc_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustKdc_ = s;
return s;
}
}
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for crossRealmTrustKdc.
*/
@java.lang.Override
public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
java.lang.Object ref = crossRealmTrustKdc_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustKdc_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER = 11;
@SuppressWarnings("serial")
private volatile java.lang.Object crossRealmTrustAdminServer_ = "";
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The crossRealmTrustAdminServer.
*/
@java.lang.Override
public java.lang.String getCrossRealmTrustAdminServer() {
java.lang.Object ref = crossRealmTrustAdminServer_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustAdminServer_ = s;
return s;
}
}
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The bytes for crossRealmTrustAdminServer.
*/
@java.lang.Override
public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
java.lang.Object ref = crossRealmTrustAdminServer_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustAdminServer_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER = 12;
@SuppressWarnings("serial")
private volatile java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The crossRealmTrustSharedPasswordUri.
*/
@java.lang.Override
public java.lang.String getCrossRealmTrustSharedPasswordUri() {
java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustSharedPasswordUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The bytes for crossRealmTrustSharedPasswordUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustSharedPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int KDC_DB_KEY_URI_FIELD_NUMBER = 13;
@SuppressWarnings("serial")
private volatile java.lang.Object kdcDbKeyUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The kdcDbKeyUri.
*/
@java.lang.Override
public java.lang.String getKdcDbKeyUri() {
java.lang.Object ref = kdcDbKeyUri_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
kdcDbKeyUri_ = s;
return s;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for kdcDbKeyUri.
*/
@java.lang.Override
public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
java.lang.Object ref = kdcDbKeyUri_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
kdcDbKeyUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
public static final int TGT_LIFETIME_HOURS_FIELD_NUMBER = 14;
private int tgtLifetimeHours_ = 0;
/**
*
*
*
* Optional. The lifetime of the ticket granting ticket, in hours.
* If not specified, or user specifies 0, then default value 10
* will be used.
*
*
* int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The tgtLifetimeHours.
*/
@java.lang.Override
public int getTgtLifetimeHours() {
return tgtLifetimeHours_;
}
public static final int REALM_FIELD_NUMBER = 15;
@SuppressWarnings("serial")
private volatile java.lang.Object realm_ = "";
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The realm.
*/
@java.lang.Override
public java.lang.String getRealm() {
java.lang.Object ref = realm_;
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
realm_ = s;
return s;
}
}
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for realm.
*/
@java.lang.Override
public com.google.protobuf.ByteString getRealmBytes() {
java.lang.Object ref = realm_;
if (ref instanceof java.lang.String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
realm_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
if (enableKerberos_ != false) {
output.writeBool(1, enableKerberos_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 2, rootPrincipalPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 3, kmsKeyUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 4, keystoreUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 5, truststoreUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 6, keystorePasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 7, keyPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 8, truststorePasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 9, crossRealmTrustRealm_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 10, crossRealmTrustKdc_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 11, crossRealmTrustAdminServer_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(
output, 12, crossRealmTrustSharedPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 13, kdcDbKeyUri_);
}
if (tgtLifetimeHours_ != 0) {
output.writeInt32(14, tgtLifetimeHours_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 15, realm_);
}
getUnknownFields().writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
if (enableKerberos_ != false) {
size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, enableKerberos_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(rootPrincipalPasswordUri_)) {
size +=
com.google.protobuf.GeneratedMessageV3.computeStringSize(2, rootPrincipalPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kmsKeyUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, kmsKeyUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystoreUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(4, keystoreUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststoreUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(5, truststoreUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keystorePasswordUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(6, keystorePasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(keyPasswordUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(7, keyPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(truststorePasswordUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(8, truststorePasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustRealm_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(9, crossRealmTrustRealm_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustKdc_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(10, crossRealmTrustKdc_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustAdminServer_)) {
size +=
com.google.protobuf.GeneratedMessageV3.computeStringSize(11, crossRealmTrustAdminServer_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(crossRealmTrustSharedPasswordUri_)) {
size +=
com.google.protobuf.GeneratedMessageV3.computeStringSize(
12, crossRealmTrustSharedPasswordUri_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(kdcDbKeyUri_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(13, kdcDbKeyUri_);
}
if (tgtLifetimeHours_ != 0) {
size += com.google.protobuf.CodedOutputStream.computeInt32Size(14, tgtLifetimeHours_);
}
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(realm_)) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(15, realm_);
}
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof com.google.cloud.dataproc.v1.KerberosConfig)) {
return super.equals(obj);
}
com.google.cloud.dataproc.v1.KerberosConfig other =
(com.google.cloud.dataproc.v1.KerberosConfig) obj;
if (getEnableKerberos() != other.getEnableKerberos()) return false;
if (!getRootPrincipalPasswordUri().equals(other.getRootPrincipalPasswordUri())) return false;
if (!getKmsKeyUri().equals(other.getKmsKeyUri())) return false;
if (!getKeystoreUri().equals(other.getKeystoreUri())) return false;
if (!getTruststoreUri().equals(other.getTruststoreUri())) return false;
if (!getKeystorePasswordUri().equals(other.getKeystorePasswordUri())) return false;
if (!getKeyPasswordUri().equals(other.getKeyPasswordUri())) return false;
if (!getTruststorePasswordUri().equals(other.getTruststorePasswordUri())) return false;
if (!getCrossRealmTrustRealm().equals(other.getCrossRealmTrustRealm())) return false;
if (!getCrossRealmTrustKdc().equals(other.getCrossRealmTrustKdc())) return false;
if (!getCrossRealmTrustAdminServer().equals(other.getCrossRealmTrustAdminServer()))
return false;
if (!getCrossRealmTrustSharedPasswordUri().equals(other.getCrossRealmTrustSharedPasswordUri()))
return false;
if (!getKdcDbKeyUri().equals(other.getKdcDbKeyUri())) return false;
if (getTgtLifetimeHours() != other.getTgtLifetimeHours()) return false;
if (!getRealm().equals(other.getRealm())) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
hash = (37 * hash) + ENABLE_KERBEROS_FIELD_NUMBER;
hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEnableKerberos());
hash = (37 * hash) + ROOT_PRINCIPAL_PASSWORD_URI_FIELD_NUMBER;
hash = (53 * hash) + getRootPrincipalPasswordUri().hashCode();
hash = (37 * hash) + KMS_KEY_URI_FIELD_NUMBER;
hash = (53 * hash) + getKmsKeyUri().hashCode();
hash = (37 * hash) + KEYSTORE_URI_FIELD_NUMBER;
hash = (53 * hash) + getKeystoreUri().hashCode();
hash = (37 * hash) + TRUSTSTORE_URI_FIELD_NUMBER;
hash = (53 * hash) + getTruststoreUri().hashCode();
hash = (37 * hash) + KEYSTORE_PASSWORD_URI_FIELD_NUMBER;
hash = (53 * hash) + getKeystorePasswordUri().hashCode();
hash = (37 * hash) + KEY_PASSWORD_URI_FIELD_NUMBER;
hash = (53 * hash) + getKeyPasswordUri().hashCode();
hash = (37 * hash) + TRUSTSTORE_PASSWORD_URI_FIELD_NUMBER;
hash = (53 * hash) + getTruststorePasswordUri().hashCode();
hash = (37 * hash) + CROSS_REALM_TRUST_REALM_FIELD_NUMBER;
hash = (53 * hash) + getCrossRealmTrustRealm().hashCode();
hash = (37 * hash) + CROSS_REALM_TRUST_KDC_FIELD_NUMBER;
hash = (53 * hash) + getCrossRealmTrustKdc().hashCode();
hash = (37 * hash) + CROSS_REALM_TRUST_ADMIN_SERVER_FIELD_NUMBER;
hash = (53 * hash) + getCrossRealmTrustAdminServer().hashCode();
hash = (37 * hash) + CROSS_REALM_TRUST_SHARED_PASSWORD_URI_FIELD_NUMBER;
hash = (53 * hash) + getCrossRealmTrustSharedPasswordUri().hashCode();
hash = (37 * hash) + KDC_DB_KEY_URI_FIELD_NUMBER;
hash = (53 * hash) + getKdcDbKeyUri().hashCode();
hash = (37 * hash) + TGT_LIFETIME_HOURS_FIELD_NUMBER;
hash = (53 * hash) + getTgtLifetimeHours();
hash = (37 * hash) + REALM_FIELD_NUMBER;
hash = (53 * hash) + getRealm().hashCode();
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
PARSER, input, extensionRegistry);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
java.io.InputStream input) throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseDelimitedFrom(
java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
PARSER, input, extensionRegistry);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
com.google.protobuf.CodedInputStream input) throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
}
public static com.google.cloud.dataproc.v1.KerberosConfig parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() {
return newBuilder();
}
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(com.google.cloud.dataproc.v1.KerberosConfig prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
*
*
*
* Specifies Kerberos related configuration.
*
*
* Protobuf type {@code google.cloud.dataproc.v1.KerberosConfig}
*/
public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder
implements
// @@protoc_insertion_point(builder_implements:google.cloud.dataproc.v1.KerberosConfig)
com.google.cloud.dataproc.v1.KerberosConfigOrBuilder {
public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
return com.google.cloud.dataproc.v1.ClustersProto
.internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
return com.google.cloud.dataproc.v1.ClustersProto
.internal_static_google_cloud_dataproc_v1_KerberosConfig_fieldAccessorTable
.ensureFieldAccessorsInitialized(
com.google.cloud.dataproc.v1.KerberosConfig.class,
com.google.cloud.dataproc.v1.KerberosConfig.Builder.class);
}
// Construct using com.google.cloud.dataproc.v1.KerberosConfig.newBuilder()
private Builder() {}
private Builder(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
super(parent);
}
@java.lang.Override
public Builder clear() {
super.clear();
bitField0_ = 0;
enableKerberos_ = false;
rootPrincipalPasswordUri_ = "";
kmsKeyUri_ = "";
keystoreUri_ = "";
truststoreUri_ = "";
keystorePasswordUri_ = "";
keyPasswordUri_ = "";
truststorePasswordUri_ = "";
crossRealmTrustRealm_ = "";
crossRealmTrustKdc_ = "";
crossRealmTrustAdminServer_ = "";
crossRealmTrustSharedPasswordUri_ = "";
kdcDbKeyUri_ = "";
tgtLifetimeHours_ = 0;
realm_ = "";
return this;
}
@java.lang.Override
public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() {
return com.google.cloud.dataproc.v1.ClustersProto
.internal_static_google_cloud_dataproc_v1_KerberosConfig_descriptor;
}
@java.lang.Override
public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
return com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance();
}
@java.lang.Override
public com.google.cloud.dataproc.v1.KerberosConfig build() {
com.google.cloud.dataproc.v1.KerberosConfig result = buildPartial();
if (!result.isInitialized()) {
throw newUninitializedMessageException(result);
}
return result;
}
@java.lang.Override
public com.google.cloud.dataproc.v1.KerberosConfig buildPartial() {
com.google.cloud.dataproc.v1.KerberosConfig result =
new com.google.cloud.dataproc.v1.KerberosConfig(this);
if (bitField0_ != 0) {
buildPartial0(result);
}
onBuilt();
return result;
}
private void buildPartial0(com.google.cloud.dataproc.v1.KerberosConfig result) {
int from_bitField0_ = bitField0_;
if (((from_bitField0_ & 0x00000001) != 0)) {
result.enableKerberos_ = enableKerberos_;
}
if (((from_bitField0_ & 0x00000002) != 0)) {
result.rootPrincipalPasswordUri_ = rootPrincipalPasswordUri_;
}
if (((from_bitField0_ & 0x00000004) != 0)) {
result.kmsKeyUri_ = kmsKeyUri_;
}
if (((from_bitField0_ & 0x00000008) != 0)) {
result.keystoreUri_ = keystoreUri_;
}
if (((from_bitField0_ & 0x00000010) != 0)) {
result.truststoreUri_ = truststoreUri_;
}
if (((from_bitField0_ & 0x00000020) != 0)) {
result.keystorePasswordUri_ = keystorePasswordUri_;
}
if (((from_bitField0_ & 0x00000040) != 0)) {
result.keyPasswordUri_ = keyPasswordUri_;
}
if (((from_bitField0_ & 0x00000080) != 0)) {
result.truststorePasswordUri_ = truststorePasswordUri_;
}
if (((from_bitField0_ & 0x00000100) != 0)) {
result.crossRealmTrustRealm_ = crossRealmTrustRealm_;
}
if (((from_bitField0_ & 0x00000200) != 0)) {
result.crossRealmTrustKdc_ = crossRealmTrustKdc_;
}
if (((from_bitField0_ & 0x00000400) != 0)) {
result.crossRealmTrustAdminServer_ = crossRealmTrustAdminServer_;
}
if (((from_bitField0_ & 0x00000800) != 0)) {
result.crossRealmTrustSharedPasswordUri_ = crossRealmTrustSharedPasswordUri_;
}
if (((from_bitField0_ & 0x00001000) != 0)) {
result.kdcDbKeyUri_ = kdcDbKeyUri_;
}
if (((from_bitField0_ & 0x00002000) != 0)) {
result.tgtLifetimeHours_ = tgtLifetimeHours_;
}
if (((from_bitField0_ & 0x00004000) != 0)) {
result.realm_ = realm_;
}
}
@java.lang.Override
public Builder clone() {
return super.clone();
}
@java.lang.Override
public Builder setField(
com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
return super.setField(field, value);
}
@java.lang.Override
public Builder clearField(com.google.protobuf.Descriptors.FieldDescriptor field) {
return super.clearField(field);
}
@java.lang.Override
public Builder clearOneof(com.google.protobuf.Descriptors.OneofDescriptor oneof) {
return super.clearOneof(oneof);
}
@java.lang.Override
public Builder setRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) {
return super.setRepeatedField(field, index, value);
}
@java.lang.Override
public Builder addRepeatedField(
com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) {
return super.addRepeatedField(field, value);
}
@java.lang.Override
public Builder mergeFrom(com.google.protobuf.Message other) {
if (other instanceof com.google.cloud.dataproc.v1.KerberosConfig) {
return mergeFrom((com.google.cloud.dataproc.v1.KerberosConfig) other);
} else {
super.mergeFrom(other);
return this;
}
}
public Builder mergeFrom(com.google.cloud.dataproc.v1.KerberosConfig other) {
if (other == com.google.cloud.dataproc.v1.KerberosConfig.getDefaultInstance()) return this;
if (other.getEnableKerberos() != false) {
setEnableKerberos(other.getEnableKerberos());
}
if (!other.getRootPrincipalPasswordUri().isEmpty()) {
rootPrincipalPasswordUri_ = other.rootPrincipalPasswordUri_;
bitField0_ |= 0x00000002;
onChanged();
}
if (!other.getKmsKeyUri().isEmpty()) {
kmsKeyUri_ = other.kmsKeyUri_;
bitField0_ |= 0x00000004;
onChanged();
}
if (!other.getKeystoreUri().isEmpty()) {
keystoreUri_ = other.keystoreUri_;
bitField0_ |= 0x00000008;
onChanged();
}
if (!other.getTruststoreUri().isEmpty()) {
truststoreUri_ = other.truststoreUri_;
bitField0_ |= 0x00000010;
onChanged();
}
if (!other.getKeystorePasswordUri().isEmpty()) {
keystorePasswordUri_ = other.keystorePasswordUri_;
bitField0_ |= 0x00000020;
onChanged();
}
if (!other.getKeyPasswordUri().isEmpty()) {
keyPasswordUri_ = other.keyPasswordUri_;
bitField0_ |= 0x00000040;
onChanged();
}
if (!other.getTruststorePasswordUri().isEmpty()) {
truststorePasswordUri_ = other.truststorePasswordUri_;
bitField0_ |= 0x00000080;
onChanged();
}
if (!other.getCrossRealmTrustRealm().isEmpty()) {
crossRealmTrustRealm_ = other.crossRealmTrustRealm_;
bitField0_ |= 0x00000100;
onChanged();
}
if (!other.getCrossRealmTrustKdc().isEmpty()) {
crossRealmTrustKdc_ = other.crossRealmTrustKdc_;
bitField0_ |= 0x00000200;
onChanged();
}
if (!other.getCrossRealmTrustAdminServer().isEmpty()) {
crossRealmTrustAdminServer_ = other.crossRealmTrustAdminServer_;
bitField0_ |= 0x00000400;
onChanged();
}
if (!other.getCrossRealmTrustSharedPasswordUri().isEmpty()) {
crossRealmTrustSharedPasswordUri_ = other.crossRealmTrustSharedPasswordUri_;
bitField0_ |= 0x00000800;
onChanged();
}
if (!other.getKdcDbKeyUri().isEmpty()) {
kdcDbKeyUri_ = other.kdcDbKeyUri_;
bitField0_ |= 0x00001000;
onChanged();
}
if (other.getTgtLifetimeHours() != 0) {
setTgtLifetimeHours(other.getTgtLifetimeHours());
}
if (!other.getRealm().isEmpty()) {
realm_ = other.realm_;
bitField0_ |= 0x00004000;
onChanged();
}
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
}
@java.lang.Override
public final boolean isInitialized() {
return true;
}
@java.lang.Override
public Builder mergeFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
if (extensionRegistry == null) {
throw new java.lang.NullPointerException();
}
try {
boolean done = false;
while (!done) {
int tag = input.readTag();
switch (tag) {
case 0:
done = true;
break;
case 8:
{
enableKerberos_ = input.readBool();
bitField0_ |= 0x00000001;
break;
} // case 8
case 18:
{
rootPrincipalPasswordUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000002;
break;
} // case 18
case 26:
{
kmsKeyUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000004;
break;
} // case 26
case 34:
{
keystoreUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000008;
break;
} // case 34
case 42:
{
truststoreUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000010;
break;
} // case 42
case 50:
{
keystorePasswordUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000020;
break;
} // case 50
case 58:
{
keyPasswordUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000040;
break;
} // case 58
case 66:
{
truststorePasswordUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000080;
break;
} // case 66
case 74:
{
crossRealmTrustRealm_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000100;
break;
} // case 74
case 82:
{
crossRealmTrustKdc_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000200;
break;
} // case 82
case 90:
{
crossRealmTrustAdminServer_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000400;
break;
} // case 90
case 98:
{
crossRealmTrustSharedPasswordUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00000800;
break;
} // case 98
case 106:
{
kdcDbKeyUri_ = input.readStringRequireUtf8();
bitField0_ |= 0x00001000;
break;
} // case 106
case 112:
{
tgtLifetimeHours_ = input.readInt32();
bitField0_ |= 0x00002000;
break;
} // case 112
case 122:
{
realm_ = input.readStringRequireUtf8();
bitField0_ |= 0x00004000;
break;
} // case 122
default:
{
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
done = true; // was an endgroup tag
}
break;
} // default:
} // switch (tag)
} // while (!done)
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.unwrapIOException();
} finally {
onChanged();
} // finally
return this;
}
private int bitField0_;
private boolean enableKerberos_;
/**
*
*
*
* Optional. Flag to indicate whether to Kerberize the cluster (default:
* false). Set this field to true to enable Kerberos on a cluster.
*
*
* bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The enableKerberos.
*/
@java.lang.Override
public boolean getEnableKerberos() {
return enableKerberos_;
}
/**
*
*
*
* Optional. Flag to indicate whether to Kerberize the cluster (default:
* false). Set this field to true to enable Kerberos on a cluster.
*
*
* bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The enableKerberos to set.
* @return This builder for chaining.
*/
public Builder setEnableKerberos(boolean value) {
enableKerberos_ = value;
bitField0_ |= 0x00000001;
onChanged();
return this;
}
/**
*
*
*
* Optional. Flag to indicate whether to Kerberize the cluster (default:
* false). Set this field to true to enable Kerberos on a cluster.
*
*
* bool enable_kerberos = 1 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearEnableKerberos() {
bitField0_ = (bitField0_ & ~0x00000001);
enableKerberos_ = false;
onChanged();
return this;
}
private java.lang.Object rootPrincipalPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The rootPrincipalPasswordUri.
*/
public java.lang.String getRootPrincipalPasswordUri() {
java.lang.Object ref = rootPrincipalPasswordUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
rootPrincipalPasswordUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The bytes for rootPrincipalPasswordUri.
*/
public com.google.protobuf.ByteString getRootPrincipalPasswordUriBytes() {
java.lang.Object ref = rootPrincipalPasswordUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
rootPrincipalPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The rootPrincipalPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setRootPrincipalPasswordUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
rootPrincipalPasswordUri_ = value;
bitField0_ |= 0x00000002;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return This builder for chaining.
*/
public Builder clearRootPrincipalPasswordUri() {
rootPrincipalPasswordUri_ = getDefaultInstance().getRootPrincipalPasswordUri();
bitField0_ = (bitField0_ & ~0x00000002);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the root
* principal password.
*
*
* string root_principal_password_uri = 2 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The bytes for rootPrincipalPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setRootPrincipalPasswordUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
rootPrincipalPasswordUri_ = value;
bitField0_ |= 0x00000002;
onChanged();
return this;
}
private java.lang.Object kmsKeyUri_ = "";
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The kmsKeyUri.
*/
public java.lang.String getKmsKeyUri() {
java.lang.Object ref = kmsKeyUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
kmsKeyUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for kmsKeyUri.
*/
public com.google.protobuf.ByteString getKmsKeyUriBytes() {
java.lang.Object ref = kmsKeyUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
kmsKeyUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The kmsKeyUri to set.
* @return This builder for chaining.
*/
public Builder setKmsKeyUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
kmsKeyUri_ = value;
bitField0_ |= 0x00000004;
onChanged();
return this;
}
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearKmsKeyUri() {
kmsKeyUri_ = getDefaultInstance().getKmsKeyUri();
bitField0_ = (bitField0_ & ~0x00000004);
onChanged();
return this;
}
/**
*
*
*
* Optional. The URI of the KMS key used to encrypt sensitive
* files.
*
*
* string kms_key_uri = 3 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for kmsKeyUri to set.
* @return This builder for chaining.
*/
public Builder setKmsKeyUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
kmsKeyUri_ = value;
bitField0_ |= 0x00000004;
onChanged();
return this;
}
private java.lang.Object keystoreUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keystoreUri.
*/
public java.lang.String getKeystoreUri() {
java.lang.Object ref = keystoreUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keystoreUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keystoreUri.
*/
public com.google.protobuf.ByteString getKeystoreUriBytes() {
java.lang.Object ref = keystoreUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keystoreUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The keystoreUri to set.
* @return This builder for chaining.
*/
public Builder setKeystoreUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
keystoreUri_ = value;
bitField0_ |= 0x00000008;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearKeystoreUri() {
keystoreUri_ = getDefaultInstance().getKeystoreUri();
bitField0_ = (bitField0_ & ~0x00000008);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of the keystore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string keystore_uri = 4 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for keystoreUri to set.
* @return This builder for chaining.
*/
public Builder setKeystoreUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
keystoreUri_ = value;
bitField0_ |= 0x00000008;
onChanged();
return this;
}
private java.lang.Object truststoreUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The truststoreUri.
*/
public java.lang.String getTruststoreUri() {
java.lang.Object ref = truststoreUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
truststoreUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for truststoreUri.
*/
public com.google.protobuf.ByteString getTruststoreUriBytes() {
java.lang.Object ref = truststoreUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
truststoreUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The truststoreUri to set.
* @return This builder for chaining.
*/
public Builder setTruststoreUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
truststoreUri_ = value;
bitField0_ |= 0x00000010;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearTruststoreUri() {
truststoreUri_ = getDefaultInstance().getTruststoreUri();
bitField0_ = (bitField0_ & ~0x00000010);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of the truststore file used for SSL
* encryption. If not provided, Dataproc will provide a self-signed
* certificate.
*
*
* string truststore_uri = 5 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for truststoreUri to set.
* @return This builder for chaining.
*/
public Builder setTruststoreUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
truststoreUri_ = value;
bitField0_ |= 0x00000010;
onChanged();
return this;
}
private java.lang.Object keystorePasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keystorePasswordUri.
*/
public java.lang.String getKeystorePasswordUri() {
java.lang.Object ref = keystorePasswordUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keystorePasswordUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keystorePasswordUri.
*/
public com.google.protobuf.ByteString getKeystorePasswordUriBytes() {
java.lang.Object ref = keystorePasswordUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keystorePasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The keystorePasswordUri to set.
* @return This builder for chaining.
*/
public Builder setKeystorePasswordUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
keystorePasswordUri_ = value;
bitField0_ |= 0x00000020;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearKeystorePasswordUri() {
keystorePasswordUri_ = getDefaultInstance().getKeystorePasswordUri();
bitField0_ = (bitField0_ & ~0x00000020);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided keystore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string keystore_password_uri = 6 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for keystorePasswordUri to set.
* @return This builder for chaining.
*/
public Builder setKeystorePasswordUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
keystorePasswordUri_ = value;
bitField0_ |= 0x00000020;
onChanged();
return this;
}
private java.lang.Object keyPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The keyPasswordUri.
*/
public java.lang.String getKeyPasswordUri() {
java.lang.Object ref = keyPasswordUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
keyPasswordUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for keyPasswordUri.
*/
public com.google.protobuf.ByteString getKeyPasswordUriBytes() {
java.lang.Object ref = keyPasswordUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
keyPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The keyPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setKeyPasswordUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
keyPasswordUri_ = value;
bitField0_ |= 0x00000040;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearKeyPasswordUri() {
keyPasswordUri_ = getDefaultInstance().getKeyPasswordUri();
bitField0_ = (bitField0_ & ~0x00000040);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided key. For the self-signed certificate, this
* password is generated by Dataproc.
*
*
* string key_password_uri = 7 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for keyPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setKeyPasswordUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
keyPasswordUri_ = value;
bitField0_ |= 0x00000040;
onChanged();
return this;
}
private java.lang.Object truststorePasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The truststorePasswordUri.
*/
public java.lang.String getTruststorePasswordUri() {
java.lang.Object ref = truststorePasswordUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
truststorePasswordUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for truststorePasswordUri.
*/
public com.google.protobuf.ByteString getTruststorePasswordUriBytes() {
java.lang.Object ref = truststorePasswordUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
truststorePasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The truststorePasswordUri to set.
* @return This builder for chaining.
*/
public Builder setTruststorePasswordUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
truststorePasswordUri_ = value;
bitField0_ |= 0x00000080;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearTruststorePasswordUri() {
truststorePasswordUri_ = getDefaultInstance().getTruststorePasswordUri();
bitField0_ = (bitField0_ & ~0x00000080);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* password to the user provided truststore. For the self-signed certificate,
* this password is generated by Dataproc.
*
*
* string truststore_password_uri = 8 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for truststorePasswordUri to set.
* @return This builder for chaining.
*/
public Builder setTruststorePasswordUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
truststorePasswordUri_ = value;
bitField0_ |= 0x00000080;
onChanged();
return this;
}
private java.lang.Object crossRealmTrustRealm_ = "";
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The crossRealmTrustRealm.
*/
public java.lang.String getCrossRealmTrustRealm() {
java.lang.Object ref = crossRealmTrustRealm_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustRealm_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for crossRealmTrustRealm.
*/
public com.google.protobuf.ByteString getCrossRealmTrustRealmBytes() {
java.lang.Object ref = crossRealmTrustRealm_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustRealm_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The crossRealmTrustRealm to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustRealm(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
crossRealmTrustRealm_ = value;
bitField0_ |= 0x00000100;
onChanged();
return this;
}
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearCrossRealmTrustRealm() {
crossRealmTrustRealm_ = getDefaultInstance().getCrossRealmTrustRealm();
bitField0_ = (bitField0_ & ~0x00000100);
onChanged();
return this;
}
/**
*
*
*
* Optional. The remote realm the Dataproc on-cluster KDC will trust, should
* the user enable cross realm trust.
*
*
* string cross_realm_trust_realm = 9 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for crossRealmTrustRealm to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustRealmBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
crossRealmTrustRealm_ = value;
bitField0_ |= 0x00000100;
onChanged();
return this;
}
private java.lang.Object crossRealmTrustKdc_ = "";
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The crossRealmTrustKdc.
*/
public java.lang.String getCrossRealmTrustKdc() {
java.lang.Object ref = crossRealmTrustKdc_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustKdc_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for crossRealmTrustKdc.
*/
public com.google.protobuf.ByteString getCrossRealmTrustKdcBytes() {
java.lang.Object ref = crossRealmTrustKdc_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustKdc_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The crossRealmTrustKdc to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustKdc(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
crossRealmTrustKdc_ = value;
bitField0_ |= 0x00000200;
onChanged();
return this;
}
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearCrossRealmTrustKdc() {
crossRealmTrustKdc_ = getDefaultInstance().getCrossRealmTrustKdc();
bitField0_ = (bitField0_ & ~0x00000200);
onChanged();
return this;
}
/**
*
*
*
* Optional. The KDC (IP or hostname) for the remote trusted realm in a cross
* realm trust relationship.
*
*
* string cross_realm_trust_kdc = 10 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for crossRealmTrustKdc to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustKdcBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
crossRealmTrustKdc_ = value;
bitField0_ |= 0x00000200;
onChanged();
return this;
}
private java.lang.Object crossRealmTrustAdminServer_ = "";
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The crossRealmTrustAdminServer.
*/
public java.lang.String getCrossRealmTrustAdminServer() {
java.lang.Object ref = crossRealmTrustAdminServer_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustAdminServer_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The bytes for crossRealmTrustAdminServer.
*/
public com.google.protobuf.ByteString getCrossRealmTrustAdminServerBytes() {
java.lang.Object ref = crossRealmTrustAdminServer_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustAdminServer_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The crossRealmTrustAdminServer to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustAdminServer(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
crossRealmTrustAdminServer_ = value;
bitField0_ |= 0x00000400;
onChanged();
return this;
}
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return This builder for chaining.
*/
public Builder clearCrossRealmTrustAdminServer() {
crossRealmTrustAdminServer_ = getDefaultInstance().getCrossRealmTrustAdminServer();
bitField0_ = (bitField0_ & ~0x00000400);
onChanged();
return this;
}
/**
*
*
*
* Optional. The admin server (IP or hostname) for the remote trusted realm in
* a cross realm trust relationship.
*
*
* string cross_realm_trust_admin_server = 11 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The bytes for crossRealmTrustAdminServer to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustAdminServerBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
crossRealmTrustAdminServer_ = value;
bitField0_ |= 0x00000400;
onChanged();
return this;
}
private java.lang.Object crossRealmTrustSharedPasswordUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The crossRealmTrustSharedPasswordUri.
*/
public java.lang.String getCrossRealmTrustSharedPasswordUri() {
java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
crossRealmTrustSharedPasswordUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return The bytes for crossRealmTrustSharedPasswordUri.
*/
public com.google.protobuf.ByteString getCrossRealmTrustSharedPasswordUriBytes() {
java.lang.Object ref = crossRealmTrustSharedPasswordUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
crossRealmTrustSharedPasswordUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The crossRealmTrustSharedPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustSharedPasswordUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
crossRealmTrustSharedPasswordUri_ = value;
bitField0_ |= 0x00000800;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @return This builder for chaining.
*/
public Builder clearCrossRealmTrustSharedPasswordUri() {
crossRealmTrustSharedPasswordUri_ =
getDefaultInstance().getCrossRealmTrustSharedPasswordUri();
bitField0_ = (bitField0_ & ~0x00000800);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* shared password between the on-cluster Kerberos realm and the remote
* trusted realm, in a cross realm trust relationship.
*
*
*
* string cross_realm_trust_shared_password_uri = 12 [(.google.api.field_behavior) = OPTIONAL];
*
*
* @param value The bytes for crossRealmTrustSharedPasswordUri to set.
* @return This builder for chaining.
*/
public Builder setCrossRealmTrustSharedPasswordUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
crossRealmTrustSharedPasswordUri_ = value;
bitField0_ |= 0x00000800;
onChanged();
return this;
}
private java.lang.Object kdcDbKeyUri_ = "";
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The kdcDbKeyUri.
*/
public java.lang.String getKdcDbKeyUri() {
java.lang.Object ref = kdcDbKeyUri_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
kdcDbKeyUri_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for kdcDbKeyUri.
*/
public com.google.protobuf.ByteString getKdcDbKeyUriBytes() {
java.lang.Object ref = kdcDbKeyUri_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
kdcDbKeyUri_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The kdcDbKeyUri to set.
* @return This builder for chaining.
*/
public Builder setKdcDbKeyUri(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
kdcDbKeyUri_ = value;
bitField0_ |= 0x00001000;
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearKdcDbKeyUri() {
kdcDbKeyUri_ = getDefaultInstance().getKdcDbKeyUri();
bitField0_ = (bitField0_ & ~0x00001000);
onChanged();
return this;
}
/**
*
*
*
* Optional. The Cloud Storage URI of a KMS encrypted file containing the
* master key of the KDC database.
*
*
* string kdc_db_key_uri = 13 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for kdcDbKeyUri to set.
* @return This builder for chaining.
*/
public Builder setKdcDbKeyUriBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
kdcDbKeyUri_ = value;
bitField0_ |= 0x00001000;
onChanged();
return this;
}
private int tgtLifetimeHours_;
/**
*
*
*
* Optional. The lifetime of the ticket granting ticket, in hours.
* If not specified, or user specifies 0, then default value 10
* will be used.
*
*
* int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The tgtLifetimeHours.
*/
@java.lang.Override
public int getTgtLifetimeHours() {
return tgtLifetimeHours_;
}
/**
*
*
*
* Optional. The lifetime of the ticket granting ticket, in hours.
* If not specified, or user specifies 0, then default value 10
* will be used.
*
*
* int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The tgtLifetimeHours to set.
* @return This builder for chaining.
*/
public Builder setTgtLifetimeHours(int value) {
tgtLifetimeHours_ = value;
bitField0_ |= 0x00002000;
onChanged();
return this;
}
/**
*
*
*
* Optional. The lifetime of the ticket granting ticket, in hours.
* If not specified, or user specifies 0, then default value 10
* will be used.
*
*
* int32 tgt_lifetime_hours = 14 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearTgtLifetimeHours() {
bitField0_ = (bitField0_ & ~0x00002000);
tgtLifetimeHours_ = 0;
onChanged();
return this;
}
private java.lang.Object realm_ = "";
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The realm.
*/
public java.lang.String getRealm() {
java.lang.Object ref = realm_;
if (!(ref instanceof java.lang.String)) {
com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
realm_ = s;
return s;
} else {
return (java.lang.String) ref;
}
}
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @return The bytes for realm.
*/
public com.google.protobuf.ByteString getRealmBytes() {
java.lang.Object ref = realm_;
if (ref instanceof String) {
com.google.protobuf.ByteString b =
com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
realm_ = b;
return b;
} else {
return (com.google.protobuf.ByteString) ref;
}
}
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The realm to set.
* @return This builder for chaining.
*/
public Builder setRealm(java.lang.String value) {
if (value == null) {
throw new NullPointerException();
}
realm_ = value;
bitField0_ |= 0x00004000;
onChanged();
return this;
}
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @return This builder for chaining.
*/
public Builder clearRealm() {
realm_ = getDefaultInstance().getRealm();
bitField0_ = (bitField0_ & ~0x00004000);
onChanged();
return this;
}
/**
*
*
*
* Optional. The name of the on-cluster Kerberos realm.
* If not specified, the uppercased domain of hostnames will be the realm.
*
*
* string realm = 15 [(.google.api.field_behavior) = OPTIONAL];
*
* @param value The bytes for realm to set.
* @return This builder for chaining.
*/
public Builder setRealmBytes(com.google.protobuf.ByteString value) {
if (value == null) {
throw new NullPointerException();
}
checkByteStringIsUtf8(value);
realm_ = value;
bitField0_ |= 0x00004000;
onChanged();
return this;
}
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
}
@java.lang.Override
public final Builder mergeUnknownFields(
final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.mergeUnknownFields(unknownFields);
}
// @@protoc_insertion_point(builder_scope:google.cloud.dataproc.v1.KerberosConfig)
}
// @@protoc_insertion_point(class_scope:google.cloud.dataproc.v1.KerberosConfig)
private static final com.google.cloud.dataproc.v1.KerberosConfig DEFAULT_INSTANCE;
static {
DEFAULT_INSTANCE = new com.google.cloud.dataproc.v1.KerberosConfig();
}
public static com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static final com.google.protobuf.Parser PARSER =
new com.google.protobuf.AbstractParser() {
@java.lang.Override
public KerberosConfig parsePartialFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
Builder builder = newBuilder();
try {
builder.mergeFrom(input, extensionRegistry);
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.setUnfinishedMessage(builder.buildPartial());
} catch (com.google.protobuf.UninitializedMessageException e) {
throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
} catch (java.io.IOException e) {
throw new com.google.protobuf.InvalidProtocolBufferException(e)
.setUnfinishedMessage(builder.buildPartial());
}
return builder.buildPartial();
}
};
public static com.google.protobuf.Parser parser() {
return PARSER;
}
@java.lang.Override
public com.google.protobuf.Parser getParserForType() {
return PARSER;
}
@java.lang.Override
public com.google.cloud.dataproc.v1.KerberosConfig getDefaultInstanceForType() {
return DEFAULT_INSTANCE;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy