All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.hyperledger.fabric.protos.discovery.AuthInfo Maven / Gradle / Ivy

// Generated by the protocol buffer compiler.  DO NOT EDIT!
// NO CHECKED-IN PROTOBUF GENCODE
// source: discovery/protocol.proto
// Protobuf Java Version: 4.28.2

package org.hyperledger.fabric.protos.discovery;

/**
 * 
 * AuthInfo aggregates authentication information that the server uses
 * to authenticate the client
 * 
* * Protobuf type {@code discovery.AuthInfo} */ public final class AuthInfo extends com.google.protobuf.GeneratedMessage implements // @@protoc_insertion_point(message_implements:discovery.AuthInfo) AuthInfoOrBuilder { private static final long serialVersionUID = 0L; static { com.google.protobuf.RuntimeVersion.validateProtobufGencodeVersion( com.google.protobuf.RuntimeVersion.RuntimeDomain.PUBLIC, /* major= */ 4, /* minor= */ 28, /* patch= */ 2, /* suffix= */ "", AuthInfo.class.getName()); } // Use AuthInfo.newBuilder() to construct. private AuthInfo(com.google.protobuf.GeneratedMessage.Builder builder) { super(builder); } private AuthInfo() { clientIdentity_ = com.google.protobuf.ByteString.EMPTY; clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY; } public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable() { return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_fieldAccessorTable .ensureFieldAccessorsInitialized( org.hyperledger.fabric.protos.discovery.AuthInfo.class, org.hyperledger.fabric.protos.discovery.AuthInfo.Builder.class); } public static final int CLIENT_IDENTITY_FIELD_NUMBER = 1; private com.google.protobuf.ByteString clientIdentity_ = com.google.protobuf.ByteString.EMPTY; /** *
   * This is the identity of the client that is used to verify the signature
   * on the SignedRequest's payload.
   * It is a msp.SerializedIdentity in bytes form
   * 
* * bytes client_identity = 1 [json_name = "clientIdentity"]; * @return The clientIdentity. */ @java.lang.Override public com.google.protobuf.ByteString getClientIdentity() { return clientIdentity_; } public static final int CLIENT_TLS_CERT_HASH_FIELD_NUMBER = 2; private com.google.protobuf.ByteString clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY; /** *
   * This is the hash of the client's TLS cert.
   * When the network is running with TLS, clients that don't include a certificate
   * will be denied access to the service.
   * Since the Request is encapsulated with a SignedRequest (which is signed),
   * this binds the TLS session to the enrollement identity of the client and
   * therefore both authenticates the client to the server,
   * and also prevents the server from relaying the request message to another server.
   * 
* * bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"]; * @return The clientTlsCertHash. */ @java.lang.Override public com.google.protobuf.ByteString getClientTlsCertHash() { return clientTlsCertHash_; } private byte memoizedIsInitialized = -1; @java.lang.Override public final boolean isInitialized() { byte isInitialized = memoizedIsInitialized; if (isInitialized == 1) return true; if (isInitialized == 0) return false; memoizedIsInitialized = 1; return true; } @java.lang.Override public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException { if (!clientIdentity_.isEmpty()) { output.writeBytes(1, clientIdentity_); } if (!clientTlsCertHash_.isEmpty()) { output.writeBytes(2, clientTlsCertHash_); } getUnknownFields().writeTo(output); } @java.lang.Override public int getSerializedSize() { int size = memoizedSize; if (size != -1) return size; size = 0; if (!clientIdentity_.isEmpty()) { size += com.google.protobuf.CodedOutputStream .computeBytesSize(1, clientIdentity_); } if (!clientTlsCertHash_.isEmpty()) { size += com.google.protobuf.CodedOutputStream .computeBytesSize(2, clientTlsCertHash_); } size += getUnknownFields().getSerializedSize(); memoizedSize = size; return size; } @java.lang.Override public boolean equals(final java.lang.Object obj) { if (obj == this) { return true; } if (!(obj instanceof org.hyperledger.fabric.protos.discovery.AuthInfo)) { return super.equals(obj); } org.hyperledger.fabric.protos.discovery.AuthInfo other = (org.hyperledger.fabric.protos.discovery.AuthInfo) obj; if (!getClientIdentity() .equals(other.getClientIdentity())) return false; if (!getClientTlsCertHash() .equals(other.getClientTlsCertHash())) return false; if (!getUnknownFields().equals(other.getUnknownFields())) return false; return true; } @java.lang.Override public int hashCode() { if (memoizedHashCode != 0) { return memoizedHashCode; } int hash = 41; hash = (19 * hash) + getDescriptor().hashCode(); hash = (37 * hash) + CLIENT_IDENTITY_FIELD_NUMBER; hash = (53 * hash) + getClientIdentity().hashCode(); hash = (37 * hash) + CLIENT_TLS_CERT_HASH_FIELD_NUMBER; hash = (53 * hash) + getClientTlsCertHash().hashCode(); hash = (29 * hash) + getUnknownFields().hashCode(); memoizedHashCode = hash; return hash; } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( com.google.protobuf.ByteString data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( com.google.protobuf.ByteString data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { return PARSER.parseFrom(data, extensionRegistry); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseWithIOException(PARSER, input); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseWithIOException(PARSER, input, extensionRegistry); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseDelimitedWithIOException(PARSER, input); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseDelimitedFrom( java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseDelimitedWithIOException(PARSER, input, extensionRegistry); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( com.google.protobuf.CodedInputStream input) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseWithIOException(PARSER, input); } public static org.hyperledger.fabric.protos.discovery.AuthInfo parseFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { return com.google.protobuf.GeneratedMessage .parseWithIOException(PARSER, input, extensionRegistry); } @java.lang.Override public Builder newBuilderForType() { return newBuilder(); } public static Builder newBuilder() { return DEFAULT_INSTANCE.toBuilder(); } public static Builder newBuilder(org.hyperledger.fabric.protos.discovery.AuthInfo prototype) { return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype); } @java.lang.Override public Builder toBuilder() { return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this); } @java.lang.Override protected Builder newBuilderForType( com.google.protobuf.GeneratedMessage.BuilderParent parent) { Builder builder = new Builder(parent); return builder; } /** *
   * AuthInfo aggregates authentication information that the server uses
   * to authenticate the client
   * 
* * Protobuf type {@code discovery.AuthInfo} */ public static final class Builder extends com.google.protobuf.GeneratedMessage.Builder implements // @@protoc_insertion_point(builder_implements:discovery.AuthInfo) org.hyperledger.fabric.protos.discovery.AuthInfoOrBuilder { public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor; } @java.lang.Override protected com.google.protobuf.GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable() { return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_fieldAccessorTable .ensureFieldAccessorsInitialized( org.hyperledger.fabric.protos.discovery.AuthInfo.class, org.hyperledger.fabric.protos.discovery.AuthInfo.Builder.class); } // Construct using org.hyperledger.fabric.protos.discovery.AuthInfo.newBuilder() private Builder() { } private Builder( com.google.protobuf.GeneratedMessage.BuilderParent parent) { super(parent); } @java.lang.Override public Builder clear() { super.clear(); bitField0_ = 0; clientIdentity_ = com.google.protobuf.ByteString.EMPTY; clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY; return this; } @java.lang.Override public com.google.protobuf.Descriptors.Descriptor getDescriptorForType() { return org.hyperledger.fabric.protos.discovery.ProtocolProto.internal_static_discovery_AuthInfo_descriptor; } @java.lang.Override public org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstanceForType() { return org.hyperledger.fabric.protos.discovery.AuthInfo.getDefaultInstance(); } @java.lang.Override public org.hyperledger.fabric.protos.discovery.AuthInfo build() { org.hyperledger.fabric.protos.discovery.AuthInfo result = buildPartial(); if (!result.isInitialized()) { throw newUninitializedMessageException(result); } return result; } @java.lang.Override public org.hyperledger.fabric.protos.discovery.AuthInfo buildPartial() { org.hyperledger.fabric.protos.discovery.AuthInfo result = new org.hyperledger.fabric.protos.discovery.AuthInfo(this); if (bitField0_ != 0) { buildPartial0(result); } onBuilt(); return result; } private void buildPartial0(org.hyperledger.fabric.protos.discovery.AuthInfo result) { int from_bitField0_ = bitField0_; if (((from_bitField0_ & 0x00000001) != 0)) { result.clientIdentity_ = clientIdentity_; } if (((from_bitField0_ & 0x00000002) != 0)) { result.clientTlsCertHash_ = clientTlsCertHash_; } } @java.lang.Override public Builder mergeFrom(com.google.protobuf.Message other) { if (other instanceof org.hyperledger.fabric.protos.discovery.AuthInfo) { return mergeFrom((org.hyperledger.fabric.protos.discovery.AuthInfo)other); } else { super.mergeFrom(other); return this; } } public Builder mergeFrom(org.hyperledger.fabric.protos.discovery.AuthInfo other) { if (other == org.hyperledger.fabric.protos.discovery.AuthInfo.getDefaultInstance()) return this; if (other.getClientIdentity() != com.google.protobuf.ByteString.EMPTY) { setClientIdentity(other.getClientIdentity()); } if (other.getClientTlsCertHash() != com.google.protobuf.ByteString.EMPTY) { setClientTlsCertHash(other.getClientTlsCertHash()); } this.mergeUnknownFields(other.getUnknownFields()); onChanged(); return this; } @java.lang.Override public final boolean isInitialized() { return true; } @java.lang.Override public Builder mergeFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws java.io.IOException { if (extensionRegistry == null) { throw new java.lang.NullPointerException(); } try { boolean done = false; while (!done) { int tag = input.readTag(); switch (tag) { case 0: done = true; break; case 10: { clientIdentity_ = input.readBytes(); bitField0_ |= 0x00000001; break; } // case 10 case 18: { clientTlsCertHash_ = input.readBytes(); bitField0_ |= 0x00000002; break; } // case 18 default: { if (!super.parseUnknownField(input, extensionRegistry, tag)) { done = true; // was an endgroup tag } break; } // default: } // switch (tag) } // while (!done) } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.unwrapIOException(); } finally { onChanged(); } // finally return this; } private int bitField0_; private com.google.protobuf.ByteString clientIdentity_ = com.google.protobuf.ByteString.EMPTY; /** *
     * This is the identity of the client that is used to verify the signature
     * on the SignedRequest's payload.
     * It is a msp.SerializedIdentity in bytes form
     * 
* * bytes client_identity = 1 [json_name = "clientIdentity"]; * @return The clientIdentity. */ @java.lang.Override public com.google.protobuf.ByteString getClientIdentity() { return clientIdentity_; } /** *
     * This is the identity of the client that is used to verify the signature
     * on the SignedRequest's payload.
     * It is a msp.SerializedIdentity in bytes form
     * 
* * bytes client_identity = 1 [json_name = "clientIdentity"]; * @param value The clientIdentity to set. * @return This builder for chaining. */ public Builder setClientIdentity(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } clientIdentity_ = value; bitField0_ |= 0x00000001; onChanged(); return this; } /** *
     * This is the identity of the client that is used to verify the signature
     * on the SignedRequest's payload.
     * It is a msp.SerializedIdentity in bytes form
     * 
* * bytes client_identity = 1 [json_name = "clientIdentity"]; * @return This builder for chaining. */ public Builder clearClientIdentity() { bitField0_ = (bitField0_ & ~0x00000001); clientIdentity_ = getDefaultInstance().getClientIdentity(); onChanged(); return this; } private com.google.protobuf.ByteString clientTlsCertHash_ = com.google.protobuf.ByteString.EMPTY; /** *
     * This is the hash of the client's TLS cert.
     * When the network is running with TLS, clients that don't include a certificate
     * will be denied access to the service.
     * Since the Request is encapsulated with a SignedRequest (which is signed),
     * this binds the TLS session to the enrollement identity of the client and
     * therefore both authenticates the client to the server,
     * and also prevents the server from relaying the request message to another server.
     * 
* * bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"]; * @return The clientTlsCertHash. */ @java.lang.Override public com.google.protobuf.ByteString getClientTlsCertHash() { return clientTlsCertHash_; } /** *
     * This is the hash of the client's TLS cert.
     * When the network is running with TLS, clients that don't include a certificate
     * will be denied access to the service.
     * Since the Request is encapsulated with a SignedRequest (which is signed),
     * this binds the TLS session to the enrollement identity of the client and
     * therefore both authenticates the client to the server,
     * and also prevents the server from relaying the request message to another server.
     * 
* * bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"]; * @param value The clientTlsCertHash to set. * @return This builder for chaining. */ public Builder setClientTlsCertHash(com.google.protobuf.ByteString value) { if (value == null) { throw new NullPointerException(); } clientTlsCertHash_ = value; bitField0_ |= 0x00000002; onChanged(); return this; } /** *
     * This is the hash of the client's TLS cert.
     * When the network is running with TLS, clients that don't include a certificate
     * will be denied access to the service.
     * Since the Request is encapsulated with a SignedRequest (which is signed),
     * this binds the TLS session to the enrollement identity of the client and
     * therefore both authenticates the client to the server,
     * and also prevents the server from relaying the request message to another server.
     * 
* * bytes client_tls_cert_hash = 2 [json_name = "clientTlsCertHash"]; * @return This builder for chaining. */ public Builder clearClientTlsCertHash() { bitField0_ = (bitField0_ & ~0x00000002); clientTlsCertHash_ = getDefaultInstance().getClientTlsCertHash(); onChanged(); return this; } // @@protoc_insertion_point(builder_scope:discovery.AuthInfo) } // @@protoc_insertion_point(class_scope:discovery.AuthInfo) private static final org.hyperledger.fabric.protos.discovery.AuthInfo DEFAULT_INSTANCE; static { DEFAULT_INSTANCE = new org.hyperledger.fabric.protos.discovery.AuthInfo(); } public static org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstance() { return DEFAULT_INSTANCE; } private static final com.google.protobuf.Parser PARSER = new com.google.protobuf.AbstractParser() { @java.lang.Override public AuthInfo parsePartialFrom( com.google.protobuf.CodedInputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry) throws com.google.protobuf.InvalidProtocolBufferException { Builder builder = newBuilder(); try { builder.mergeFrom(input, extensionRegistry); } catch (com.google.protobuf.InvalidProtocolBufferException e) { throw e.setUnfinishedMessage(builder.buildPartial()); } catch (com.google.protobuf.UninitializedMessageException e) { throw e.asInvalidProtocolBufferException().setUnfinishedMessage(builder.buildPartial()); } catch (java.io.IOException e) { throw new com.google.protobuf.InvalidProtocolBufferException(e) .setUnfinishedMessage(builder.buildPartial()); } return builder.buildPartial(); } }; public static com.google.protobuf.Parser parser() { return PARSER; } @java.lang.Override public com.google.protobuf.Parser getParserForType() { return PARSER; } @java.lang.Override public org.hyperledger.fabric.protos.discovery.AuthInfo getDefaultInstanceForType() { return DEFAULT_INSTANCE; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy