org.hyperledger.fabric.protos.discovery.AuthInfo Maven / Gradle / Ivy
// Generated by the protocol buffer compiler. DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: discovery/protocol.proto
// Protobuf Java Version: 4.28.2
package org.hyperledger.fabric.protos.discovery;
/**
*
* AuthInfo aggregates authentication information that the server uses
* to authenticate the client
*
*
* Protobuf type {@code discovery.AuthInfo}
*/
public final class AuthInfo extends
com.google.protobuf.GeneratedMessage implements
// @@protoc_insertion_point(message_implements:discovery.AuthInfo)
AuthInfoOrBuilder {
private static final long serialVersionUID = 0L;
static {
com.google.protobuf.RuntimeVersion.validateProtobufGencodeVersion(
com.google.protobuf.RuntimeVersion.RuntimeDomain.PUBLIC,
/* major= */ 4,
/* minor= */ 28,
/* patch= */ 2,
/* suffix= */ "",
AuthInfo.class.getName());
}
// Use AuthInfo.newBuilder() to construct.
private AuthInfo(com.google.protobuf.GeneratedMessage.Builder> builder) {
super(builder);
}
private AuthInfo() {
clientIdentity_ = com.google.protobuf.ByteString.EMPTY;
clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY;
}
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
internalGetFieldAccessorTable() {
return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_fieldAccessorTable
.ensureFieldAccessorsInitialized(
org.hyperledger.fabric.protos.discovery.AuthInfo.class, org.hyperledger.fabric.protos.discovery.AuthInfo.Builder.class);
}
public static final int CLIENT_IDENTITY_FIELD_NUMBER = 1;
private com.google.protobuf.ByteString clientIdentity_ = com.google.protobuf.ByteString.EMPTY;
/**
*
* This is the identity of the client that is used to verify the signature
* on the SignedRequest's payload.
* It is a msp.SerializedIdentity in bytes form
*
*
* bytes client_identity = 1 [json_name = "clientIdentity"];
* @return The clientIdentity.
*/
@java.lang.Override
public com.google.protobuf.ByteString getClientIdentity() {
return clientIdentity_;
}
public static final int CLIENT_TLS_CERT_HASH_FIELD_NUMBER = 2;
private com.google.protobuf.ByteString clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY;
/**
*
* This is the hash of the client's TLS cert.
* When the network is running with TLS, clients that don't include a certificate
* will be denied access to the service.
* Since the Request is encapsulated with a SignedRequest (which is signed),
* this binds the TLS session to the enrollement identity of the client and
* therefore both authenticates the client to the server,
* and also prevents the server from relaying the request message to another server.
*
*
* bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"];
* @return The clientTlsCertHash.
*/
@java.lang.Override
public com.google.protobuf.ByteString getClientTlsCertHash() {
return clientTlsCertHash_;
}
private byte memoizedIsInitialized = -1;
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
if (isInitialized == 1) return true;
if (isInitialized == 0) return false;
memoizedIsInitialized = 1;
return true;
}
@java.lang.Override
public void writeTo(com.google.protobuf.CodedOutputStream output)
throws java.io.IOException {
if (!clientIdentity_.isEmpty()) {
output.writeBytes(1, clientIdentity_);
}
if (!clientTlsCertHash_.isEmpty()) {
output.writeBytes(2, clientTlsCertHash_);
}
getUnknownFields().writeTo(output);
}
@java.lang.Override
public int getSerializedSize() {
int size = memoizedSize;
if (size != -1) return size;
size = 0;
if (!clientIdentity_.isEmpty()) {
size += com.google.protobuf.CodedOutputStream
.computeBytesSize(1, clientIdentity_);
}
if (!clientTlsCertHash_.isEmpty()) {
size += com.google.protobuf.CodedOutputStream
.computeBytesSize(2, clientTlsCertHash_);
}
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
return size;
}
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
return true;
}
if (!(obj instanceof org.hyperledger.fabric.protos.discovery.AuthInfo)) {
return super.equals(obj);
}
org.hyperledger.fabric.protos.discovery.AuthInfo other = (org.hyperledger.fabric.protos.discovery.AuthInfo) obj;
if (!getClientIdentity()
.equals(other.getClientIdentity())) return false;
if (!getClientTlsCertHash()
.equals(other.getClientTlsCertHash())) return false;
if (!getUnknownFields().equals(other.getUnknownFields())) return false;
return true;
}
@java.lang.Override
public int hashCode() {
if (memoizedHashCode != 0) {
return memoizedHashCode;
}
int hash = 41;
hash = (19 * hash) + getDescriptor().hashCode();
hash = (37 * hash) + CLIENT_IDENTITY_FIELD_NUMBER;
hash = (53 * hash) + getClientIdentity().hashCode();
hash = (37 * hash) + CLIENT_TLS_CERT_HASH_FIELD_NUMBER;
hash = (53 * hash) + getClientTlsCertHash().hashCode();
hash = (29 * hash) + getUnknownFields().hashCode();
memoizedHashCode = hash;
return hash;
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
java.nio.ByteBuffer data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
java.nio.ByteBuffer data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
byte[] data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input, extensionRegistry);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseDelimitedFrom(java.io.InputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseDelimitedWithIOException(PARSER, input);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseDelimitedFrom(
java.io.InputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseDelimitedWithIOException(PARSER, input, extensionRegistry);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
com.google.protobuf.CodedInputStream input)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input);
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
return com.google.protobuf.GeneratedMessage
.parseWithIOException(PARSER, input, extensionRegistry);
}
@java.lang.Override
public Builder newBuilderForType() { return newBuilder(); }
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
public static Builder newBuilder(org.hyperledger.fabric.protos.discovery.AuthInfo prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
@java.lang.Override
public Builder toBuilder() {
return this == DEFAULT_INSTANCE
? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
protected Builder newBuilderForType(
com.google.protobuf.GeneratedMessage.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
*
* AuthInfo aggregates authentication information that the server uses
* to authenticate the client
*
*
* Protobuf type {@code discovery.AuthInfo}
*/
public static final class Builder extends
com.google.protobuf.GeneratedMessage.Builder implements
// @@protoc_insertion_point(builder_implements:discovery.AuthInfo)
org.hyperledger.fabric.protos.discovery.AuthInfoOrBuilder {
public static final com.google.protobuf.Descriptors.Descriptor
getDescriptor() {
return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessage.FieldAccessorTable
internalGetFieldAccessorTable() {
return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_fieldAccessorTable
.ensureFieldAccessorsInitialized(
org.hyperledger.fabric.protos.discovery.AuthInfo.class, org.hyperledger.fabric.protos.discovery.AuthInfo.Builder.class);
}
// Construct using org.hyperledger.fabric.protos.discovery.AuthInfo.newBuilder()
private Builder() {
}
private Builder(
com.google.protobuf.GeneratedMessage.BuilderParent parent) {
super(parent);
}
@java.lang.Override
public Builder clear() {
super.clear();
bitField0_ = 0;
clientIdentity_ = com.google.protobuf.ByteString.EMPTY;
clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY;
return this;
}
@java.lang.Override
public com.google.protobuf.Descriptors.Descriptor
getDescriptorForType() {
return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor;
}
@java.lang.Override
public org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstanceForType() {
return org.hyperledger.fabric.protos.discovery.AuthInfo.getDefaultInstance();
}
@java.lang.Override
public org.hyperledger.fabric.protos.discovery.AuthInfo build() {
org.hyperledger.fabric.protos.discovery.AuthInfo result = buildPartial();
if (!result.isInitialized()) {
throw newUninitializedMessageException(result);
}
return result;
}
@java.lang.Override
public org.hyperledger.fabric.protos.discovery.AuthInfo buildPartial() {
org.hyperledger.fabric.protos.discovery.AuthInfo result = new org.hyperledger.fabric.protos.discovery.AuthInfo(this);
if (bitField0_ != 0) { buildPartial0(result); }
onBuilt();
return result;
}
private void buildPartial0(org.hyperledger.fabric.protos.discovery.AuthInfo result) {
int from_bitField0_ = bitField0_;
if (((from_bitField0_ & 0x00000001) != 0)) {
result.clientIdentity_ = clientIdentity_;
}
if (((from_bitField0_ & 0x00000002) != 0)) {
result.clientTlsCertHash_ = clientTlsCertHash_;
}
}
@java.lang.Override
public Builder mergeFrom(com.google.protobuf.Message other) {
if (other instanceof org.hyperledger.fabric.protos.discovery.AuthInfo) {
return mergeFrom((org.hyperledger.fabric.protos.discovery.AuthInfo)other);
} else {
super.mergeFrom(other);
return this;
}
}
public Builder mergeFrom(org.hyperledger.fabric.protos.discovery.AuthInfo other) {
if (other == org.hyperledger.fabric.protos.discovery.AuthInfo.getDefaultInstance()) return this;
if (other.getClientIdentity() != com.google.protobuf.ByteString.EMPTY) {
setClientIdentity(other.getClientIdentity());
}
if (other.getClientTlsCertHash() != com.google.protobuf.ByteString.EMPTY) {
setClientTlsCertHash(other.getClientTlsCertHash());
}
this.mergeUnknownFields(other.getUnknownFields());
onChanged();
return this;
}
@java.lang.Override
public final boolean isInitialized() {
return true;
}
@java.lang.Override
public Builder mergeFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
if (extensionRegistry == null) {
throw new java.lang.NullPointerException();
}
try {
boolean done = false;
while (!done) {
int tag = input.readTag();
switch (tag) {
case 0:
done = true;
break;
case 10: {
clientIdentity_ = input.readBytes();
bitField0_ |= 0x00000001;
break;
} // case 10
case 18: {
clientTlsCertHash_ = input.readBytes();
bitField0_ |= 0x00000002;
break;
} // case 18
default: {
if (!super.parseUnknownField(input, extensionRegistry, tag)) {
done = true; // was an endgroup tag
}
break;
} // default:
} // switch (tag)
} // while (!done)
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.unwrapIOException();
} finally {
onChanged();
} // finally
return this;
}
private int bitField0_;
private com.google.protobuf.ByteString clientIdentity_ = com.google.protobuf.ByteString.EMPTY;
/**
*
* This is the identity of the client that is used to verify the signature
* on the SignedRequest's payload.
* It is a msp.SerializedIdentity in bytes form
*
*
* bytes client_identity = 1 [json_name = "clientIdentity"];
* @return The clientIdentity.
*/
@java.lang.Override
public com.google.protobuf.ByteString getClientIdentity() {
return clientIdentity_;
}
/**
*
* This is the identity of the client that is used to verify the signature
* on the SignedRequest's payload.
* It is a msp.SerializedIdentity in bytes form
*
*
* bytes client_identity = 1 [json_name = "clientIdentity"];
* @param value The clientIdentity to set.
* @return This builder for chaining.
*/
public Builder setClientIdentity(com.google.protobuf.ByteString value) {
if (value == null) { throw new NullPointerException(); }
clientIdentity_ = value;
bitField0_ |= 0x00000001;
onChanged();
return this;
}
/**
*
* This is the identity of the client that is used to verify the signature
* on the SignedRequest's payload.
* It is a msp.SerializedIdentity in bytes form
*
*
* bytes client_identity = 1 [json_name = "clientIdentity"];
* @return This builder for chaining.
*/
public Builder clearClientIdentity() {
bitField0_ = (bitField0_ & ~0x00000001);
clientIdentity_ = getDefaultInstance().getClientIdentity();
onChanged();
return this;
}
private com.google.protobuf.ByteString clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY;
/**
*
* This is the hash of the client's TLS cert.
* When the network is running with TLS, clients that don't include a certificate
* will be denied access to the service.
* Since the Request is encapsulated with a SignedRequest (which is signed),
* this binds the TLS session to the enrollement identity of the client and
* therefore both authenticates the client to the server,
* and also prevents the server from relaying the request message to another server.
*
*
* bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"];
* @return The clientTlsCertHash.
*/
@java.lang.Override
public com.google.protobuf.ByteString getClientTlsCertHash() {
return clientTlsCertHash_;
}
/**
*
* This is the hash of the client's TLS cert.
* When the network is running with TLS, clients that don't include a certificate
* will be denied access to the service.
* Since the Request is encapsulated with a SignedRequest (which is signed),
* this binds the TLS session to the enrollement identity of the client and
* therefore both authenticates the client to the server,
* and also prevents the server from relaying the request message to another server.
*
*
* bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"];
* @param value The clientTlsCertHash to set.
* @return This builder for chaining.
*/
public Builder setClientTlsCertHash(com.google.protobuf.ByteString value) {
if (value == null) { throw new NullPointerException(); }
clientTlsCertHash_ = value;
bitField0_ |= 0x00000002;
onChanged();
return this;
}
/**
*
* This is the hash of the client's TLS cert.
* When the network is running with TLS, clients that don't include a certificate
* will be denied access to the service.
* Since the Request is encapsulated with a SignedRequest (which is signed),
* this binds the TLS session to the enrollement identity of the client and
* therefore both authenticates the client to the server,
* and also prevents the server from relaying the request message to another server.
*
*
* bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"];
* @return This builder for chaining.
*/
public Builder clearClientTlsCertHash() {
bitField0_ = (bitField0_ & ~0x00000002);
clientTlsCertHash_ = getDefaultInstance().getClientTlsCertHash();
onChanged();
return this;
}
// @@protoc_insertion_point(builder_scope:discovery.AuthInfo)
}
// @@protoc_insertion_point(class_scope:discovery.AuthInfo)
private static final org.hyperledger.fabric.protos.discovery.AuthInfo DEFAULT_INSTANCE;
static {
DEFAULT_INSTANCE = new org.hyperledger.fabric.protos.discovery.AuthInfo();
}
public static org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstance() {
return DEFAULT_INSTANCE;
}
private static final com.google.protobuf.Parser
PARSER = new com.google.protobuf.AbstractParser() {
@java.lang.Override
public AuthInfo parsePartialFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
Builder builder = newBuilder();
try {
builder.mergeFrom(input, extensionRegistry);
} catch (com.google.protobuf.InvalidProtocolBufferException e) {
throw e.setUnfinishedMessage(builder.buildPartial());
} catch (com.google.protobuf.UninitializedMessageException e) {
throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial());
} catch (java.io.IOException e) {
throw new com.google.protobuf.InvalidProtocolBufferException(e)
.setUnfinishedMessage(builder.buildPartial());
}
return builder.buildPartial();
}
};
public static com.google.protobuf.Parser parser() {
return PARSER;
}
@java.lang.Override
public com.google.protobuf.Parser getParserForType() {
return PARSER;
}
@java.lang.Override
public org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstanceForType() {
return DEFAULT_INSTANCE;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy