All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.rocketmq.shaded.com.google.api.AuthProvider Maven / Gradle / Ivy

There is a newer version: 5.0.7
Show newest version
/*
 * Copyright 2020 Google LLC
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     https://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
// Generated by the protocol buffer compiler.  DO NOT EDIT!
// source: google/api/auth.proto

package org.apache.rocketmq.shaded.com.google.api;

/**
 *
 *
 * 
 * Configuration for an authentication provider, including support for
 * [JSON Web Token
 * (JWT)](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32).
 * 
* * Protobuf type {@code google.api.AuthProvider} */ public final class AuthProvider extends org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3 implements // @@protoc_insertion_point(message_implements:google.api.AuthProvider) AuthProviderOrBuilder { private static final long serialVersionUID = 0L; // Use AuthProvider.newBuilder() to construct. private AuthProvider(org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.Builder builder) { super(builder); } private AuthProvider() { id_ = ""; issuer_ = ""; jwksUri_ = ""; audiences_ = ""; authorizationUrl_ = ""; jwtLocations_ = java.util.Collections.emptyList(); } @java.lang.Override @SuppressWarnings({"unused"}) protected java.lang.Object newInstance(UnusedPrivateParameter unused) { return new AuthProvider(); } @java.lang.Override public final org.apache.rocketmq.shaded.com.google.protobuf.UnknownFieldSet getUnknownFields() { return this.unknownFields; } private AuthProvider( org.apache.rocketmq.shaded.com.google.protobuf.CodedInputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { this(); if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } int mutable_bitField0_ = 0; org.apache.rocketmq.shaded.com.google.protobuf.UnknownFieldSet.Builder unknownFields = org.apache.rocketmq.shaded.com.google.protobuf.UnknownFieldSet.newBuilder(); try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { java.lang.String s = input.readStringRequireUtf8(); id_ = s; break; } case 18: { java.lang.String s = input.readStringRequireUtf8(); issuer_ = s; break; } case 26: { java.lang.String s = input.readStringRequireUtf8(); jwksUri_ = s; break; } case 34: { java.lang.String s = input.readStringRequireUtf8(); audiences_ = s; break; } case 42: { java.lang.String s = input.readStringRequireUtf8(); authorizationUrl_ = s; break; } case 50: { if (!((mutable_bitField0_ & 0x00000001) != 0)) { jwtLocations_ = new java.util.ArrayList(); mutable_bitField0_ |= 0x00000001; } jwtLocations_.add( input.readMessage(org.apache.rocketmq.shaded.com.google.api.JwtLocation.parser(), extensionRegistry)); break; } default: { if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { done = true; } break; } } } } catch (org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(this); } catch (org.apache.rocketmq.shaded.com.google.protobuf.UninitializedMessageException e) { throw e.asInvalidProtocolBufferException().setUnfinishedMessage(this); } catch (java.io.IOException e) { throw new org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); } finally { if (((mutable_bitField0_ & 0x00000001) != 0)) { jwtLocations_ = java.util.Collections.unmodifiableList(jwtLocations_); } this.unknownFields = unknownFields.build(); makeExtensionsImmutable(); } } public static final org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.Descriptor getDescriptor() { return org.apache.rocketmq.shaded.com.google.api.AuthProto.internal_static_google_api_AuthProvider_descriptor; } @java.lang.Override protected org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return org.apache.rocketmq.shaded.com.google.api.AuthProto.internal_static_google_api_AuthProvider_fieldAccessorTable .ensureFieldAccessorsInitialized( org.apache.rocketmq.shaded.com.google.api.AuthProvider.class, org.apache.rocketmq.shaded.com.google.api.AuthProvider.Builder.class); } public static final int ID_FIELD_NUMBER = 1; private volatile java.lang.Object id_; /** * * *
   * The unique identifier of the auth provider. It will be referred to by
   * `AuthRequirement.provider_id`.
   * Example: "bookstore_auth".
   * 
* * string id = 1; * * @return The id. */ @java.lang.Override public java.lang.String getId() { java.lang.Object ref = id_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); id_ = s; return s; } } /** * * *
   * The unique identifier of the auth provider. It will be referred to by
   * `AuthRequirement.provider_id`.
   * Example: "bookstore_auth".
   * 
* * string id = 1; * * @return The bytes for id. */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getIdBytes() { java.lang.Object ref = id_; if (ref instanceof java.lang.String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); id_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } public static final int ISSUER_FIELD_NUMBER = 2; private volatile java.lang.Object issuer_; /** * * *
   * Identifies the principal that issued the JWT. See
   * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
   * Usually a URL or an email address.
   * Example: https://securetoken.google.com
   * Example: 1234567-compute@developer.gserviceaccount.com
   * 
* * string issuer = 2; * * @return The issuer. */ @java.lang.Override public java.lang.String getIssuer() { java.lang.Object ref = issuer_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); issuer_ = s; return s; } } /** * * *
   * Identifies the principal that issued the JWT. See
   * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
   * Usually a URL or an email address.
   * Example: https://securetoken.google.com
   * Example: 1234567-compute@developer.gserviceaccount.com
   * 
* * string issuer = 2; * * @return The bytes for issuer. */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getIssuerBytes() { java.lang.Object ref = issuer_; if (ref instanceof java.lang.String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); issuer_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } public static final int JWKS_URI_FIELD_NUMBER = 3; private volatile java.lang.Object jwksUri_; /** * * *
   * URL of the provider's public key set to validate signature of the JWT. See
   * [OpenID
   * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
   * Optional if the key set document:
   *  - can be retrieved from
   *    [OpenID
   *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
   *    of the issuer.
   *  - can be inferred from the email domain of the issuer (e.g. a Google
   *  service account).
   * Example: https://www.googleapis.com/oauth2/v1/certs
   * 
* * string jwks_uri = 3; * * @return The jwksUri. */ @java.lang.Override public java.lang.String getJwksUri() { java.lang.Object ref = jwksUri_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); jwksUri_ = s; return s; } } /** * * *
   * URL of the provider's public key set to validate signature of the JWT. See
   * [OpenID
   * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
   * Optional if the key set document:
   *  - can be retrieved from
   *    [OpenID
   *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
   *    of the issuer.
   *  - can be inferred from the email domain of the issuer (e.g. a Google
   *  service account).
   * Example: https://www.googleapis.com/oauth2/v1/certs
   * 
* * string jwks_uri = 3; * * @return The bytes for jwksUri. */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getJwksUriBytes() { java.lang.Object ref = jwksUri_; if (ref instanceof java.lang.String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); jwksUri_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } public static final int AUDIENCES_FIELD_NUMBER = 4; private volatile java.lang.Object audiences_; /** * * *
   * The list of JWT
   * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
   * that are allowed to access. A JWT containing any of these audiences will
   * be accepted. When this setting is absent, JWTs with audiences:
   *   - "https://[service.name]/[google.protobuf.Api.name]"
   *   - "https://[service.name]/"
   * will be accepted.
   * For example, if no audiences are in the setting, LibraryService API will
   * accept JWTs with the following audiences:
   *   -
   *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
   *   - https://library-example.googleapis.com/
   * Example:
   *     audiences: bookstore_android.apps.googleusercontent.com,
   *                bookstore_web.apps.googleusercontent.com
   * 
* * string audiences = 4; * * @return The audiences. */ @java.lang.Override public java.lang.String getAudiences() { java.lang.Object ref = audiences_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); audiences_ = s; return s; } } /** * * *
   * The list of JWT
   * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
   * that are allowed to access. A JWT containing any of these audiences will
   * be accepted. When this setting is absent, JWTs with audiences:
   *   - "https://[service.name]/[google.protobuf.Api.name]"
   *   - "https://[service.name]/"
   * will be accepted.
   * For example, if no audiences are in the setting, LibraryService API will
   * accept JWTs with the following audiences:
   *   -
   *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
   *   - https://library-example.googleapis.com/
   * Example:
   *     audiences: bookstore_android.apps.googleusercontent.com,
   *                bookstore_web.apps.googleusercontent.com
   * 
* * string audiences = 4; * * @return The bytes for audiences. */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getAudiencesBytes() { java.lang.Object ref = audiences_; if (ref instanceof java.lang.String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); audiences_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } public static final int AUTHORIZATION_URL_FIELD_NUMBER = 5; private volatile java.lang.Object authorizationUrl_; /** * * *
   * Redirect URL if JWT token is required but not present or is expired.
   * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
   * 
* * string authorization_url = 5; * * @return The authorizationUrl. */ @java.lang.Override public java.lang.String getAuthorizationUrl() { java.lang.Object ref = authorizationUrl_; if (ref instanceof java.lang.String) { return (java.lang.String) ref; } else { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); authorizationUrl_ = s; return s; } } /** * * *
   * Redirect URL if JWT token is required but not present or is expired.
   * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
   * 
* * string authorization_url = 5; * * @return The bytes for authorizationUrl. */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getAuthorizationUrlBytes() { java.lang.Object ref = authorizationUrl_; if (ref instanceof java.lang.String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); authorizationUrl_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } public static final int JWT_LOCATIONS_FIELD_NUMBER = 6; private java.util.List jwtLocations_; /** * * *
   * Defines the locations to extract the JWT.
   * JWT locations can be either from HTTP headers or URL query parameters.
   * The rule is that the first match wins. The checking order is: checking
   * all headers first, then URL query parameters.
   * If not specified,  default to use following 3 locations:
   *    1) Authorization: Bearer
   *    2) x-goog-iap-jwt-assertion
   *    3) access_token query parameter
   * Default locations can be specified as followings:
   *    jwt_locations:
   *    - header: Authorization
   *      value_prefix: "Bearer "
   *    - header: x-goog-iap-jwt-assertion
   *    - query: access_token
   * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ @java.lang.Override public java.util.List getJwtLocationsList() { return jwtLocations_; } /** * * *
   * Defines the locations to extract the JWT.
   * JWT locations can be either from HTTP headers or URL query parameters.
   * The rule is that the first match wins. The checking order is: checking
   * all headers first, then URL query parameters.
   * If not specified,  default to use following 3 locations:
   *    1) Authorization: Bearer
   *    2) x-goog-iap-jwt-assertion
   *    3) access_token query parameter
   * Default locations can be specified as followings:
   *    jwt_locations:
   *    - header: Authorization
   *      value_prefix: "Bearer "
   *    - header: x-goog-iap-jwt-assertion
   *    - query: access_token
   * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ @java.lang.Override public java.util.List getJwtLocationsOrBuilderList() { return jwtLocations_; } /** * * *
   * Defines the locations to extract the JWT.
   * JWT locations can be either from HTTP headers or URL query parameters.
   * The rule is that the first match wins. The checking order is: checking
   * all headers first, then URL query parameters.
   * If not specified,  default to use following 3 locations:
   *    1) Authorization: Bearer
   *    2) x-goog-iap-jwt-assertion
   *    3) access_token query parameter
   * Default locations can be specified as followings:
   *    jwt_locations:
   *    - header: Authorization
   *      value_prefix: "Bearer "
   *    - header: x-goog-iap-jwt-assertion
   *    - query: access_token
   * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ @java.lang.Override public int getJwtLocationsCount() { return jwtLocations_.size(); } /** * * *
   * Defines the locations to extract the JWT.
   * JWT locations can be either from HTTP headers or URL query parameters.
   * The rule is that the first match wins. The checking order is: checking
   * all headers first, then URL query parameters.
   * If not specified,  default to use following 3 locations:
   *    1) Authorization: Bearer
   *    2) x-goog-iap-jwt-assertion
   *    3) access_token query parameter
   * Default locations can be specified as followings:
   *    jwt_locations:
   *    - header: Authorization
   *      value_prefix: "Bearer "
   *    - header: x-goog-iap-jwt-assertion
   *    - query: access_token
   * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.JwtLocation getJwtLocations(int index) { return jwtLocations_.get(index); } /** * * *
   * Defines the locations to extract the JWT.
   * JWT locations can be either from HTTP headers or URL query parameters.
   * The rule is that the first match wins. The checking order is: checking
   * all headers first, then URL query parameters.
   * If not specified,  default to use following 3 locations:
   *    1) Authorization: Bearer
   *    2) x-goog-iap-jwt-assertion
   *    3) access_token query parameter
   * Default locations can be specified as followings:
   *    jwt_locations:
   *    - header: Authorization
   *      value_prefix: "Bearer "
   *    - header: x-goog-iap-jwt-assertion
   *    - query: access_token
   * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.JwtLocationOrBuilder getJwtLocationsOrBuilder(int index) { return jwtLocations_.get(index); } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(org.apache.rocketmq.shaded.com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(id_)) { org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.writeString(output, 1, id_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(issuer_)) { org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.writeString(output, 2, issuer_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(jwksUri_)) { org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.writeString(output, 3, jwksUri_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(audiences_)) { org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.writeString(output, 4, audiences_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(authorizationUrl_)) { org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.writeString(output, 5, authorizationUrl_); } for (int i = 0; i < jwtLocations_.size(); i++) { output.writeMessage(6, jwtLocations_.get(i)); } unknownFields.writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(id_)) { size += org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.computeStringSize(1, id_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(issuer_)) { size += org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.computeStringSize(2, issuer_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(jwksUri_)) { size += org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.computeStringSize(3, jwksUri_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(audiences_)) { size += org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.computeStringSize(4, audiences_); } if (!org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.isStringEmpty(authorizationUrl_)) { size += org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.computeStringSize(5, authorizationUrl_); } for (int i = 0; i < jwtLocations_.size(); i++) { size += org.apache.rocketmq.shaded.com.google.protobuf.CodedOutputStream.computeMessageSize(6, jwtLocations_.get(i)); } size += unknownFields.getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof org.apache.rocketmq.shaded.com.google.api.AuthProvider)) { return super.equals(obj); } org.apache.rocketmq.shaded.com.google.api.AuthProvider other = (org.apache.rocketmq.shaded.com.google.api.AuthProvider) obj; if (!getId().equals(other.getId())) return false; if (!getIssuer().equals(other.getIssuer())) return false; if (!getJwksUri().equals(other.getJwksUri())) return false; if (!getAudiences().equals(other.getAudiences())) return false; if (!getAuthorizationUrl().equals(other.getAuthorizationUrl())) return false; if (!getJwtLocationsList().equals(other.getJwtLocationsList())) return false; if (!unknownFields.equals(other.unknownFields)) return false; return true; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); hash = (37 * hash) + ID_FIELD_NUMBER; hash = (53 * hash) + getId().hashCode(); hash = (37 * hash) + ISSUER_FIELD_NUMBER; hash = (53 * hash) + getIssuer().hashCode(); hash = (37 * hash) + JWKS_URI_FIELD_NUMBER; hash = (53 * hash) + getJwksUri().hashCode(); hash = (37 * hash) + AUDIENCES_FIELD_NUMBER; hash = (53 * hash) + getAudiences().hashCode(); hash = (37 * hash) + AUTHORIZATION_URL_FIELD_NUMBER; hash = (53 * hash) + getAuthorizationUrl().hashCode(); if (getJwtLocationsCount() > 0) { hash = (37 * hash) + JWT_LOCATIONS_FIELD_NUMBER; hash = (53 * hash) + getJwtLocationsList().hashCode(); } hash = (29 * hash) + unknownFields.hashCode(); memoizedHashCode = hash; return hash; } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom(java.nio.ByteBuffer data) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom( java.nio.ByteBuffer data, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom(org.apache.rocketmq.shaded.com.google.protobuf.ByteString data) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom( org.apache.rocketmq.shaded.com.google.protobuf.ByteString data, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom(byte[] data) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom( byte[] data, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom(java.io.InputStream input) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom( java.io.InputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseDelimitedFrom( java.io.InputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException( PARSER, input, extensionRegistry); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom(org.apache.rocketmq.shaded.com.google.protobuf.CodedInputStream input) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider parseFrom( org.apache.rocketmq.shaded.com.google.protobuf.CodedInputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.parseWithIOException( PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(org.apache.rocketmq.shaded.com.google.api.AuthProvider prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType(org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** * * *
   * Configuration for an authentication provider, including support for
   * [JSON Web Token
   * (JWT)](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32).
   * 
* * Protobuf type {@code google.api.AuthProvider} */ public static final class Builder extends org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.Builder implements // @@protoc_insertion_point(builder_implements:google.api.AuthProvider) org.apache.rocketmq.shaded.com.google.api.AuthProviderOrBuilder { public static final org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.Descriptor getDescriptor() { return org.apache.rocketmq.shaded.com.google.api.AuthProto.internal_static_google_api_AuthProvider_descriptor; } @java.lang.Override protected org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable() { return org.apache.rocketmq.shaded.com.google.api.AuthProto.internal_static_google_api_AuthProvider_fieldAccessorTable .ensureFieldAccessorsInitialized( org.apache.rocketmq.shaded.com.google.api.AuthProvider.class, org.apache.rocketmq.shaded.com.google.api.AuthProvider.Builder.class); } // Construct using org.apache.rocketmq.shaded.com.google.api.AuthProvider.newBuilder() private Builder() { maybeForceBuilderInitialization(); } private Builder(org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.BuilderParent parent) { super(parent); maybeForceBuilderInitialization(); } private void maybeForceBuilderInitialization() { if (org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders) { getJwtLocationsFieldBuilder(); } } @java.lang.Override public Builder clear() { super.clear(); id_ = ""; issuer_ = ""; jwksUri_ = ""; audiences_ = ""; authorizationUrl_ = ""; if (jwtLocationsBuilder_ == null) { jwtLocations_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000001); } else { jwtLocationsBuilder_.clear(); } return this; } @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return org.apache.rocketmq.shaded.com.google.api.AuthProto.internal_static_google_api_AuthProvider_descriptor; } @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.AuthProvider getDefaultInstanceForType() { return org.apache.rocketmq.shaded.com.google.api.AuthProvider.getDefaultInstance(); } @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.AuthProvider build() { org.apache.rocketmq.shaded.com.google.api.AuthProvider result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.AuthProvider buildPartial() { org.apache.rocketmq.shaded.com.google.api.AuthProvider result = new org.apache.rocketmq.shaded.com.google.api.AuthProvider(this); int from_bitField0_ = bitField0_; result.id_ = id_; result.issuer_ = issuer_; result.jwksUri_ = jwksUri_; result.audiences_ = audiences_; result.authorizationUrl_ = authorizationUrl_; if (jwtLocationsBuilder_ == null) { if (((bitField0_ & 0x00000001) != 0)) { jwtLocations_ = java.util.Collections.unmodifiableList(jwtLocations_); bitField0_ = (bitField0_ & ~0x00000001); } result.jwtLocations_ = jwtLocations_; } else { result.jwtLocations_ = jwtLocationsBuilder_.build(); } onBuilt(); return result; } @java.lang.Override public Builder clone() { return super.clone(); } @java.lang.Override public Builder setField( org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.setField(field, value); } @java.lang.Override public Builder clearField(org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.FieldDescriptor field) { return super.clearField(field); } @java.lang.Override public Builder clearOneof(org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.OneofDescriptor oneof) { return super.clearOneof(oneof); } @java.lang.Override public Builder setRepeatedField( org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.FieldDescriptor field, int index, java.lang.Object value) { return super.setRepeatedField(field, index, value); } @java.lang.Override public Builder addRepeatedField( org.apache.rocketmq.shaded.com.google.protobuf.Descriptors.FieldDescriptor field, java.lang.Object value) { return super.addRepeatedField(field, value); } @java.lang.Override public Builder mergeFrom(org.apache.rocketmq.shaded.com.google.protobuf.Message other) { if (other instanceof org.apache.rocketmq.shaded.com.google.api.AuthProvider) { return mergeFrom((org.apache.rocketmq.shaded.com.google.api.AuthProvider) other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(org.apache.rocketmq.shaded.com.google.api.AuthProvider other) { if (other == org.apache.rocketmq.shaded.com.google.api.AuthProvider.getDefaultInstance()) return this; if (!other.getId().isEmpty()) { id_ = other.id_; onChanged(); } if (!other.getIssuer().isEmpty()) { issuer_ = other.issuer_; onChanged(); } if (!other.getJwksUri().isEmpty()) { jwksUri_ = other.jwksUri_; onChanged(); } if (!other.getAudiences().isEmpty()) { audiences_ = other.audiences_; onChanged(); } if (!other.getAuthorizationUrl().isEmpty()) { authorizationUrl_ = other.authorizationUrl_; onChanged(); } if (jwtLocationsBuilder_ == null) { if (!other.jwtLocations_.isEmpty()) { if (jwtLocations_.isEmpty()) { jwtLocations_ = other.jwtLocations_; bitField0_ = (bitField0_ & ~0x00000001); } else { ensureJwtLocationsIsMutable(); jwtLocations_.addAll(other.jwtLocations_); } onChanged(); } } else { if (!other.jwtLocations_.isEmpty()) { if (jwtLocationsBuilder_.isEmpty()) { jwtLocationsBuilder_.dispose(); jwtLocationsBuilder_ = null; jwtLocations_ = other.jwtLocations_; bitField0_ = (bitField0_ & ~0x00000001); jwtLocationsBuilder_ = org.apache.rocketmq.shaded.com.google.protobuf.GeneratedMessageV3.alwaysUseFieldBuilders ? getJwtLocationsFieldBuilder() : null; } else { jwtLocationsBuilder_.addAllMessages(other.jwtLocations_); } } } this.mergeUnknownFields(other.unknownFields); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( org.apache.rocketmq.shaded.com.google.protobuf.CodedInputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { org.apache.rocketmq.shaded.com.google.api.AuthProvider parsedMessage = null; try { parsedMessage = PARSER.parsePartialFrom(input, extensionRegistry); } catch (org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException e) { parsedMessage = (org.apache.rocketmq.shaded.com.google.api.AuthProvider) e.getUnfinishedMessage(); throw e.unwrapIOException(); } finally { if (parsedMessage != null) { mergeFrom(parsedMessage); } } return this; } private int bitField0_; private java.lang.Object id_ = ""; /** * * *
     * The unique identifier of the auth provider. It will be referred to by
     * `AuthRequirement.provider_id`.
     * Example: "bookstore_auth".
     * 
* * string id = 1; * * @return The id. */ public java.lang.String getId() { java.lang.Object ref = id_; if (!(ref instanceof java.lang.String)) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); id_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * The unique identifier of the auth provider. It will be referred to by
     * `AuthRequirement.provider_id`.
     * Example: "bookstore_auth".
     * 
* * string id = 1; * * @return The bytes for id. */ public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getIdBytes() { java.lang.Object ref = id_; if (ref instanceof String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); id_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } /** * * *
     * The unique identifier of the auth provider. It will be referred to by
     * `AuthRequirement.provider_id`.
     * Example: "bookstore_auth".
     * 
* * string id = 1; * * @param value The id to set. * @return This builder for chaining. */ public Builder setId(java.lang.String value) { if (value == null) { throw new NullPointerException(); } id_ = value; onChanged(); return this; } /** * * *
     * The unique identifier of the auth provider. It will be referred to by
     * `AuthRequirement.provider_id`.
     * Example: "bookstore_auth".
     * 
* * string id = 1; * * @return This builder for chaining. */ public Builder clearId() { id_ = getDefaultInstance().getId(); onChanged(); return this; } /** * * *
     * The unique identifier of the auth provider. It will be referred to by
     * `AuthRequirement.provider_id`.
     * Example: "bookstore_auth".
     * 
* * string id = 1; * * @param value The bytes for id to set. * @return This builder for chaining. */ public Builder setIdBytes(org.apache.rocketmq.shaded.com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); id_ = value; onChanged(); return this; } private java.lang.Object issuer_ = ""; /** * * *
     * Identifies the principal that issued the JWT. See
     * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
     * Usually a URL or an email address.
     * Example: https://securetoken.google.com
     * Example: 1234567-compute@developer.gserviceaccount.com
     * 
* * string issuer = 2; * * @return The issuer. */ public java.lang.String getIssuer() { java.lang.Object ref = issuer_; if (!(ref instanceof java.lang.String)) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); issuer_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Identifies the principal that issued the JWT. See
     * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
     * Usually a URL or an email address.
     * Example: https://securetoken.google.com
     * Example: 1234567-compute@developer.gserviceaccount.com
     * 
* * string issuer = 2; * * @return The bytes for issuer. */ public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getIssuerBytes() { java.lang.Object ref = issuer_; if (ref instanceof String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); issuer_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } /** * * *
     * Identifies the principal that issued the JWT. See
     * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
     * Usually a URL or an email address.
     * Example: https://securetoken.google.com
     * Example: 1234567-compute@developer.gserviceaccount.com
     * 
* * string issuer = 2; * * @param value The issuer to set. * @return This builder for chaining. */ public Builder setIssuer(java.lang.String value) { if (value == null) { throw new NullPointerException(); } issuer_ = value; onChanged(); return this; } /** * * *
     * Identifies the principal that issued the JWT. See
     * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
     * Usually a URL or an email address.
     * Example: https://securetoken.google.com
     * Example: 1234567-compute@developer.gserviceaccount.com
     * 
* * string issuer = 2; * * @return This builder for chaining. */ public Builder clearIssuer() { issuer_ = getDefaultInstance().getIssuer(); onChanged(); return this; } /** * * *
     * Identifies the principal that issued the JWT. See
     * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1
     * Usually a URL or an email address.
     * Example: https://securetoken.google.com
     * Example: 1234567-compute@developer.gserviceaccount.com
     * 
* * string issuer = 2; * * @param value The bytes for issuer to set. * @return This builder for chaining. */ public Builder setIssuerBytes(org.apache.rocketmq.shaded.com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); issuer_ = value; onChanged(); return this; } private java.lang.Object jwksUri_ = ""; /** * * *
     * URL of the provider's public key set to validate signature of the JWT. See
     * [OpenID
     * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
     * Optional if the key set document:
     *  - can be retrieved from
     *    [OpenID
     *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
     *    of the issuer.
     *  - can be inferred from the email domain of the issuer (e.g. a Google
     *  service account).
     * Example: https://www.googleapis.com/oauth2/v1/certs
     * 
* * string jwks_uri = 3; * * @return The jwksUri. */ public java.lang.String getJwksUri() { java.lang.Object ref = jwksUri_; if (!(ref instanceof java.lang.String)) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); jwksUri_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * URL of the provider's public key set to validate signature of the JWT. See
     * [OpenID
     * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
     * Optional if the key set document:
     *  - can be retrieved from
     *    [OpenID
     *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
     *    of the issuer.
     *  - can be inferred from the email domain of the issuer (e.g. a Google
     *  service account).
     * Example: https://www.googleapis.com/oauth2/v1/certs
     * 
* * string jwks_uri = 3; * * @return The bytes for jwksUri. */ public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getJwksUriBytes() { java.lang.Object ref = jwksUri_; if (ref instanceof String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); jwksUri_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } /** * * *
     * URL of the provider's public key set to validate signature of the JWT. See
     * [OpenID
     * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
     * Optional if the key set document:
     *  - can be retrieved from
     *    [OpenID
     *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
     *    of the issuer.
     *  - can be inferred from the email domain of the issuer (e.g. a Google
     *  service account).
     * Example: https://www.googleapis.com/oauth2/v1/certs
     * 
* * string jwks_uri = 3; * * @param value The jwksUri to set. * @return This builder for chaining. */ public Builder setJwksUri(java.lang.String value) { if (value == null) { throw new NullPointerException(); } jwksUri_ = value; onChanged(); return this; } /** * * *
     * URL of the provider's public key set to validate signature of the JWT. See
     * [OpenID
     * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
     * Optional if the key set document:
     *  - can be retrieved from
     *    [OpenID
     *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
     *    of the issuer.
     *  - can be inferred from the email domain of the issuer (e.g. a Google
     *  service account).
     * Example: https://www.googleapis.com/oauth2/v1/certs
     * 
* * string jwks_uri = 3; * * @return This builder for chaining. */ public Builder clearJwksUri() { jwksUri_ = getDefaultInstance().getJwksUri(); onChanged(); return this; } /** * * *
     * URL of the provider's public key set to validate signature of the JWT. See
     * [OpenID
     * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata).
     * Optional if the key set document:
     *  - can be retrieved from
     *    [OpenID
     *    Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html)
     *    of the issuer.
     *  - can be inferred from the email domain of the issuer (e.g. a Google
     *  service account).
     * Example: https://www.googleapis.com/oauth2/v1/certs
     * 
* * string jwks_uri = 3; * * @param value The bytes for jwksUri to set. * @return This builder for chaining. */ public Builder setJwksUriBytes(org.apache.rocketmq.shaded.com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); jwksUri_ = value; onChanged(); return this; } private java.lang.Object audiences_ = ""; /** * * *
     * The list of JWT
     * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
     * that are allowed to access. A JWT containing any of these audiences will
     * be accepted. When this setting is absent, JWTs with audiences:
     *   - "https://[service.name]/[google.protobuf.Api.name]"
     *   - "https://[service.name]/"
     * will be accepted.
     * For example, if no audiences are in the setting, LibraryService API will
     * accept JWTs with the following audiences:
     *   -
     *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
     *   - https://library-example.googleapis.com/
     * Example:
     *     audiences: bookstore_android.apps.googleusercontent.com,
     *                bookstore_web.apps.googleusercontent.com
     * 
* * string audiences = 4; * * @return The audiences. */ public java.lang.String getAudiences() { java.lang.Object ref = audiences_; if (!(ref instanceof java.lang.String)) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); audiences_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * The list of JWT
     * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
     * that are allowed to access. A JWT containing any of these audiences will
     * be accepted. When this setting is absent, JWTs with audiences:
     *   - "https://[service.name]/[google.protobuf.Api.name]"
     *   - "https://[service.name]/"
     * will be accepted.
     * For example, if no audiences are in the setting, LibraryService API will
     * accept JWTs with the following audiences:
     *   -
     *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
     *   - https://library-example.googleapis.com/
     * Example:
     *     audiences: bookstore_android.apps.googleusercontent.com,
     *                bookstore_web.apps.googleusercontent.com
     * 
* * string audiences = 4; * * @return The bytes for audiences. */ public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getAudiencesBytes() { java.lang.Object ref = audiences_; if (ref instanceof String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); audiences_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } /** * * *
     * The list of JWT
     * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
     * that are allowed to access. A JWT containing any of these audiences will
     * be accepted. When this setting is absent, JWTs with audiences:
     *   - "https://[service.name]/[google.protobuf.Api.name]"
     *   - "https://[service.name]/"
     * will be accepted.
     * For example, if no audiences are in the setting, LibraryService API will
     * accept JWTs with the following audiences:
     *   -
     *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
     *   - https://library-example.googleapis.com/
     * Example:
     *     audiences: bookstore_android.apps.googleusercontent.com,
     *                bookstore_web.apps.googleusercontent.com
     * 
* * string audiences = 4; * * @param value The audiences to set. * @return This builder for chaining. */ public Builder setAudiences(java.lang.String value) { if (value == null) { throw new NullPointerException(); } audiences_ = value; onChanged(); return this; } /** * * *
     * The list of JWT
     * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
     * that are allowed to access. A JWT containing any of these audiences will
     * be accepted. When this setting is absent, JWTs with audiences:
     *   - "https://[service.name]/[google.protobuf.Api.name]"
     *   - "https://[service.name]/"
     * will be accepted.
     * For example, if no audiences are in the setting, LibraryService API will
     * accept JWTs with the following audiences:
     *   -
     *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
     *   - https://library-example.googleapis.com/
     * Example:
     *     audiences: bookstore_android.apps.googleusercontent.com,
     *                bookstore_web.apps.googleusercontent.com
     * 
* * string audiences = 4; * * @return This builder for chaining. */ public Builder clearAudiences() { audiences_ = getDefaultInstance().getAudiences(); onChanged(); return this; } /** * * *
     * The list of JWT
     * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3).
     * that are allowed to access. A JWT containing any of these audiences will
     * be accepted. When this setting is absent, JWTs with audiences:
     *   - "https://[service.name]/[google.protobuf.Api.name]"
     *   - "https://[service.name]/"
     * will be accepted.
     * For example, if no audiences are in the setting, LibraryService API will
     * accept JWTs with the following audiences:
     *   -
     *   https://library-example.googleapis.org.apache.rocketmq.shaded.com.google.example.library.v1.LibraryService
     *   - https://library-example.googleapis.com/
     * Example:
     *     audiences: bookstore_android.apps.googleusercontent.com,
     *                bookstore_web.apps.googleusercontent.com
     * 
* * string audiences = 4; * * @param value The bytes for audiences to set. * @return This builder for chaining. */ public Builder setAudiencesBytes(org.apache.rocketmq.shaded.com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); audiences_ = value; onChanged(); return this; } private java.lang.Object authorizationUrl_ = ""; /** * * *
     * Redirect URL if JWT token is required but not present or is expired.
     * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
     * 
* * string authorization_url = 5; * * @return The authorizationUrl. */ public java.lang.String getAuthorizationUrl() { java.lang.Object ref = authorizationUrl_; if (!(ref instanceof java.lang.String)) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString bs = (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; java.lang.String s = bs.toStringUtf8(); authorizationUrl_ = s; return s; } else { return (java.lang.String) ref; } } /** * * *
     * Redirect URL if JWT token is required but not present or is expired.
     * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
     * 
* * string authorization_url = 5; * * @return The bytes for authorizationUrl. */ public org.apache.rocketmq.shaded.com.google.protobuf.ByteString getAuthorizationUrlBytes() { java.lang.Object ref = authorizationUrl_; if (ref instanceof String) { org.apache.rocketmq.shaded.com.google.protobuf.ByteString b = org.apache.rocketmq.shaded.com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref); authorizationUrl_ = b; return b; } else { return (org.apache.rocketmq.shaded.com.google.protobuf.ByteString) ref; } } /** * * *
     * Redirect URL if JWT token is required but not present or is expired.
     * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
     * 
* * string authorization_url = 5; * * @param value The authorizationUrl to set. * @return This builder for chaining. */ public Builder setAuthorizationUrl(java.lang.String value) { if (value == null) { throw new NullPointerException(); } authorizationUrl_ = value; onChanged(); return this; } /** * * *
     * Redirect URL if JWT token is required but not present or is expired.
     * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
     * 
* * string authorization_url = 5; * * @return This builder for chaining. */ public Builder clearAuthorizationUrl() { authorizationUrl_ = getDefaultInstance().getAuthorizationUrl(); onChanged(); return this; } /** * * *
     * Redirect URL if JWT token is required but not present or is expired.
     * Implement authorizationUrl of securityDefinitions in OpenAPI spec.
     * 
* * string authorization_url = 5; * * @param value The bytes for authorizationUrl to set. * @return This builder for chaining. */ public Builder setAuthorizationUrlBytes(org.apache.rocketmq.shaded.com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } checkByteStringIsUtf8(value); authorizationUrl_ = value; onChanged(); return this; } private java.util.List jwtLocations_ = java.util.Collections.emptyList(); private void ensureJwtLocationsIsMutable() { if (!((bitField0_ & 0x00000001) != 0)) { jwtLocations_ = new java.util.ArrayList(jwtLocations_); bitField0_ |= 0x00000001; } } private org.apache.rocketmq.shaded.com.google.protobuf.RepeatedFieldBuilderV3< org.apache.rocketmq.shaded.com.google.api.JwtLocation, org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder, org.apache.rocketmq.shaded.com.google.api.JwtLocationOrBuilder> jwtLocationsBuilder_; /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public java.util.List getJwtLocationsList() { if (jwtLocationsBuilder_ == null) { return java.util.Collections.unmodifiableList(jwtLocations_); } else { return jwtLocationsBuilder_.getMessageList(); } } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public int getJwtLocationsCount() { if (jwtLocationsBuilder_ == null) { return jwtLocations_.size(); } else { return jwtLocationsBuilder_.getCount(); } } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public org.apache.rocketmq.shaded.com.google.api.JwtLocation getJwtLocations(int index) { if (jwtLocationsBuilder_ == null) { return jwtLocations_.get(index); } else { return jwtLocationsBuilder_.getMessage(index); } } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder setJwtLocations(int index, org.apache.rocketmq.shaded.com.google.api.JwtLocation value) { if (jwtLocationsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureJwtLocationsIsMutable(); jwtLocations_.set(index, value); onChanged(); } else { jwtLocationsBuilder_.setMessage(index, value); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder setJwtLocations(int index, org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder builderForValue) { if (jwtLocationsBuilder_ == null) { ensureJwtLocationsIsMutable(); jwtLocations_.set(index, builderForValue.build()); onChanged(); } else { jwtLocationsBuilder_.setMessage(index, builderForValue.build()); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder addJwtLocations(org.apache.rocketmq.shaded.com.google.api.JwtLocation value) { if (jwtLocationsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureJwtLocationsIsMutable(); jwtLocations_.add(value); onChanged(); } else { jwtLocationsBuilder_.addMessage(value); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder addJwtLocations(int index, org.apache.rocketmq.shaded.com.google.api.JwtLocation value) { if (jwtLocationsBuilder_ == null) { if (value == null) { throw new NullPointerException(); } ensureJwtLocationsIsMutable(); jwtLocations_.add(index, value); onChanged(); } else { jwtLocationsBuilder_.addMessage(index, value); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder addJwtLocations(org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder builderForValue) { if (jwtLocationsBuilder_ == null) { ensureJwtLocationsIsMutable(); jwtLocations_.add(builderForValue.build()); onChanged(); } else { jwtLocationsBuilder_.addMessage(builderForValue.build()); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder addJwtLocations(int index, org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder builderForValue) { if (jwtLocationsBuilder_ == null) { ensureJwtLocationsIsMutable(); jwtLocations_.add(index, builderForValue.build()); onChanged(); } else { jwtLocationsBuilder_.addMessage(index, builderForValue.build()); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder addAllJwtLocations( java.lang.Iterable values) { if (jwtLocationsBuilder_ == null) { ensureJwtLocationsIsMutable(); org.apache.rocketmq.shaded.com.google.protobuf.AbstractMessageLite.Builder.addAll(values, jwtLocations_); onChanged(); } else { jwtLocationsBuilder_.addAllMessages(values); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder clearJwtLocations() { if (jwtLocationsBuilder_ == null) { jwtLocations_ = java.util.Collections.emptyList(); bitField0_ = (bitField0_ & ~0x00000001); onChanged(); } else { jwtLocationsBuilder_.clear(); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public Builder removeJwtLocations(int index) { if (jwtLocationsBuilder_ == null) { ensureJwtLocationsIsMutable(); jwtLocations_.remove(index); onChanged(); } else { jwtLocationsBuilder_.remove(index); } return this; } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder getJwtLocationsBuilder(int index) { return getJwtLocationsFieldBuilder().getBuilder(index); } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public org.apache.rocketmq.shaded.com.google.api.JwtLocationOrBuilder getJwtLocationsOrBuilder(int index) { if (jwtLocationsBuilder_ == null) { return jwtLocations_.get(index); } else { return jwtLocationsBuilder_.getMessageOrBuilder(index); } } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public java.util.List getJwtLocationsOrBuilderList() { if (jwtLocationsBuilder_ != null) { return jwtLocationsBuilder_.getMessageOrBuilderList(); } else { return java.util.Collections.unmodifiableList(jwtLocations_); } } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder addJwtLocationsBuilder() { return getJwtLocationsFieldBuilder() .addBuilder(org.apache.rocketmq.shaded.com.google.api.JwtLocation.getDefaultInstance()); } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder addJwtLocationsBuilder(int index) { return getJwtLocationsFieldBuilder() .addBuilder(index, org.apache.rocketmq.shaded.com.google.api.JwtLocation.getDefaultInstance()); } /** * * *
     * Defines the locations to extract the JWT.
     * JWT locations can be either from HTTP headers or URL query parameters.
     * The rule is that the first match wins. The checking order is: checking
     * all headers first, then URL query parameters.
     * If not specified,  default to use following 3 locations:
     *    1) Authorization: Bearer
     *    2) x-goog-iap-jwt-assertion
     *    3) access_token query parameter
     * Default locations can be specified as followings:
     *    jwt_locations:
     *    - header: Authorization
     *      value_prefix: "Bearer "
     *    - header: x-goog-iap-jwt-assertion
     *    - query: access_token
     * 
* * repeated .google.api.JwtLocation jwt_locations = 6; */ public java.util.List getJwtLocationsBuilderList() { return getJwtLocationsFieldBuilder().getBuilderList(); } private org.apache.rocketmq.shaded.com.google.protobuf.RepeatedFieldBuilderV3< org.apache.rocketmq.shaded.com.google.api.JwtLocation, org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder, org.apache.rocketmq.shaded.com.google.api.JwtLocationOrBuilder> getJwtLocationsFieldBuilder() { if (jwtLocationsBuilder_ == null) { jwtLocationsBuilder_ = new org.apache.rocketmq.shaded.com.google.protobuf.RepeatedFieldBuilderV3< org.apache.rocketmq.shaded.com.google.api.JwtLocation, org.apache.rocketmq.shaded.com.google.api.JwtLocation.Builder, org.apache.rocketmq.shaded.com.google.api.JwtLocationOrBuilder>( jwtLocations_, ((bitField0_ & 0x00000001) != 0), getParentForChildren(), isClean()); jwtLocations_ = null; } return jwtLocationsBuilder_; } @java.lang.Override public final Builder setUnknownFields(final org.apache.rocketmq.shaded.com.google.protobuf.UnknownFieldSet unknownFields) { return super.setUnknownFields(unknownFields); } @java.lang.Override public final Builder mergeUnknownFields( final org.apache.rocketmq.shaded.com.google.protobuf.UnknownFieldSet unknownFields) { return super.mergeUnknownFields(unknownFields); } // @@protoc_insertion_point(builder_scope:google.api.AuthProvider) } // @@protoc_insertion_point(class_scope:google.api.AuthProvider) private static final org.apache.rocketmq.shaded.com.google.api.AuthProvider DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new org.apache.rocketmq.shaded.com.google.api.AuthProvider(); } public static org.apache.rocketmq.shaded.com.google.api.AuthProvider getDefaultInstance() { return DEFAULT_INSTANCE; } private static final org.apache.rocketmq.shaded.com.google.protobuf.Parser PARSER = new org.apache.rocketmq.shaded.com.google.protobuf.AbstractParser() { @java.lang.Override public AuthProvider parsePartialFrom( org.apache.rocketmq.shaded.com.google.protobuf.CodedInputStream input, org.apache.rocketmq.shaded.com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws org.apache.rocketmq.shaded.com.google.protobuf.InvalidProtocolBufferException { return new AuthProvider(input, extensionRegistry); } }; public static org.apache.rocketmq.shaded.com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public org.apache.rocketmq.shaded.com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public org.apache.rocketmq.shaded.com.google.api.AuthProvider getDefaultInstanceForType() { return DEFAULT_INSTANCE; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy